App trajectory recognition over encrypted internet traffic based on deep neural network

被引:11
|
作者
Li, Ding [1 ]
Li, Wenzhong [1 ]
Wang, Xiaoliang [1 ]
Nguyen, Cam-Tu [1 ]
Lu, Sanglu [1 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210093, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Encrypted internet traffic; Time series segmentation; Mobile app and activity classification; CLASSIFICATION;
D O I
10.1016/j.comnet.2020.107372
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Despite the increasing popularity of mobile applications and the widespread adoption of encryption techniques, mobile devices are still susceptible to security and privacy risks. In this paper, we propose ActiveTracker, a new type of sniffing attack that can reveal the fine-grained trajectory of useras mobile app usage from a sniffed encrypted Internet traffic stream. It firstly adopts a sliding window based approach to divide the encrypted traffic stream into a sequence of segments corresponding to different app activities. Then each traffic segment is represented by a normalized temporal-spacial traffic matrix and a traffic spectrum vector. Based on the normalized representation, a deep neural network (DNN) model which consists of an app filter and an activity classifier is developed to extract comprehensive features from the input and uncover the crucial app usage trajectory conducted by the user. By extensive experiments on real-world app usage traffic collected from volunteers and on our synthetic traffic data, we show that the proposed approach achieves up to 79.65% accuracy in recognizing app trajectory over encrypted traffic streams.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] A FAST TRAFFIC ACCIDENT RECOGNITION METHOD BASED ON EDGE COMPUTING AND DEEP NEURAL NETWORK
    Wang, Nan
    Deng, Qinglu
    Jiao, Zeyu
    Zhong, Zhenyu
    [J]. PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2022, 23 (01): : 69 - 78
  • [22] Prediction of Internet Traffic Based on Elman Neural Network
    Wang Junsong
    Wang Jiukun
    Zeng Maohua
    Wang Junjie
    [J]. CCDC 2009: 21ST CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-6, PROCEEDINGS, 2009, : 1248 - +
  • [23] BlindBox: Deep Packet Inspection over Encrypted Traffic
    Sherry, Justine
    Lan, Chang
    Popa, Raluca Ada
    Ratnasamy, Sylvia
    [J]. SIGCOMM'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2015, : 213 - 226
  • [24] BlindBox: Deep Packet Inspection over Encrypted Traffic
    Sherry, Justine
    Lan, Chang
    Popa, Raluca Ada
    Ratnasamy, Sylvia
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2015, 45 (04) : 213 - 226
  • [25] Flow-Based Encrypted Network Traffic Classification With Graph Neural Networks
    Huoh, Ting-Li
    Luo, Yan
    Li, Peilong
    Zhang, Tong
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (02): : 1224 - 1237
  • [26] Robust Smartphone App Identification via Encrypted Network Traffic Analysis
    Taylor, Vincent F.
    Spolaor, Riccardo
    Conti, Mauro
    Martinovic, Ivan
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (01) : 63 - 78
  • [27] Traffic Sign Recognition Based on Convolutional Neural Network
    Cai, Zhuo
    Cao, Jian
    Huang, May
    Zhang, Xing
    [J]. EMBEDDED SYSTEMS TECHNOLOGY, ESTC 2017, 2018, 857 : 3 - 16
  • [28] A Classification Retrieval Method for Encrypted Speech Based on Deep Neural Network and Deep Hashing
    Zhang, Qiuyu
    Zhao, Xuejiao
    Hu, Yingjie
    [J]. IEEE ACCESS, 2020, 8 : 202469 - 202482
  • [29] Identification of encrypted and malicious network traffic based on one-dimensional convolutional neural network
    Yan Zhou
    Huiling Shi
    Yanling Zhao
    Wei Ding
    Jing Han
    Hongyang Sun
    Xianheng Zhang
    Chang Tang
    Wei Zhang
    [J]. Journal of Cloud Computing, 12
  • [30] Identification of encrypted and malicious network traffic based on one-dimensional convolutional neural network
    Zhou, Yan
    Shi, Huiling
    Zhao, Yanling
    Ding, Wei
    Han, Jing
    Sun, Hongyang
    Zhang, Xianheng
    Tang, Chang
    Zhang, Wei
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):