Skip to main content

Smartphone Traffic Analysis: A Contemporary Survey of the State-of-the-Art

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1262))

Abstract

In today’s era, speedy growth in the popularity of smartphone have been witnessed, emerging it as a popular sophisticated smart computing device. It has also become an integral part of large number of people from all corners of the world. Traditional communication activities such as text messages and voice calls are no longer the only benefits of these mobile devices. Smartphones are available in the market offering plenty of advanced functionalities made available with the help of enormous multipurpose apps (e.g. e-commerce, gaming, emails, social communication, internet and many more). As a result, the massive adoption of smartphones generates a significant mobile network traffic that amounts to a critical share of whole internet traffic. Due to the network traffic generated via smartphone, many researchers are continuously investigating the privacy and security issues emerging with it, which can be analyzed to gather info that can be used for different goals extending from user behaviour analysis and system identification to malware detection. In this paper, we have reviewed the work associated with network traffic monitoring of smartphones. Particularly, we have provided an insight into the aim of the analysis, the most popular smartphone platforms and methods that exploit network traffic to detect vulnerabilities in smartphone. In this survey, a comparison of the different frameworks and methods proposed by researchers ranging from 2014, to till date has been carried out. This survey paper can be used as a reference for more research related to this field.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Statista (2019) Smartphone users worldwide 2016–2021, Oct 2019. https://www.statista.com/statistics/330695/number-of-smartphone-users-worldwide/. Visited on 29 Oct 2019

  2. GSMA real-time intelligence (2019) Intelligence 2019, current year-end data except interpolated subscribers and connections. https://www.gsmaintelligence.com/. Visited on 30 Oct 2019

  3. Ericsson (2019) Ericsson Mobility Report, June 2019. https://www.ericsson.com/49d1d9/assets/local/mobility-report/documents/2019/ericsson-mobility-report-june-2019.pdf. Visited on 28 Oct 2019

  4. Conti M, Li Q, Maragno A, Spolaor R (2018) The Dark Side(-Channel) of mobile devices: a survey on network traffic analysis. In: IEEE communications surveys & tutorials

    Google Scholar 

  5. Naboulsi D, Fiore M, Ribot S, Stanica R (2016) Large-scale mobile traffic analysis: a survey. IEEE Commun Surv Tutor 18(1):124–161

    Article  Google Scholar 

  6. Smartphone Market Share (2019) Oct. https://www.idc.com/promo/smartphone-market-share/os. Visited on 2 Nov 2019

  7. Android (operating system) (2019). https://en.wikipedia.org/wiki/Android_(operating_system). Visited on 1 Nov 2019

  8. Chen Z et al (2015) A first look at android malware traffic in first few minutes. In: IEEE Trustcom/BigDataSE/ISPA, pp 206–213

    Google Scholar 

  9. Nayam W, Laolee A, Charoenwatana L, Sripanidkulchai K (2016) An analysis of mobile application network behaviour. In: 12th Asian internet engineering conference, pp 9–16

    Google Scholar 

  10. Tadrous J, Sabharwal A (2016) Interactive app traffic: an actionbased model and data-driven analysis. In: 14th international symposium on modeling and optimization in mobile, ad hoc, and wireless networks, pp 187–194

    Google Scholar 

  11. Espada AR et al (2017) Performance analysis of spotify for android with model-basedtesting. Mob Inf Syst

    Google Scholar 

  12. Lindorfer M, Neugschwandtner M, Weichselbaum et al (2014) ANDRUBIS—1,000,000 apps later: a view on current Android malware behaviours. In: 3rd international workshop on building analysis datasets and gathering experience returns for security, pp 3–17

    Google Scholar 

  13. Fukuda K, Asai H, Nagami K (2015) Tracking the evolution and diversity in network usage of smartphones. In: ACM SIGCOMM internet measurement conference, pp 253–266

    Google Scholar 

  14. Wang S, Chen Z, Zhang L et al (2016) TrafficAV: an effective and explainable detection of mobile malware behaviour using network traffic. In: IEEE/ACM 24th international symposium on quality of service (IWQoS)

    Google Scholar 

  15. Zaman M, Siddiqui T, Amin M, Hossain Md (2015) Malware detection in android by network traffic analysis. In: International conference on networking systems and security (NSysS), pp 183–187

