A Survey on Analyzing Encrypted Network Traffic of Mobile Devices

06/22/2020
by   Ashutosh Bhatiaa, et al.
0

Over the years, use of smartphones has come to dominate several areas, improving our lives, offering us convenience, and reshaping our daily work circumstances. Beyond traditional use for communication, they are used for many peripheral tasks such as gaming, browsing, and shopping. A significant amount of traffic over the Internet belongs to the applications running over mobile devices. Applications encrypt their communication to ensure the privacy and security of the user's data. However, it has been found that the amount and nature of incoming and outgoing traffic to a mobile device could reveal a significant amount of information that can be used to identify the activities performed and to profile the user. To that end, researchers are trying to develop techniques to classify encrypted mobile traffic at different levels of granularity, with the objectives of performing mobile user profiling, network performance optimization, etc. This paper proposes a framework to categorize the research works on analyzing encrypted network traffic related to mobile devices. After that, we provide an extensive review of state of the art based on the proposed framework.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/25/2022

Deep Learning for Encrypted Traffic Classification and Unknown Data Detection

Despite the widespread use of encryption techniques to provide confident...
research
12/14/2020

Back in control – An extensible middle-box on your phone

The closed design of mobile devices – with the increased security and co...
research
09/15/2023

A Testbed for Automating and Analysing Mobile Devices and their Applications

The need for improved network situational awareness has been highlighted...
research
04/18/2020

How context impacts on media choice

The relevance of mobile working is steadily increasing. Based on new mob...
research
09/27/2021

Can You See Me Now? A Measurement Study of Zoom, Webex, and Meet

Since the outbreak of the COVID-19 pandemic, videoconferencing has becom...
research
05/24/2021

Every Byte Matters: Traffic Analysis of Bluetooth Wearable Devices

Wearable devices such as smartwatches, fitness trackers, and blood-press...
research
12/14/2010

Seamless Flow Migration on Smartphones without Network Support

This paper addresses the following question: Is it possible to migrate T...

Please sign up or login with your details

Forgot password? Click here to reset