Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis

Authors Info & Claims
Published:01 October 2018Publication History
Skip Abstract Section

Abstract

In recent years, mobile devices (e.g., smartphones and tablets) have met an increasing commercial success and have become a fundamental element of the everyday life for billions of people all around the world. Mobile devices are used not only for traditional communication activities (e.g., voice calls and messages) but also for more advanced tasks made possible by an enormous amount of multi-purpose applications (e.g., finance, gaming, and shopping). As a result, those devices generate a significant network traffic (a consistent part of the overall Internet traffic). For this reason, the research community has been investigating security and privacy issues that are related to the network traffic generated by mobile devices, which could be analyzed to obtain information useful for a variety of goals (ranging from fine-grained user profiling to device security and network optimization). In this paper, we review the works that contributed to the state of the art of network traffic analysis targeting mobile devices. In particular, we present a systematic classification of the works in the literature according to three criteria: 1) the goal of the analysis; 2) the point where the network traffic is captured; and 3) the targeted mobile platforms. In this survey, we consider points of capturing such as Wi-Fi access points, software simulation, and inside real mobile devices or emulators. For the surveyed works, we review and compare analysis techniques, validation methods, and achieved results. We also discuss possible countermeasures, challenges, and possible directions for future research on mobile traffic analysis and other emerging domains (e.g., Internet of Things). We believe our survey will be a reference work for researchers and practitioners in this research field.

