2018
DOI: 10.1109/comst.2018.2843533
|View full text |Cite
|
Sign up to set email alerts
|

The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis

Abstract: In recent years, mobile devices (e.g., smartphones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 76 publications
(36 citation statements)
references
References 75 publications
0
33
0
Order By: Relevance
“…Our work also has some similarities with the broader topic of network traffic analysis which has been widely studied in recent years [6]. As defined in [7], "network traffic analysis studies inferential methods which take the network traces of a group of devices (from a few to thousands) as input, and give information about those devices, their users, their apps, or the traffic itself as output". Network traffic contains a lot of useful information about the type of devices, users and applications being used.…”
Section: B Network Traffic Analysismentioning
confidence: 86%
“…Our work also has some similarities with the broader topic of network traffic analysis which has been widely studied in recent years [6]. As defined in [7], "network traffic analysis studies inferential methods which take the network traces of a group of devices (from a few to thousands) as input, and give information about those devices, their users, their apps, or the traffic itself as output". Network traffic contains a lot of useful information about the type of devices, users and applications being used.…”
Section: B Network Traffic Analysismentioning
confidence: 86%
“…Since 5G systems will be much more complex compared to the previous generations, huge research efforts are dedicated to using ML for security within the novel technological concepts used in 5G, and the services that will be served by 5G networks, ranging from security of novel IoT devices and IoT services [4], [64] to virtual services in clouds [65]. In the physical layer security, ML has been demonstrated to perform well at protecting massive MIMO [66], demodulation [67], and from channel contamination in mmWave, as well as in traffic analysis and fingerprinting [68], [69]. .…”
Section: E Threats To Security Applicationsmentioning
confidence: 99%
“…These three tools all assume access to the source code of the application, whereas Profit uses a fully black-box approach. A number of works analyze mobile application for analyzing side-channels in networks of mobile devices [17], [18], [47].…”
Section: Related Workmentioning
confidence: 99%