2022
DOI: 10.1007/s10207-022-00581-y
|View full text |Cite
|
Sign up to set email alerts
|

A survey on analyzing encrypted network traffic of mobile devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 79 publications
0
1
0
Order By: Relevance
“…In recent years, the academic and industrial communities have paid much attention to traffic classification [12], [28]- [32]. Traditional techniques for traffic classification, like port-based and deep packet inspection (DPI), are no longer adequate due to the exponential growth in encrypted traffic [33]- [35].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In recent years, the academic and industrial communities have paid much attention to traffic classification [12], [28]- [32]. Traditional techniques for traffic classification, like port-based and deep packet inspection (DPI), are no longer adequate due to the exponential growth in encrypted traffic [33]- [35].…”
Section: Related Workmentioning
confidence: 99%
“…This approach aims to obtain predetermined patterns as signatures for every protocol and application. Subsequently, it classifies traffic by comparing the data in the packet's payload to the predefined signatures [6], [12], [41]. Although this method has high accuracy in classifying unencrypted traffic, it is computationally intensive.…”
Section: B Deep Packet Inspection (Dpi) Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…Within the framework of a "Personal Interactive Transmission Session," we are referring to a kind of communication that is customised for individual users, wherein information is sent in a dynamic and real-time manner [4]. During these sessions, examining the TCP stream entails analysing the attributes, security implications, and performance factors of the data being communicated [5]. The objective is to ensure a reliable and protected interactive encounter, taking into account aspects such as the integrity of data, the delay in transmission, and the general efficiency of managing personalised communication via a TCP connection [6].…”
Section: Introductionmentioning
confidence: 99%
“…The advent of the 5G era and rapid development of cellular vehicle-to-everything (C-V2X) technologies have realized a massive number of vehicles equipped with advanced intelligent devices (e.g., high-definition (HD) players, 3D navigation equipment, vehicle mixed reality (MR) glasses), which bring significant mobile data traffic and service explosion [1]. Furthermore, the global mobile data traffic is expected to reach 77 exabytes per month by 2022, as reported by Cisco, where 79 percent of this data comes from mobile video [2]. Additionally, innovative mobile video technologies have inspired a wide range of video streaming applications in vehicular networks, becoming one of the most popular and indispensable services.…”
Section: Introductionmentioning
confidence: 99%