A survey on encrypted network traffic analysis applications, techniques, and countermeasures

E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …

A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Information exposure from consumer iot devices: A multidimensional, network-informed measurement approach

J Ren, DJ Dubois, D Choffnes, AM Mandalari… - Proceedings of the …, 2019 - dl.acm.org
Internet of Things (IoT) devices are increasingly found in everyday homes, providing useful
functionality for devices such as TVs, smart speakers, and video doorbells. Along with their …

Robust smartphone app identification via encrypted network traffic analysis

VF Taylor, R Spolaor, M Conti… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The apps installed on a smartphone can reveal much information about a user, such as their
medical conditions, sexual orientation, or religious beliefs. In addition, the presence or …

50 ways to leak your data: An exploration of apps' circumvention of the android permissions system

J Reardon, Á Feal, P Wijesekera, AEB On… - 28th USENIX security …, 2019 - usenix.org
Modern smartphone platforms implement permission-based models to protect access to
sensitive data and system resources. However, apps can circumvent the permission model …

Apps, trackers, privacy, and regulators: A global study of the mobile tracking ecosystem

A Razaghpanah, R Nithyanand… - The 25th annual …, 2018 - dspace.networks.imdea.org
Third-party services form an integral part of the mobile ecosystem: they ease application
development and enable features such as analytics, social network integration, and app …

Recon: Revealing and controlling pii leaks in mobile network traffic

J Ren, A Rao, M Lindorfer, A Legout… - Proceedings of the 14th …, 2016 - dl.acm.org
It is well known that apps running on mobile devices extensively track and leak users'
personally identifiable information (PII); however, these users have little visibility into PII …

An analysis of the privacy and security risks of android vpn permission-enabled apps

M Ikram, N Vallina-Rodriguez, S Seneviratne… - Proceedings of the …, 2016 - dl.acm.org
Millions of users worldwide resort to mobile VPN clients to either circumvent censorship or to
access geo-blocked content, and more generally for privacy and security purposes. In …

A review on machine learning–based approaches for Internet traffic classification

O Salman, IH Elhajj, A Kayssi, A Chehab - Annals of Telecommunications, 2020 - Springer
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …

Large-scale mobile app identification using deep learning

S Rezaei, B Kroencke, X Liu - IEEE Access, 2019 - ieeexplore.ieee.org
Many network services and tools (eg network monitors, malware-detection systems, routing
and billing policy enforcement modules in ISPs) depend on identifying the type of traffic that …