Robust Smartphone App Identification via Encrypted Network Traffic Analysis
نویسندگان
چکیده
منابع مشابه
Behavioral Analysis of Traffic Flow for an Effective Network Traffic Identification
Fast and accurate network traffic identification is becoming essential for network management, high quality of service control and early detection of network traffic abnormalities. Techniques based on statistical features of packet flows have recently become popular for network classification due to the limitations of traditional port and payload based methods. In this paper, we propose a metho...
متن کاملEavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic
Smartphone apps have changed the way we interact with online services, but highly specialized apps come at a cost to privacy. In this paper we will demonstrate that a passive eavesdropper is capable of identifying finegrained user activities within the wireless network traffic generated by apps. Despite the widespread use of fully encrypted communication, our technique, called NetScope, is base...
متن کاملOptimal traffic control via smartphone app users A model for actuator and departure optimisation
For many years traffic control has been the task of traffic centres. Road congestion is reduced via traffic control based on the sensor information of the current traffic state. Actuators are used to create a better spread and throughput over the network. A powerful means to further reduce congestion is to shift from the classical reactive paradigm to a proactive paradigm. In this concept the t...
متن کاملRealtime Encrypted Traffic Identification using Machine Learning
Accurate network traffic identification plays important roles in many areas such as traffic engineering, QoS and intrusion detection etc. The emergence of many new encrypted applications which use dynamic port numbers and masquerading techniques causes the most challenging problem in network traffic identification field. One of the challenging issues for existing traffic identification methods ...
متن کاملActive 3D Smartphone App
A novel method of creating a side-by-side 3D stereogram from the foreground of a 2D image was implemented. To achieve this, the pipeline implemented two step interactive GrabCut image segmentation, followed by recreating the object in 3D with a depth map, and finally rendering two images side by side with slightly different perspectives in front of an inpainted background to create a stereo pair.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2018
ISSN: 1556-6013,1556-6021
DOI: 10.1109/tifs.2017.2737970