The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2018
DOI: 10.1177/1550147718817292
|View full text |Cite
|
Sign up to set email alerts
|

Mobile app identification for encrypted network flows by traffic correlation

Abstract: Mobile application (simply ''app'') identification at a per-flow granularity is vital for traffic engineering, network management, and security practices. However, uncertainty is caused by a growing fraction of encrypted traffic such as Hypertext Transfer Protocol Secure. To address this challenge, we have carefully analyzed mobile app traffic (mainly including Domain Name System, Hypertext Transfer Protocol, and encrypted traffic such as Secure Sockets Layer and Transport Layer Security) and observed that (1)… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 27 publications
0
4
0
Order By: Relevance
“…This function has the ability of image compression representation and can guide the Markov-GAN to generate new Markov images with family homology and texture similarity, so as to improve the game level between the discriminator and generator. The coding length function is a data compression representation method proposed in combination with rate distortion theory, as shown in formula (6):…”
Section: Coding Length Loss Functionmentioning
confidence: 99%
See 1 more Smart Citation
“…This function has the ability of image compression representation and can guide the Markov-GAN to generate new Markov images with family homology and texture similarity, so as to improve the game level between the discriminator and generator. The coding length function is a data compression representation method proposed in combination with rate distortion theory, as shown in formula (6):…”
Section: Coding Length Loss Functionmentioning
confidence: 99%
“…In the field of mobile applications, malicious APPs generally use encrypted traffic (such as HTTPS) to transmit network data to avoid detection. More than 30% of SSL‐based attacks deceived trusted cloud providers such as Dropbox, Google, Microsoft and Amazon to distribute malware through encrypted channels, which has become more and more complex in avoiding detection [6]. Therefore, how to effectively identify malicious traffic has become an important challenge to network security.…”
Section: Introductionmentioning
confidence: 99%
“…Chen et al [37] introduced the imbalanced data gravitation-based classification algorithm for the classification of imbalanced data of malicious apps. He et al [14,38] proposed the identification of encrypted apps' flows via traffic correlation and the detection of repackaged Android apps via comparison of the network behaviors of similar apps. In these methods, the detection is conducted mostly in the router or at the network monitoring node; hence, the performances of mobile devices are not affected.…”
Section: Off-device Detectionmentioning
confidence: 99%
“…In this study, traffic labeling is conducted to identify the corresponding app for each network flow, which is known as the app identification problem [53]. Extensive works have been conducted on the identification of apps from mobile network traffic [38,54,55]. However, the achieved identification accuracies are all lower than 100%.…”
Section: Traffic Labelingmentioning
confidence: 99%