References

  1. [1] Statista. (Nov. 2016). Smartphone User Penetration As Percentage of Total Global Population From 2014 to 2020. Accessed: Mar. 15, 2018. [Online]. Available: https://www.statista.com/statistics/203734/globalsmartphone-penetration-per-capita-since-2005/Google ScholarGoogle Scholar
  2. [2] Statista. (Jun. 2016). Tablet User Penetration Worldwide As Share of Population From 2014 to 2020. Accessed: Mar. 15, 2018. [Online]. Available: https://www.statista.com/statistics/219909/globaltablet-penetration-forecast/Google ScholarGoogle Scholar
  3. [3] Naboulsi D., Fiore M., Ribot S., and Stanica R., “Large-scale mobile traffic analysis: A survey,” IEEE Commun. Surveys Tuts., vol. 18, no. 1, pp. 124161, 1st Quart., 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Wei X., Gomez L., Neamtiu I., and Faloutsos M., “ProfileDroid: Multi-layer profiling of android applications,” in Proc. 18th Annu. Int. Conf. Mobile Comput. Netw. (MobiCom), Istanbul, Turkey: ACM, 2012, pp. 137148.Google ScholarGoogle Scholar
  5. [5] Le A.et al., “AntMonitor: A system for monitoring from mobile devices,” in Proc. ACM SIGCOMM Workshop Crowdsourcing Crowdsharing Big (Internet) Data (C2B(1)D), London, U.K.: ACM, 2015, pp. 1520.Google ScholarGoogle Scholar
  6. [6] Alan H. F. and Kaur J., “Can Android applications be identified using only TCP/IP headers of their launch time traffic?” in Proc. 9th ACM Conf. Security Privacy Wireless Mobile Netw. (WiSec), Darmstadt, Germany: ACM, 2016, pp. 6166.Google ScholarGoogle Scholar
  7. [7] Tadrous J. and Sabharwal A., “Interactive app traffic: An action-based model and data-driven analysis,” in Proc. 14th Int. Symp. Model. Optim. Mobile Ad Hoc Wireless Netw. (WiOpt), Tempe, AZ, USA: IEEE Control Syst. Soc., 2016, pp. 187194.Google ScholarGoogle Scholar
  8. [8] Wang S.et al., “TrafficAV: An effective and explainable detection of mobile malware behavior using network traffic,” in Proc. 24th IEEE/ACM Int. Symp. Qual. Service (IWQoS), Beijing, China: IEEE, 2016, pp. 16.Google ScholarGoogle Scholar
  9. [9] Afanasyev M., Chen T., Voelker G. M., and Snoeren A. C., “Usage patterns in an urban WiFi network,” IEEE/ACM Trans. Netw., vol. 18, no. 5, pp. 13591372, Oct. 2010.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. [10] Falaki H., Lymberopoulos D., Mahajan R., Kandula S., and Estrin D., “A first look at traffic on smartphones,” in Proc. ACM SIGCOMM Internet Meas. Conf. (IMC), Melbourne, VIC, Australia: ACM, 2010, pp. 281287.Google ScholarGoogle Scholar
  11. [11] Husted N. and Myers S., “Mobile location tracking in metro areas: Malnets and others,” in Proc. 17th ACM Conf. Comput. Commun. Security (CCS), Chicago, IL, USA: ACM, 2010, pp. 8596.Google ScholarGoogle Scholar
  12. [12] Maier G., Schneider F., and Feldmann A., “A first look at mobile hand-held device traffic,” in Proc. 11th Int. Conf. Passive Active Meas. (PAM), Zürich, Switzerland: Springer, 2010, pp. 161170.Google ScholarGoogle Scholar
  13. [13] Shepard C., Rahmati A., Tossell C., Zhong L., and Kortum P., “LiveLab: Measuring wireless networks and smartphone users in the field,” ACM SIGMETRICS Perform. Eval. Rev., vol. 38, no. 3, pp. 1520, Dec. 2010.Google ScholarGoogle Scholar
  14. [14] Finamore A., Mellia M., Munafò M. M., Torres R., and Rao S. G., “YouTube everywhere: Impact of device and infrastructure synergies on user experience,” in Proc. ACM SIGCOMM Internet Meas. Conf. (IMC), Berlin, Germany: ACM, 2011, pp. 345360.Google ScholarGoogle Scholar
  15. [15] Gember A., Anand A., and Akella A., “A comparative study of handheld and non-handheld traffic in campus Wi-Fi networks,” in Proc. 12th Int. Conf. Passive Active Meas. (PAM), Atlanta, GA, USA: Springer, 2011, pp. 173183.Google ScholarGoogle Scholar