    Google Scholar 

  16. Arora A, Peddoju S (2017) Minimizing network traffic features for android mobile malware detection. In: ICDCN

    Google Scholar 

  17. Narudin FA, Feizollah A, Anuar NB, Gani A (2016) Evaluation of machine learning classifiers for mobile malware detection. Soft Comput 20(1):343–357 (Jan)

    Article  Google Scholar 

  18. Ruffing N, Zhu Y, Libertini R, Guan Y, Bettati R (2016) Smartphone reconnaissance: operating system identification. In: 13th IEEE annual consumer communications and networking conference, pp 1086–1091

    Google Scholar 

  19. Malik N, Chandramouli J, Suresh P, Fairbanks K, Watkins L, Robinson WH (2017) Using network traffic to verify mobile device forensic artifacts. In: 14th IEEE annual consumer communications and networking conference, pp 114–119

    Google Scholar 

  20. iOS (2019). https://en.wikipedia.org/wiki/IOS. Visited on 2 Nov 2019

  21. Rao V, Hande K (2017) A comparative study of static, dynamic and hybrid analysis techniques for android malware detection. Int J Eng Dev Res (IJEDR) 5(2)

    Google Scholar 

  22. Saltaformaggio B, Choi H, Johnson K, Kwon Y et al (2016) Eavesdropping on fine-grained user activities within smartphone apps over encrypted network traffic. In: 10th USENIX workshop on offensive technologies, pp 69–78

    Google Scholar 

  23. Vanrykel E, Acar G, Herrmann M, Diaz C (2017) Leaky birds: exploiting mobile application traffic for surveillance. In: 20th international conference on financial cryptography and data security, pp 367–384

    Google Scholar 

  24. Spreitzer R, Griesmayr S, Korak T, Mangard S (2016) Exploiting data-usage statistics for website fingerprinting attacks on Android. In: 9th ACM conference on security and privacy in wireless and mobile networks, pp 49–60

    Google Scholar 

  25. Mongkollluksamee S, Visoottivisetg V, Fukuda K (2016) Combining communication patterns & traffic patterns to enhance mobile traffic identification performance. J Inf Process 24(2):247–254 (Mar)

    Google Scholar 

  26. Taylor VF, Spolaor R, Conti M, Martinovic I (2018) Robust smartphone app identification via encrypted network traffic analysis. IEEE Trans Inf Forensics Secur 13(1):63–78 (Jan)

    Article  Google Scholar 

  27. Yuankun H et al (2019) Identification of VoIP speech with multiple domain deep features. IEEE Trans Inf Forens Secur 1556–6013

    Google Scholar 

  28. Giuseppe A et al (2019) Mobile encrypted traffic classification using deep learning: experimental evaluation, lessons learned, and challenges. IEEE Trans Netw Serv Manag 16(2), June

    Google Scholar 

  29. Coull SE, Dyer KP (2014) Traffic analysis of encrypted messaging services: Apple iMessage and beyond. ACM SIGCOMM Comput Commun Rev 44(5):5–11

    Article  Google Scholar 

  30. Song Y, Hengartner U (2015) PrivacyGuard: a VPN-based platform to detect information leakage on Android devices. In: 5th annual ACM CCS workshop on security and privacy in smartphones and mobile devices, pp 15–26

    Google Scholar 

  31. Su X, Chuah MC, Tan G (2012) Smartphone dual defense protection framework: detecting malicious applications in Android markets. In: Proceedings of the 8th international conference on mobile ad-hoc and sensor networks, ser. MSN 2012. Washington, District of Columbia, USA: IEEE Computer Society, 2012, pp 153–160

    Google Scholar 

  32. Shabtai A, Chekina L et al (2014) Mobile malware detection through analysis of deviations in application network behaviour. Comput Secur 43:1–18

    Article  Google Scholar 

  33. Esmaeili S, Shahriari H (2019) PodBot: a new botnet detection method by host and network- based analysis. In: 27th Iranian conference on electrical engineering (ICEE 2019), pp 1900–1904

    Google Scholar 

  34. Zulkifli A et al (2018) Android malware detection based on network traffic using decision tree algorithm. In: Recent advances on soft computing and data mining, pp 485–494

    Google Scholar 

  35. Arora A, Peddoju S (2018) NTPDroid: a hybrid android malware detector using network traffic and system permissions. In: 12th IEEE international conference on big data science and engineering

