2016
DOI: 10.1109/tifs.2015.2478741
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing Android Encrypted Network Traffic to Identify User Actions

Abstract: Mobile devices can be maliciously exploited to violate the privacy of people. In most attack scenarios, the adversary takes the local or remote control of the mobile device, by leveraging a vulnerability of the system, hence sending back the collected information to some remote web service. In this paper, we consider a different adversary, who does not interact actively with the mobile device, but he is able to eavesdrop the network traffic of the device from the network side (e.g., controlling a Wi-Fi access … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
120
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 231 publications
(122 citation statements)
references
References 32 publications
0
120
0
Order By: Relevance
“…Virtual SON (VSON), which integrates lately developed technologies such as software-defined wireless networking (SDWN), NFV, big data, ML, has been recently introduced as a prime proposal for future SON [17]. In this subsection, we propose and analyze an Open-SON for 5G in which we can apply data analytics and ML algorithms to develop variety SON applications.…”
Section: Open Platform For 5g Sonmentioning
confidence: 99%
“…Virtual SON (VSON), which integrates lately developed technologies such as software-defined wireless networking (SDWN), NFV, big data, ML, has been recently introduced as a prime proposal for future SON [17]. In this subsection, we propose and analyze an Open-SON for 5G in which we can apply data analytics and ML algorithms to develop variety SON applications.…”
Section: Open Platform For 5g Sonmentioning
confidence: 99%
“…intrusion detection [12], the identification of Android applications usage [2], IoT devices [7] or web crawlers [4]. Most proposals focus though on modeling communications made by a single host [5], [6], [13] i.e.…”
Section: Related Workmentioning
confidence: 99%
“…Modeling network communication patterns has several applications including intrusion detection [12], bot detection [4] and identification of running applications on a device [2]. While network traffic monitoring has also been used to profile host communications [3], [5], [13], little attention has been given to profiling a specific user based on the network traffic she generates.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, we can identify malware by analyzing the critical behavior of application software in network traffic. A number of traffic features have been identified for malicious apps detection [3][4][5][6][7][8]. However, the prior arts have encountered some challenges, such as the lack of sufficient labeled traffic data, and most of the mobile devices intrusion detection systems use a host-based intrusion detection model [6][7][8], which means that the intrusion detection system is installed as a client on the smartphone.…”
Section: Introductionmentioning
confidence: 99%