  16. [16] Lee S.-W., Park J.-S., Lee H.-S., and Kim M.-S., “A study on smart-phone traffic analysis,” in Proc. 13th Asia–Pac. Netw. Oper. Manag. Symp. (APNOMS), Taipei, Taiwan: IEEE Commun. Soc., 2011, pp. 177183.Google ScholarGoogle Scholar
  17. [17] Rao A.et al., “Network characteristics of video streaming traffic,” in Proc. 7th Conf. Emerg. Netw. Exp. Technol. (CoNEXT), vol. 25. Tokyo, Japan: ACM, 2011, pp. 112.Google ScholarGoogle Scholar
  18. [18] Baghel S. K., Keshav K., and Manepalli V. R., “An investigation into traffic analysis for diverse data applications on smartphones,” in Proc. 18th Nat. Conf. Commun. (NCC), Kharagpur, India: IEEE Commun. Soc., 2012, pp. 165169.Google ScholarGoogle Scholar
  19. [19] Chen X., Jin R., Suh K., Wang B., and Wei W., “Network performance of smart mobile handhelds in a university campus WiFi network,” in Proc. ACM SIGCOMM Internet Meas. Conf. (IMC), Boston, MA, USA: ACM, 2012, pp. 315328.Google ScholarGoogle Scholar
  20. [20] Ham H.-S. and Choi M.-J., “Application-level traffic analysis of smartphone users using embedded agents,” in Proc. 14th Asia–Pac. Netw. Oper. Manag. Symp. (APNOMS), Seoul, South Korea: IEEE Commun. Soc., 2012, pp. 14.Google ScholarGoogle Scholar
  21. [21] Musa A. B. M. and Eriksson J., “Tracking unmodified smartphones using Wi-Fi monitors,” in Proc. 10th ACM Conf. Embedded Netw. Sensor Syst. (SenSys), Toronto, ON, Canada: ACM, 2012, pp. 281294.Google ScholarGoogle Scholar
  22. [22] Shabtai A., Kanonov U., Elovici Y., Glezer C., and Weiss Y., “‘Andromaly’: A behavioral malware detection framework for Android devices,” J. Intell. Inf. Syst., vol. 38, no. 1, pp. 161190, Feb. 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. [23] Stevens R., Gibler C., Crussell J., Erickson J., and Chen H., “Investigating user privacy in android ad libraries,” in Proc. Workshop Mobile Security Technol. (MoST), 2012, p. 10.Google ScholarGoogle Scholar
  24. [24] Su X., Chuah M. C., and Tan G., “Smartphone dual defense protection framework: Detecting malicious applications in Android markets,” in Proc. 8th Int. Conf. Mobile Ad Hoc Sensor Netw. (MSN), Chengdu, China: IEEE Comput. Soc., 2012, pp. 153160.Google ScholarGoogle Scholar
  25. [25] Wei T.-E.et al., “Android malware detection via a latent network behavior analysis,” in Proc. 11th IEEE Int. Conf. Trust Security Privacy Comput. Commun. (TrustCom), Liverpool, U.K.: IEEE Comput. Soc., 2012, pp. 12511258.Google ScholarGoogle Scholar
  26. [26] Barbera M. V., Epasto A., Mei A., Perta V. C., and Stefa J., “Signals from the crowd: Uncovering social relationships through smartphone probes,” in Proc. ACM SIGCOMM Internet Meas. Conf. (IMC), Barcelona, Spain: ACM, 2013, pp. 265276.Google ScholarGoogle Scholar
  27. [27] Kuzuno H. and Tonami S., “Signature generation for sensitive information leakage in Android applications,” in Proc. 29th IEEE Int. Conf. Data Eng. (ICDE), Brisbane, QLD, Australia: IEEE Comput. Soc., 2013, pp. 112119.Google ScholarGoogle Scholar
  28. [28] Qazi Z. A.et al., “Application-awareness in SDN,” in Proc. Annu. Conf. ACM Special Interest Group Data Commun. (SIGCOMM), Hong Kong: ACM, 2013, pp. 487488.Google ScholarGoogle Scholar
  29. [29] Rao A.et al., “Using the middle to meddle with mobile,” College Comput. Inf. Sci., Northeastern Univ., Boston, MA, USA, Rep. NEUCCS-2013-12-10, Dec. 2013.Google ScholarGoogle Scholar
  30. [30] Watkins L., Corbett C., Salazar B., Fairbanks K., and Robinson W. H., “Using network traffic to remotely identify the type of applications executing on mobile devices,” in Proc. 2nd Workshop Mobile Security Technol. (MoST), San Francisco, CA, USA: IEEE Comput. Soc., 2013.Google ScholarGoogle Scholar
