The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis

作者: Mauro Conti , Qian Qian Li , Alberto Maragno , Riccardo Spolaor

DOI: 10.1109/COMST.2018.2843533

关键词:

摘要: … App identification (App in Table I): to identify the network traffic … as traffic characterization the analysis of the network traffic … In Table III, we group the works that study the mobile traffic …

参考文章(77)
Lada A Adamic, Eytan Adar, Friends and neighbors on the Web Social Networks. ,vol. 25, pp. 211- 230 ,(2003) , 10.1016/S0378-8733(03)00009-1
Suranga Seneviratne, Aruna Seneviratne, Prasant Mohapatra, Anirban Mahanti, Predicting user traits from a snapshot of apps installed on a smartphone ACM SIGMOBILE Mobile Computing and Communications Review. ,vol. 18, pp. 1- 8 ,(2014) , 10.1145/2636242.2636244
Jonathan Crussell, Ryan Stevens, Hao Chen, MAdFraud: investigating ad fraud in android applications international conference on mobile systems, applications, and services. pp. 123- 134 ,(2014) , 10.1145/2594368.2594391
Hiroki Kuzuno, S. Tonami, Signature generation for sensitive information leakage in android applications international conference on data engineering. pp. 112- 119 ,(2013) , 10.1109/ICDEW.2013.6547438
Zafar Ayyub Qazi, Jeongkeun Lee, Tao Jin, Gowtham Bellala, Manfred Arndt, Guevara Noubir, Application-awareness in SDN acm special interest group on data communication. ,vol. 43, pp. 487- 488 ,(2013) , 10.1145/2486001.2491700
Raimundo Real, Juan M. Vargas, The Probabilistic Basis of Jaccard's Index of Similarity Systematic Biology. ,vol. 45, pp. 380- 385 ,(1996) , 10.1093/SYSBIO/45.3.380
Lizhi Peng, Zhenxiang Chen, Hongbo Han, Jin Li, Qiben Yan, Bo Yang, Lei Zhang, A First Look at Android Malware Traffic in First Few Minutes trust, security and privacy in computing and communications. ,vol. 1, pp. 206- 213 ,(2015) , 10.1109/TRUSTCOM-BIGDATASE-ISPA.2015.376
Qinglong Wang, Amir Yahyavi, Bettina Kemme, Wenbo He, I know what you did on your smartphone: Inferring app usage over encrypted data traffic communications and networking symposium. pp. 433- 441 ,(2015) , 10.1109/CNS.2015.7346855
Vincent F. Taylor, Riccardo Spolaor, Mauro Conti, Ivan Martinovic, AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic ieee european symposium on security and privacy. pp. 439- 454 ,(2016) , 10.1109/EUROSP.2016.40
Arnaud Legout, David Choffnes, Jingjing Ren, Ashwin Rao, Martina Lindorfer, Demo: ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic international conference on mobile systems, applications, and services. pp. 361- 374 ,(2016) , 10.1145/2906388.2906392