Traffic Latency Characterization and Fingerprinting in Mobile Cellular Networks

被引:0
|
作者
Wei S. [1 ]
Wu C. [1 ]
Luo N. [1 ]
Zhang G. [1 ]
机构
[1] School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing
基金
中国国家自然科学基金;
关键词
3G/4G; Mobile cellular network; Network delay; RRC mechanism; Traffic characterization;
D O I
10.7544/issn1000-1239.2019.20170501
中图分类号
学科分类号
摘要
Internet backbone traffic is a complicated mix of various data flows initiated by clients via different network connections, including 3G/4G-based mobile cellular networks and wired broadband networks. Without examining application layer meta-data or inspecting into TCP/IP packet contents, existing network traffic analysis and characterization methods struggle in differentiating traffic flows from these two types of network connections. By studying the different kinds of link layer technics and wireless radio resource control (RRC) mechanisms, the traffic temporal characteristics are analyzed and formalized based on the packet delay variance. By making use of TCP/IP packet's round-trip time (RTT) calculation, the experiments extract six significant network traffic features related to the packet delay, and apply them to train and test machine-learning classifiers to separate 3G/4G client traffic flows from broadband connection flows. These features focus on the transmission latency caused by a client's first-hop Internet connection, and reveal the temporal variance of packet distribution from different link flows. Experiments with realistic dataset of mobile application traffic achieve a classification precision of more than 92% with effective traffic coverage and error resilience. The proposed method surpasses other related solutions also by relying on only the temporal distribution of flow packets without needing to inspect the packet content and encapsulation. © 2019, Science Press. All right reserved.
引用
收藏
页码:363 / 374
页数:11
相关论文
共 22 条
  • [1] The 38th statistical report on Internet development in China
  • [2] The CAIDA Anonymized Internet Traces 2016 Dataset, (2016)
  • [3] Perta V.C., Barbera M.V., Mei A., Exploiting Delay Patterns for User IPs Identification in Cellular networks, Privacy Enhancing Technologies, pp. 224-243, (2014)
  • [4] Peng C., Li C., Tu G., Et al., Mobile data charging: New attacks and countermeasures, Proc of the 19th ACM Conf on Computer and Communications Security, pp. 195-204, (2012)
  • [5] Wen K., Yang J., Cheng F., Et al., MIL-RoQ: Monitoring, identifying and locating the RoQ attack in backbone network, Journal of Computer Research and Development, 52, 4, pp. 813-822, (2015)
  • [6] Zhao X., Xia J., Fu K., Et al., Frequent items mining algorithm over network flows at high-speed network, Journal of Computer Research and Development, 51, 11, pp. 2458-2469, (2014)
  • [7] Zhang Y., Rvidsson A., Understanding the characteristics of cellular data traffic, ACM SIGCOMM Computer Communication Review, 42, 4, pp. 461-466, (2012)
  • [8] Zhang Y., Arvidsson A., Siekkinen M., Et al., Understanding HTTP flow rates in cellular networks, Proc of the 13th IFIP Int Conf on Networking, pp. 1-8, (2014)
  • [9] Xu Y., Wang Z., Leong W.K., Et al., An end-to-end measurement study of modern cellular data networks, Passive and Active Measurement, pp. 34-45, (2014)
  • [10] Chen X., Zhang L., Xiang X., Et al., End-to-end delay analysis of LTE networks based on random network computing, Chinese Journal of Computers, 35, 1, pp. 46-52, (2012)