  31. [31] Chen Y.-C., Liao Y., Baldi M., Lee S.-J., and Qiu L., “OS fingerprinting and tethering detection in mobile networks,” in Proc. ACM SIGCOMM Internet Meas. Conf. (IMC), Vancouver, BC, Canada: ACM, 2014, pp. 173180.Google ScholarGoogle Scholar
  32. [32] Coull S. E. and Dyer K. P., “Traffic analysis of encrypted messaging services: Apple iMessage and beyond,” ACM SIGCOMM Comput. Commun. Rev., vol. 44, no. 5, pp. 511, Oct. 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. [33] Crussell J., Stevens R., and Chen H., “MAdFraud: Investigating ad fraud in Android applications,” in Proc. 12th Annu. Int. Conf. Mobile Syst. Appl. Services (MobiSys), Bretton Woods, NH, USA: ACM, 2014, pp. 123134.Google ScholarGoogle Scholar
  34. [34] Lindorfer M.et al., “ANDRUBIS—1,000,000 apps later: A view on current Android malware behaviors,” in Proc. 3rd Int. Workshop Build. Anal. Datasets Gathering Exp. Returns Security (BADGERS), Wrocław, Poland: IEEE Comput. Soc., 2014, pp. 317.Google ScholarGoogle Scholar
  35. [35] Shabtai A.et al., “Mobile malware detection through analysis of deviations in application network behavior,” Comput. Security, vol. 43, pp. 118, Jun. 2014.Google ScholarGoogle ScholarCross RefCross Ref
  36. [36] Verde N. V., Ateniese G., Gabrielli E., Mancini L. V., and Spognardi A., “No NAT’d user left behind: Fingerprinting users behind NAT from NetFlow records alone,” in Proc. 34th IEEE Int. Conf. Distrib. Comput. Syst. (ICDCS), Madrid, Spain: IEEE Comput. Soc., 2014, pp. 218227.Google ScholarGoogle Scholar
  37. [37] Chen Z.et al., “A first look at Android malware traffic in first few minutes,” in Proc. IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland: IEEE Comput. Soc., 2015, pp. 206213.Google ScholarGoogle Scholar
  38. [38] Fukuda K., Asai H., and Nagami K., “Tracking the evolution and diversity in network usage of smartphones,” in Proc. ACM SIGCOMM Internet Meas. Conf. (IMC), Tokyo, Japan: ACM, 2015, pp. 253266.Google ScholarGoogle Scholar
  39. [39] Park K. and Kim H., “Encryption is not enough: Inferring user activities on KakaoTalk with traffic analysis,” in Proc. 16th Int. Workshop Inf. Security Appl. (WISA), Cham, Switzerland: Springer, 2015, pp. 254265.Google ScholarGoogle Scholar
  40. [40] Soikkeli T. and Riikonen A., “Session level network usage patterns of mobile handsets,” in Proc. 13th Int. Conf. Telecommun. (ConTEL), Graz, Austria: IEEE Commun. Soc., 2015, pp. 309316.Google ScholarGoogle Scholar
  41. [41] Song Y. and Hengartner U., “PrivacyGuard: A VPN-based platform to detect information leakage on Android devices,” in Proc. 5th Annu. CM CCS Workshop Security Privacy Smartphones Mobile Devices (SPSM), Denver, CO, USA: ACM, 2015, pp. 1526.Google ScholarGoogle Scholar
  42. [42] Wang Q., Yahyavi A., Kemme B., and He W., “I know what you did on your smartphone: Inferring app usage over encrypted data traffic,” in Proc. IEEE Conf. Commun. Netw. Security (CNS), Florence, Italy: IEEE Commun. Soc., 2015, pp. 433441.Google ScholarGoogle Scholar
  43. [43] Yao H., Ranjan G., Tongaonkar A., Liao Y., and Mao Z. M., “SAMPLES: Self adaptive mining of persistent LExical snippets for classifying mobile application traffic,” in Proc. 21st Annu. Int. Conf. Mobile Comput. Netw. (MobiCom), Paris, France: ACM, 2015, pp. 439451.Google ScholarGoogle Scholar
  44. [44] Zaman M., Siddiqui T., Amin M. R., and Hossain M. S., “Malware detection in Android by network traffic analysis,” in Proc. 1st Int. Conf. Netw. Syst. Security (NSysS), Dhaka, Bangladesh: IEEE Bangladesh Section, 2015, pp. 15.Google ScholarGoogle Scholar
