Skip to main content

Smartphone Application Identification by Convolutional Neural Network

  • Conference paper
  • First Online:
Machine Learning and Intelligent Communications (MLICOM 2018)

Abstract

Mobile traffic has received much attention within the field of network security and management due to the rapid development of mobile networks. Unlike fixed wired workstation traffic, mobile traffic is mostly carried over HTTP/HTTPS, which brings new challenges to traditional traffic identification methods. Although there have been some attempts to address this problem with side-channel traffic information and machine learning, the effectiveness of these methods majorly depends on predefined statistics features. In this paper, we presented an approach based on convolutional neural network without explicit feature extraction process. And owing to no payload inspection requirement, this method also works well even encrypted traffic appears. Six instant message applications are used to verify our approach. The evaluation shows the proposed approach can achieve more than 96% accuracy. Additionally, we also discussed how this approach performed under real-world conditions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mobile Marketing Statistics compilation. https://www.smartinsights.com/mobile-marketin…g/mobile-marketing-analytics/mobile-marketing-statistics/

  2. The 40th China Statistical Report on Internet Development. http://cnnic.cn/hlwfzyj/hlwxzbg/hlwtjbg/201708/P020170807351923262153.pdf

  3. Gerard, D., Arash, L., Mamun, M., Ali, G.: Characterization of encrypted and VPN traffic using time-related features. In: The International Conference on Information Systems Security and Privacy, Italy, pp. 94–98 (2016)

    Google Scholar 

  4. Zhang, J., Chen, X., Xiang, Y., Zhou, W.-L., Wu, J.: Robust network traffic classification. J. IEEE/ACM Trans. Netw. 23(4), 1257–1270 (2015)

    Article  Google Scholar 

  5. Taylor, V., Spolaor, R., Conti, M., Martinovic, I.: AppScanner: automatic fingerprinting of smartphone apps from encrypted network traffic. In: IEEE Symposium on Security and Privacy, pp. 439–454 (2016)

    Google Scholar 

  6. Xu, Q., Ermanet, J., Gerber, A., Mao, Z., Pang, J., Venkaraeaman, S.: Identifying diverse usage behaviors of smartphone apps. In: Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, Berlin, pp. 329–344 (2011)

    Google Scholar 

  7. Dai, S.-F., Tongaonkar, A., Wang, X.-Y., Nucci, A., Song, D.: NetworkProfiler: towards automatic fingerprinting of Android apps. In: Proceeding IEEE INFOCOM, Italy, pp. 809–817 (2013)

    Google Scholar 

  8. Miskovic, S., Lee, G.M., Liao, Y., Baldi, M.: AppPrint: automatic fingerprinting of mobile applications in network traffic. In: Mirkovic, J., Liu, Y. (eds.) PAM 2015. LNCS, vol. 8995, pp. 57–69. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-15509-8_5

    Chapter  Google Scholar 

  9. Wang Q.-L., Yahyavi, A., Kemme, B., He, W.-B.: I know what you did on your smartphone: inferring app usage over encrypted data traffic. In: Communications and Networking Symposium, pp. 433–441 (2015)

    Google Scholar 

  10. Taylor, V., Spolaor, R., Conti, M., Martinovic, I.: Robust smartphone app identification via encrypted network traffic analysis. J IEEE Trans. Inf. Forensics Secur. 13, 63–78 (2018)

    Article  Google Scholar 

  11. Alan, F., Kaur, J.: Can android applications be identified using only TCP/IP headers of their launch time traffic? In: Wireless Network Security, pp. 61–66 (2016)

    Google Scholar 

  12. Chen, Z.-Y., Yu, B.-W., Zhang, Y., Zhang, J.-Z., Xu, J.-D.: Automatic mobile application traffic identification by convolutional neural networks. In: Trustcom/bigdatase/ispa, pp. 301–307(2017)

    Google Scholar 

  13. Lotfollahi, M., Zade, R., Siavoshani, M., Saberian, M.: Deep Packet: A Novel Approach for Encrypted Traffic Classification Using Deep Learning. arXiv (2017)

    Google Scholar 

  14. Wang, W., Zhu, M., Wang, J.-L., Zeng, X.-W., Yang, Z.-Z.: End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: IEEE International Conference on Intelligence & Security Informatics, pp. 43–48. IEEE Press, Beijing (2017)

    Google Scholar 

  15. Wang, W., Zhu, M., Zeng, X.-W., Ye, X.-Z., Sheng, Y.-Q.: Malware traffic classification using convolutional neural network for representation learning. In: 2017 International Conference on Information Networking, pp. 712–717. IEEE Press, Da Nang (2017)

    Google Scholar 

  16. TPacketCapture. https://play.google.com/store/apps/details?id=jp.co.taosoftware.android. Packetcapture

  17. Pragmatic Software, Network Log. https://play.google.com/store/apps/details?id=com.googlecode.networklog

  18. Keras: The Python Deep Learning library. https://keras.io/

  19. Weka 3: Data Mining Software in Java. https://www.cs.waikato.ac.nz/ml/weka/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shuang Zhao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhao, S., Chen, S. (2018). Smartphone Application Identification by Convolutional Neural Network. In: Meng, L., Zhang, Y. (eds) Machine Learning and Intelligent Communications. MLICOM 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 251. Springer, Cham. https://doi.org/10.1007/978-3-030-00557-3_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00557-3_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00556-6

  • Online ISBN: 978-3-030-00557-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics