2015
DOI: 10.1002/cpe.3703
|View full text |Cite
|
Sign up to set email alerts
|

Automatically identifying apps in mobile traffic

Abstract: Summary With the rapid development of smartphones in recent years, we have witnessed an exponential growth of the number of mobile apps. Considering the security and management issues, network operators need to have a clear visibility into the apps running in the network. To this end, this paper presents a novel approach to generating the fingerprints for mobile apps from network traffic. The fingerprints that characterize the unique behaviors of specific mobile apps can be used to identify mobile apps from th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…As shown in Figure 12, the accuracy of the similar traffic retrieval method for app identification is significantly lower than that of DNS clustering. Inspired by recent works, 15,17,18 we can further use the identification features contained in the HTTP header to improve the accuracy. To be specific, if the correlated flow (TCP or UDP flow preceded by DNS lookups) is the HTTP protocol, we identify its app by both the key–value matching 15 and hostname matching techniques.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…As shown in Figure 12, the accuracy of the similar traffic retrieval method for app identification is significantly lower than that of DNS clustering. Inspired by recent works, 15,17,18 we can further use the identification features contained in the HTTP header to improve the accuracy. To be specific, if the correlated flow (TCP or UDP flow preceded by DNS lookups) is the HTTP protocol, we identify its app by both the key–value matching 15 and hostname matching techniques.…”
Section: Discussionmentioning
confidence: 99%
“…After that, a search engine was employed as a kernel function to generate a score distribution vis-a`vis the index documents and finally determine a match. Sun et al 18 extracted identification features from the HTTP method, request URI, and host field and used nonnegative matrix factorization to cluster similar features into groups.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, there are an increasing number of research works that analyze network traffic to identify app, such as [27][28][29][30][31][32]. However, most of them were focused on plaintext flows (e.g., HTTP) and tried to collect identification features from HTTP headers.…”
Section: Related Workmentioning
confidence: 99%