  45. [45] Conti M., Mancini L. V., Spolaor R., and Verde N. V., “Analyzing Android encrypted network traffic to identify user actions,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 1, pp. 114125, Jan. 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. [46] Fu Y., Xiong H., Lu X., Yang J., and Chen C., “Service usage classification with encrypted Internet traffic in mobile messaging apps,” IEEE Trans. Mobile Comput., vol. 15, no. 11, pp. 28512864, Nov. 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. [47] Mongkolluksamee S., Visoottiviseth V., and Fukuda K., “Combining communication patterns & traffic patterns to enhance mobile traffic identification performance,” J. Inf. Process., vol. 24, no. 2, pp. 247254, Mar. 2016.Google ScholarGoogle Scholar
  48. [48] Narudin F. A., Feizollah A., Anuar N. B., and Gani A., “Evaluation of machine learning classifiers for mobile malware detection,” Soft Comput., vol. 20, no. 1, pp. 343357, Jan. 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. [49] Nayam W., Laolee A., Charoenwatana L., and Sripanidkulchai K., “An analysis of mobile application network behavior,” in Proc. 12th Asian Internet Eng. Conf. (AINTEC), Bangkok, Thailand: ACM, 2016, pp. 916.Google ScholarGoogle Scholar
  50. [50] Ren J., Rao A., Lindorfer M., Legout A., and Choffnes D., “ReCon: Revealing and controlling PII leaks in mobile network traffic,” in Proc. 14th Annu. Int. Conf. Mobile Syst. Appl. Services (MobiSys), Singapore: ACM, 2016, pp. 361374.Google ScholarGoogle Scholar
  51. [51] Ruffing N., Zhu Y., Libertini R., Guan Y., and Bettati R., “Smartphone reconnaissance: Operating system identification,” in Proc. 13th IEEE Annu. Consum. Commun. Netw. Conf. (CCNC), Las Vegas, NV, USA: IEEE Commun. Soc., 2016, pp. 10861091.Google ScholarGoogle Scholar
  52. [52] Saltaformaggio B.et al., “Eavesdropping on fine-grained user activities within smartphone apps over encrypted network traffic,” in Proc. 10th USENIX Workshop Offensive Technol. (WOOT), Austin, TX, USA: USENIX Assoc., 2016, pp. 6978.Google ScholarGoogle Scholar
  53. [53] Spreitzer R., Griesmayr S., Korak T., and Mangard S., “Exploiting data-usage statistics for website fingerprinting attacks on Android,” in Proc. 9th ACM Conf. Security Privacy Wireless Mobile Netw. (WiSec), Darmstadt, Germany: ACM, 2016, pp. 4960.Google ScholarGoogle Scholar
  54. [54] Vanrykel E., Acar G., Herrmann M., and Diaz C., “Leaky birds: Exploiting mobile application traffic for surveillance,” in Proc. 20th Int. Conf. Financ. Cryptography Data Security (FC), Heidelberg, Germany: Springer, 2017, pp. 367384.Google ScholarGoogle Scholar
  55. [55] Arora A. and Peddoju S. K., “Minimizing network traffic features for Android mobile malware detection,” in Proc. 18th Int. Conf. Distrib. Comput. Netw. (ICDCN), Hyderabad, India: ACM, 2017, p. 32.Google ScholarGoogle Scholar
  56. [56] Chen Y.et al., “Mass discovery of Android traffic imprints through instantiated partial execution,” in Proc. ACM SIGSAC Conf. Comput. Commun. Security (CCS), ACM, 2017, pp. 815828.Google ScholarGoogle Scholar
  57. [57] Cheng Z., Chen X., Zhang Y., Li S., and Sang Y., “Detecting information theft based on mobile network flows for Android users,” in Proc. Int. Conf. Netw. Archit. Storage (NAS), IEEE, 2017, pp. 110.Google ScholarGoogle Scholar
  58. [58] Continella A.et al., “Obfuscation-resilient privacy leak detection for mobile apps through differential analysis,” in Proc. Netw. Distrib. Syst. Security Symp. (NDSS), San Diego, CA, USA: Internet Soc., 2017, pp. 116.Google ScholarGoogle Scholar
