Machine learning-powered encrypted network traffic analysis: A comprehensive survey
Traffic analysis is the process of monitoring network activities, discovering specific patterns,
and gleaning valuable information from network traffic. It can be applied in various fields …
and gleaning valuable information from network traffic. It can be applied in various fields …
A survey on encrypted network traffic analysis applications, techniques, and countermeasures
E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …
encryption protocols to secure communications and protect the privacy of users. In addition …
Mobile encrypted traffic classification using deep learning: Experimental evaluation, lessons learned, and challenges
The massive adoption of hand-held devices has led to the explosion of mobile traffic
volumes traversing home and enterprise networks, as well as the Internet. Traffic …
volumes traversing home and enterprise networks, as well as the Internet. Traffic …
MIMETIC: Mobile encrypted traffic classification using multimodal deep learning
Abstract Mobile Traffic Classification (TC) has become nowadays the enabler for valuable
profiling information, other than being the workhorse for service differentiation or blocking …
profiling information, other than being the workhorse for service differentiation or blocking …
Robust smartphone app identification via encrypted network traffic analysis
The apps installed on a smartphone can reveal much information about a user, such as their
medical conditions, sexual orientation, or religious beliefs. In addition, the presence or …
medical conditions, sexual orientation, or religious beliefs. In addition, the presence or …
Appscanner: Automatic fingerprinting of smartphone apps from encrypted network traffic
Automatic fingerprinting and identification of smartphone apps is becoming a very attractive
data gathering technique for adversaries, network administrators, investigators and …
data gathering technique for adversaries, network administrators, investigators and …
Systematic classification of side-channel attacks: A case study for mobile devices
R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
Multi-classification approaches for classifying mobile app traffic
The growing usage of smartphones in everyday life is deeply (and rapidly) changing the
nature of traffic traversing home and enterprise networks, and the Internet. Different tools …
nature of traffic traversing home and enterprise networks, and the Internet. Different tools …
Mobile encrypted traffic classification using deep learning
The massive adoption of hand-held devices has led to the explosion of mobile traffic
volumes traversing home and enterprise networks, as well as the Internet. Procedures for …
volumes traversing home and enterprise networks, as well as the Internet. Procedures for …
A review on machine learning–based approaches for Internet traffic classification
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …
approaches have been proposed to classify Internet traffic to manage both security and …