2015 IEEE Conference on Communications and Network Security (CNS) 2015
DOI: 10.1109/cns.2015.7346855
|View full text |Cite
|
Sign up to set email alerts
|

I know what you did on your smartphone: Inferring app usage over encrypted data traffic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
41
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 74 publications
(42 citation statements)
references
References 19 publications
1
41
0
Order By: Relevance
“…Previous work dealing with encrypted traffic mostly applies ML techniques. Wang et al [17] propose a system for identifying smartphone apps from encrypted wireless traffic. ey collect data from 13 arbitrarily chosen apps by running them dynamically and training a Random Forest (RF) classifier with features from Layer 2 frames.…”
Section: Traffic Classification For App-idmentioning
confidence: 99%
“…Previous work dealing with encrypted traffic mostly applies ML techniques. Wang et al [17] propose a system for identifying smartphone apps from encrypted wireless traffic. ey collect data from 13 arbitrarily chosen apps by running them dynamically and training a Random Forest (RF) classifier with features from Layer 2 frames.…”
Section: Traffic Classification For App-idmentioning
confidence: 99%
“…Destination port 1 [24] (N+2) * (N+1)/2 from the first five packets with non-null payload of each flow given that Bernaille et al [23] found that the first five packets of a TCP connection are effective for traffic classification. [12,14,15] has shown decision tree-based models have an impressive performance in identifying mobile traffic. Therefore, we use decision treebased models as base classifiers to implement our method.…”
Section: Feature Description Numbermentioning
confidence: 99%
“…Machine Learning-Based Traffic Identification. Wang et al[12] proposed a system for identifying mobile apps. A visualization of the three-layer classifier.…”
mentioning
confidence: 99%
“…Several works addressed privacy threats and implications because of specific technical and usage characteristics of mobile devices. These include the typical "one app at a time" use [10], the possible privacy leakage from the use of sensors [11], location privacy [12] or, more in general, privacy in mobile environments [13]. This paper, to the best of our knowledge, is the first to deal expressly with using mobile push notifications to bind real and virtual identities.…”
Section: Privacy Implicationsmentioning
confidence: 99%