  59. [59] Espada A. R., Gallardo M. D. M., Salmerón A., and Merino P., “Performance analysis of Spotify® for Android with model-based testing,” Mobile Inf. Syst., vol. 2017, p. 14, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  60. [60] Malik N.et al., “Using network traffic to verify mobile device forensic artifacts,” in Proc. 14th IEEE Annu. Consumer Commun. Netw. Conf. (CCNC), Las Vegas, NV, USA: IEEE Commun. Soc., 2017, pp. 114119.Google ScholarGoogle Scholar
  61. [61] Taylor V. F., Spolaor R., Conti M., and Martinovic I., “Robust smartphone app identification via encrypted network traffic analysis,” IEEE Trans. Inf. Forensics Security, vol. 13, no. 1, pp. 6378, Jan. 2018.Google ScholarGoogle ScholarCross RefCross Ref
  62. [62] Wei X., Valler N. C., Madhyastha H. V., Neamtiu I., and Faloutsos M., “Characterizing the behavior of handheld devices and its implications,” Comput. Netw., vol. 114, pp. 112, Feb. 2017.Google ScholarGoogle ScholarCross RefCross Ref
  63. [63] Seneviratne S., Seneviratne A., Mohapatra P., and Mahanti A., “Predicting user traits from a snapshot of apps installed on a smartphone,” SIGMOBILE Mob. Comput. Commun. Rev., vol. 18, no. 2, pp. 18, Jun. 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. [64] Mongkolluksamee S., Visoottiviseth V., and Fukuda K., “Enhancing the performance of mobile traffic identification with communication patterns,” in Proc. IEEE 39th Annu. Comput. Softw. Appl. Conf. (COMPSAC), Taichung, Taiwan: IEEE Comput. Soc., 2015, pp. 336345.Google ScholarGoogle Scholar
  65. [65] Taylor V. F., Spolaor R., Conti M., and Martinovic I., “AppScanner: Automatic fingerprinting of smartphone apps from encrypted network traffic,” in Proc. 1st IEEE Eur. Symp. Security Privacy (EuroS&P), Saarbrücken, Germany: IEEE Comput. Soc., 2016, pp. 439454.Google ScholarGoogle Scholar
  66. [66] Enck W.et al., “TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones,” in Proc. 9th USENIX Symp. Oper. Syst. Design Implement. (OSDI), Vancouver, BC, Canada: USENIX Assoc., 2010, pp. 393407.Google ScholarGoogle Scholar
  67. [67] Arora A., Garg S., and Peddoju S. K., “Malware detection using network traffic analysis in Android based mobile devices,” in Proc. 8th Int. Conf. Next Gener. Mobile Apps Services Technol. (NGMAST), Oxford, U.K.: IEEE Comput. Soc., 2014, pp. 6671.Google ScholarGoogle Scholar
  68. [68] Liberatore M. and Levine B. N., “Inferring the source of encrypted HTTP connections,” in Proc. 13th ACM Conf. Comput. Commun. Security (CCS), Alexandria, VA, USA: ACM, 2006, pp. 255263.Google ScholarGoogle Scholar
  69. [69] Herrmann D., Wendolsky R., and Federrath H., “Website fingerprinting: Attacking popular privacy enhancing technologies with the multinomial naïve–Bayes classifier,” in Proc. ACM Workshop Cloud Comput. Security (CCSW), Chicago, IL, USA: ACM, 2009, pp. 3142.Google ScholarGoogle Scholar
  70. [70] Panchenko A., Niessen L., Zinnen A., and Engel T., “Website fingerprinting in onion routing based anonymization networks,” in Proc. 10th Annu. ACM Workshop Privacy Electron. Soc. (WPES), Chicago, IL, USA: ACM, 2011, pp. 103114.Google ScholarGoogle Scholar
  71. [71] Spolaor R., Santo E. D., and Conti M., “DELTA: Data extraction and logging tool for android,” IEEE Trans. Mobile Comput., vol. 17, no. 6, pp. 12891302, Jun. 2018.Google ScholarGoogle ScholarCross RefCross Ref
  72. [72] Statista. (Nov. 2016). Mobile Operating Systems’ Market Share Worldwide From January 2012 to June 2016. Accessed: Mar. 15, 2018. [Online]. Available: https://www.statista.com/statistics/272698/global-market-share-held-by-mobile-operating-systems-since-2009/Google ScholarGoogle Scholar
  73. [73] AppBrain. (Mar. 2018). Number of Android Applications. Accessed: Mar. 15, 2018. [Online]. Available: http://www.appbrain.com/statsGoogle ScholarGoogle Scholar
