A survey on analyzing encrypted network traffic of mobile devices

نویسندگان

چکیده

Over the years, use of smartphones has come to dominate several areas, improving our lives, offering us convenience, and reshaping daily work circumstances. Beyond traditional for communication, they are used many peripheral tasks such as gaming, browsing, shopping. A significant amount traffic over Internet belongs applications running mobile devices. Applications encrypt their communication ensure privacy security user’s data. However, it been found that nature incoming outgoing a device could reveal information can be identify activities performed profile user. To end, researchers trying develop techniques classify encrypted at different levels granularity, with objectives performing user profiling, network performance optimization, etc. This paper proposes framework categorize research works on analyzing related After that, we provide an extensive review state art based proposed framework.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis

In recent years, mobile devices (e.g., smartphones and tablets) have met an increasing commercial success and have become a fundamental element of the everyday life for billions of people all around the world. Mobile devices are used not only for traditional communication activities (e.g., voice calls and messages) but also for more advanced tasks made possible by an enormous amount of multi-pu...

متن کامل

Analyzing Covert Channels on Mobile Devices

In this work we investigate the problem of stealthy communication between colluding applications on smartphones running the popular Android operating system. Through collusion, applications can cooperatively perform operations they would not be able to perform separately, thus escalating their privileges. This can result in privacy infringements and user data leakage. In order to collude, the t...

متن کامل

Classification of encrypted traffic for applications based on statistical features

Traffic classification plays an important role in many aspects of network management such as identifying type of the transferred data, detection of malware applications, applying policies to restrict network accesses and so on. Basic methods in this field were using some obvious traffic features like port number and protocol type to classify the traffic type. However, recent changes in applicat...

متن کامل

A survey of methods for encrypted traffic classification and analysis

With the widespread use of encrypted data transport network traffic encryption is becoming a standard nowadays. This presents a challenge for traffic measurement, especially for analysis and anomaly detection methods which are dependent on the type of network traffic. In this paper, we survey existing approaches for classification and analysis of encrypted traffic. First, we describe the most w...

متن کامل

On Inferring Application Protocol Behaviors in Encrypted Network Traffic

Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses the network. However, with the increasing popularity of cryptographic protocols, the traditional means of inspecting packet contents to enforce security policies is no longer a viable approach as message contents are co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Information Security

سال: 2022

ISSN: ['1615-5262', '1615-5270']

DOI: https://doi.org/10.1007/s10207-022-00581-y