Abstract
Mobile traffic has received much attention within the field of network security and management due to the rapid development of mobile networks. Unlike fixed wired workstation traffic, mobile traffic is mostly carried over HTTP/HTTPS, which brings new challenges to traditional traffic identification methods. Although there have been some attempts to address this problem with side-channel traffic information and machine learning, the effectiveness of these methods majorly depends on predefined statistics features. In this paper, we presented an approach based on convolutional neural network without explicit feature extraction process. And owing to no payload inspection requirement, this method also works well even encrypted traffic appears. Six instant message applications are used to verify our approach. The evaluation shows the proposed approach can achieve more than 96% accuracy. Additionally, we also discussed how this approach performed under real-world conditions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mobile Marketing Statistics compilation. https://www.smartinsights.com/mobile-marketin…g/mobile-marketing-analytics/mobile-marketing-statistics/
The 40th China Statistical Report on Internet Development. http://cnnic.cn/hlwfzyj/hlwxzbg/hlwtjbg/201708/P020170807351923262153.pdf
Gerard, D., Arash, L., Mamun, M., Ali, G.: Characterization of encrypted and VPN traffic using time-related features. In: The International Conference on Information Systems Security and Privacy, Italy, pp. 94–98 (2016)
Zhang, J., Chen, X., Xiang, Y., Zhou, W.-L., Wu, J.: Robust network traffic classification. J. IEEE/ACM Trans. Netw. 23(4), 1257–1270 (2015)
Taylor, V., Spolaor, R., Conti, M., Martinovic, I.: AppScanner: automatic fingerprinting of smartphone apps from encrypted network traffic. In: IEEE Symposium on Security and Privacy, pp. 439–454 (2016)
Xu, Q., Ermanet, J., Gerber, A., Mao, Z., Pang, J., Venkaraeaman, S.: Identifying diverse usage behaviors of smartphone apps. In: Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, Berlin, pp. 329–344 (2011)
Dai, S.-F., Tongaonkar, A., Wang, X.-Y., Nucci, A., Song, D.: NetworkProfiler: towards automatic fingerprinting of Android apps. In: Proceeding IEEE INFOCOM, Italy, pp. 809–817 (2013)
Miskovic, S., Lee, G.M., Liao, Y., Baldi, M.: AppPrint: automatic fingerprinting of mobile applications in network traffic. In: Mirkovic, J., Liu, Y. (eds.) PAM 2015. LNCS, vol. 8995, pp. 57–69. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-15509-8_5
Wang Q.-L., Yahyavi, A., Kemme, B., He, W.-B.: I know what you did on your smartphone: inferring app usage over encrypted data traffic. In: Communications and Networking Symposium, pp. 433–441 (2015)
Taylor, V., Spolaor, R., Conti, M., Martinovic, I.: Robust smartphone app identification via encrypted network traffic analysis. J IEEE Trans. Inf. Forensics Secur. 13, 63–78 (2018)
Alan, F., Kaur, J.: Can android applications be identified using only TCP/IP headers of their launch time traffic? In: Wireless Network Security, pp. 61–66 (2016)
Chen, Z.-Y., Yu, B.-W., Zhang, Y., Zhang, J.-Z., Xu, J.-D.: Automatic mobile application traffic identification by convolutional neural networks. In: Trustcom/bigdatase/ispa, pp. 301–307(2017)
Lotfollahi, M., Zade, R., Siavoshani, M., Saberian, M.: Deep Packet: A Novel Approach for Encrypted Traffic Classification Using Deep Learning. arXiv (2017)
Wang, W., Zhu, M., Wang, J.-L., Zeng, X.-W., Yang, Z.-Z.: End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: IEEE International Conference on Intelligence & Security Informatics, pp. 43–48. IEEE Press, Beijing (2017)
Wang, W., Zhu, M., Zeng, X.-W., Ye, X.-Z., Sheng, Y.-Q.: Malware traffic classification using convolutional neural network for representation learning. In: 2017 International Conference on Information Networking, pp. 712–717. IEEE Press, Da Nang (2017)
TPacketCapture. https://play.google.com/store/apps/details?id=jp.co.taosoftware.android. Packetcapture
Pragmatic Software, Network Log. https://play.google.com/store/apps/details?id=com.googlecode.networklog
Keras: The Python Deep Learning library. https://keras.io/
Weka 3: Data Mining Software in Java. https://www.cs.waikato.ac.nz/ml/weka/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Zhao, S., Chen, S. (2018). Smartphone Application Identification by Convolutional Neural Network. In: Meng, L., Zhang, Y. (eds) Machine Learning and Intelligent Communications. MLICOM 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 251. Springer, Cham. https://doi.org/10.1007/978-3-030-00557-3_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-00557-3_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00556-6
Online ISBN: 978-3-030-00557-3
eBook Packages: Computer ScienceComputer Science (R0)