  74. [74] Statista. (Nov. 2016). Number of Available Apps in the Apple App Store From July 2008 to June 2016. Accessed: Mar. 15, 2018. [Online]. Available: https://www.statista.com/statistics/263795/number-of-available-apps-in-the-apple-app-store/Google ScholarGoogle Scholar
  75. [75] Hamilton J. D., Time Series Analysis, vol. 2. Princeton, NJ, USA: Princeton Univ. Press, 1994.Google ScholarGoogle ScholarCross RefCross Ref
  76. [76] Fisher R. A., Statistical Methods for Research Workers. Guildford, U.K.: Genesis, 1925.Google ScholarGoogle Scholar
  77. [77] Dunteman G. H., Principal Components Analysis. Newbury Park, CA, USA: Sage, 1989.Google ScholarGoogle ScholarCross RefCross Ref
  78. [78] Iversen G. R. and Norpoth H., Analysis of Variance. Newbury Park, CA, USA: Sage, 1987.Google ScholarGoogle Scholar
  79. [79] Peng H., Long F., and Ding C., “Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 27, no. 8, pp. 12261238, Aug. 2005.Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. [80] Müller M., “Dynamic time warping,” in Information Retrieval for Music and Motion. Berlin, Germany: Springer, 2007, pp. 6984.Google ScholarGoogle Scholar
  81. [81] Real R. and Vargas J. M., “The probabilistic basis of Jaccard’s index of similarity,” Syst. Biol., vol. 45, no. 3, pp. 380385, 1996.Google ScholarGoogle ScholarCross RefCross Ref
  82. [82] Adamic L. A. and Adar E., “Friends and neighbors on the Web,” Soc. Netw., vol. 25, no. 3, pp. 211230, Jul. 2003.Google ScholarGoogle ScholarCross RefCross Ref
  83. [83] Panchenko A.et al., “Website fingerprinting at Internet scale,” in Proc. NDSS, 2016, pp. 115.Google ScholarGoogle Scholar
  84. [84] Dyer K. P., Coull S. E., Ristenpart T., and Shrimpton T., “Peek-a-boo, I still see you: Why efficient traffic analysis countermeasures fail,” in Proc. IEEE Symp. Security Privacy (SP), San Francisco, CA, USA, IEEE, 2012, pp. 332346.Google ScholarGoogle Scholar
  85. [85] Cai X., Nithyanand R., Wang T., Johnson R., and Goldberg I., “A systematic approach to developing and evaluating website fingerprinting defenses,” in Proc. ACM SIGSAC Conf. Comput. Commun. Security, ACM, 2014, pp. 227238.Google ScholarGoogle Scholar
  86. [86] Wang T. and Goldberg I., “Walkie-talkie: An efficient defense against passive website fingerprinting attacks,” in Proc. 26th USENIX Security Symp. (USENIX Security), 2017, pp. 13751390.Google ScholarGoogle Scholar
  87. [87] Wright C. V., Coull S. E., and Monrose F., “Traffic morphing: An efficient defense against statistical traffic analysis,” in Proc. NDSS, vol. 9, 2009, pp. 237250.Google ScholarGoogle Scholar
  88. [88] Nithyanand R., Cai X., and Johnson R., “Glove: A bespoke website fingerprinting defense,” in Proc. 13th Workshop Privacy Electron. Soc. (WPES), ACM, 2014, pp. 131134.Google ScholarGoogle Scholar
  89. [89] AppBrain. (Jul. 2013). Network Log. Accessed: Mar. 15, 2018. [Online]. Available: https://github.com/pragma-/networklogGoogle ScholarGoogle Scholar
  90. [90] Bordoni L., Conti M., and Spolaor R., “Mirage: Toward a stealthier and modular malware analysis sandbox for android,” in Proc. Eur. Symp. Res. Comput. Security, Springer, 2017, pp. 278296.Google ScholarGoogle Scholar

Index Terms

  1. The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image IEEE Communications Surveys & Tutorials
            IEEE Communications Surveys & Tutorials  Volume 20, Issue 4
            Fourthquarter 2018
            1091 pages

            1553-877X © 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

            Publisher

            IEEE Press

            Publication History

            • Published: 1 October 2018

            Qualifiers

            • research-article