Presentation | 2017-12-14 Identification of Applications on Smartphone by Encrypted Traffic Analysis Anan Sawabe, Takanori Iwai, Kozo Satoda, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Requirements of smartphone users shift from the quality of service, i.e., throughput, to the quality of applications . Moreover the communication traffic is always encrypted in order to protect the personal information. Given the facts, it is important for the network operators to control the encrypted traffic to satisfy the requirements of smartphone users. In this paper, we propose a new scheme to identify applications on smartphone by analyzing the characteristics of encrypted traffic without packets inspection. Our proposed scheme represents the time-series data of encrypted traffic as a probabilistic states transition model. Moreover the model enables to estimate the transition timing of applications from the time-series data and then enables to identify the applications accurately. We evaluate the effectiveness of our proposed scheme by analyzing the traffic data that a smartphone user watches some movies and browses some web pages. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Encrypted traffic / Traffic analysis / States transition model / Identification of application |
Paper # | NS2017-126 |
Date of Issue | 2017-12-07 (NS) |
Conference Information | |
Committee | RCS / NS |
---|---|
Conference Date | 2017/12/14(2days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | Aster Plaza |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | Mobile Ad-hoc Network, Ubiquitous Network, Wireless Communication, security, Multi-Access Network |
Chair | Hidekazu Murata(Kyoto Univ.) / Hideki Tode(Osaka Pref. Univ.) |
Vice Chair | Yukitoshi Sanada(Keio Univ.) / Eisuke Fukuda(Fujitsu Labs.) / Satoshi Suyama(NTT DoCoMo) / Yoshikatsu Okazaki(NTT) |
Secretary | Yukitoshi Sanada(Toshiba) / Eisuke Fukuda(Hokkaido Univ.) / Satoshi Suyama(Kyushu Inst. of Tech.) / Yoshikatsu Okazaki(NTT) |
Assistant | Tetsuya Yamamoto(Panasonic) / Koichi Ishihara(NTT) / Kazushi Muraoka(NEC) / Shinsuke Ibi(Osaka Univ.) / Hiroshi Nishimoto(Mitsubishi Electric) / Kenichi Kashibuchi(NTT) |
Paper Information | |
Registration To | Technical Committee on Radio Communication Systems / Technical Committee on Network Systems |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Identification of Applications on Smartphone by Encrypted Traffic Analysis |
Sub Title (in English) | |
Keyword(1) | Encrypted traffic |
Keyword(2) | Traffic analysis |
Keyword(3) | States transition model |
Keyword(4) | Identification of application |
1st Author's Name | Anan Sawabe |
1st Author's Affiliation | NEC Corporation(NEC) |
2nd Author's Name | Takanori Iwai |
2nd Author's Affiliation | NEC Corporation(NEC) |
3rd Author's Name | Kozo Satoda |
3rd Author's Affiliation | NEC Corporation(NEC) |
Date | 2017-12-14 |
Paper # | NS2017-126 |
Volume (vol) | vol.117 |
Number (no) | NS-351 |
Page | pp.pp.1-6(NS), |
#Pages | 6 |
Date of Issue | 2017-12-07 (NS) |