Robust Smartphone App Identification via Encrypted Network Traffic Analysis

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Behavioral Analysis of Traffic Flow for an Effective Network Traffic Identification

Fast and accurate network traffic identification is becoming essential for network management, high quality of service control and early detection of network traffic abnormalities. Techniques based on statistical features of packet flows have recently become popular for network classification due to the limitations of traditional port and payload based methods. In this paper, we propose a metho...

متن کامل

Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic

Smartphone apps have changed the way we interact with online services, but highly specialized apps come at a cost to privacy. In this paper we will demonstrate that a passive eavesdropper is capable of identifying finegrained user activities within the wireless network traffic generated by apps. Despite the widespread use of fully encrypted communication, our technique, called NetScope, is base...

متن کامل

Optimal traffic control via smartphone app users A model for actuator and departure optimisation

For many years traffic control has been the task of traffic centres. Road congestion is reduced via traffic control based on the sensor information of the current traffic state. Actuators are used to create a better spread and throughput over the network. A powerful means to further reduce congestion is to shift from the classical reactive paradigm to a proactive paradigm. In this concept the t...

متن کامل

Realtime Encrypted Traffic Identification using Machine Learning

Accurate network traffic identification plays important roles in many areas such as traffic engineering, QoS and intrusion detection etc. The emergence of many new encrypted applications which use dynamic port numbers and masquerading techniques causes the most challenging problem in network traffic identification field. One of the challenging issues for existing traffic identification methods ...

متن کامل

Active 3D Smartphone App

A novel method of creating a side-by-side 3D stereogram from the foreground of a 2D image was implemented. To achieve this, the pipeline implemented two step interactive GrabCut image segmentation, followed by recreating the object in 3D with a depth map, and finally rendering two images side by side with slightly different perspectives in front of an inpainted background to create a stereo pair.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2018

ISSN: 1556-6013,1556-6021

DOI: 10.1109/tifs.2017.2737970