    Google Scholar 

  36. Zhou Y, Jiang X (2012) Dissecting Android malware: characterization and evolution. In: Proceedings of the IEEE symposium on security and privacy, pp 95–109

    Google Scholar 

  37. Wei S, Jiang P, YuanQ, Wang J (2018) Mobile application network behaviour detection and evaluation with WGAN and Bi-LSTM. In: Proceedings of TENCON 2018 - 2018 IEEE region 10 conference, pp 44–49

    Google Scholar 

  38. Wang S et al (2018) Detecting android malware leveraging text semantics of network flows. IEEE Trans Inf Forens Secur 13(5):1096–1109

    Article  Google Scholar 

  39. VirusShare.Com. https://virusshare.com/

  40. Baidu Mobile Assistant. https://shouji.baidu.com/

  41. Kandukuru S, Sharma RM (2017) Android malicious application detection using permission vector and network traffic analysis. In: 2nd international conference for convergence in technology (I2CT), pp 1126–1132

    Google Scholar 

  42. Google play store (2018) https://play.google.com/store

  43. Cam N et al (2017) NeSeDroid- android malware detection based on network traffic and sensitive resource accessing. In: Proceedings of the international conference on data engineering and communication technology, pp 19–30

    Google Scholar 

  44. Lashkari AH et al (2017) Towards a network-based framework for android malware detection and characterization. In: 15th annual conference on privacy, security and trust, pp 233–242

    Google Scholar 

  45. Pang et al (2017) Finding android malware trace from highly imbalanced network traffic. In: IEEE international conference on CSE and IEEE international conference on EUC, pp 588–595

    Google Scholar 

  46. Arp D, Spreitzenbarth M, Hubner M, Gascon H, Rieck K (2014) Drebin: effective and explainable detection of Android malware in your pocket. In: NDSS

    Google Scholar 

  47. Arora A, Garg S, Peddoju S (2014) Malware detection using network traffic analysis in android based mobile devices. In: 8th international conference on next generation mobile apps, services and technologies, pp 66–71

    Google Scholar 

  48. Feizollah A, Anuar N, Salleh R, Amalina F (2014) Comparative study of K-means and mini batch K-means clustering algorithms in android malware detection using network traffic analysis. In: International symposium on biometrics and security technologies (ISBAST), pp 193–197

    Google Scholar 

  49. Li J, Zhai L, Zhang X, Quan D (2014) Research of android malware detection based on network traffic monitoring. In: 9th IEEE conference on industrial electronics and applications, pp 1739–1744

    Google Scholar 

  50. Cheng Z et al (2017) Detecting information theft based on mobile network flows for android users. In: International conference on networking, architecture, and storage (NAS), Aug

    Google Scholar 

  51. Watkins L, Kalathummarath A, Robinson W (2018) Network-based detection of mobile malware exhibiting obfuscated or silent network behaviour. In: 15th IEEE annual consumer communications & networking conference (CCNC)

    Google Scholar 

  52. Wang S et al (2018) Deep and broad learning based detection of android malware via network traffic. In: IEEE/ACM 26th international symposium on quality of service (IWQoS), June

    Google Scholar 

  53. Nancy SD (2016) Android malware detection using decision trees and network traffic. Int J Comput Sci Inf Technol 7(4):1970–1974

    Google Scholar 

  54. Khatri V, Abendroth J (2015) Mobile Guard demo network based malware detection. In: IEEE Trustcom/BigDataSE/ISPA, pp 1177–1179

    Google Scholar 

  55. Wei S, Wu G, Zhou Z, Yang L (2015) Mining network traffic for application category recognition on android platform. In: IEEE international conference on progress in informatics and computing (PIC), pp 409–413

    Google Scholar 

  56. Anran L et al (2018) A fast and effective detection of mobile malware behavior using network traffic. Springer Nature Switzerland AG, pp 109–120

    Google Scholar 

  57. Xinyue Het al (2019) Fuzzing the android applications with HTTP/HTTPS network data. IEEE Access 7: 2169–3536

    Google Scholar 

  58. Shanshan W et al (2019) Deep and broad URL feature mining for android malware detection. Information Sciences, Elsevier, November

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sumit Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumar, S., Indu, S., Walia, G.S. (2021). Smartphone Traffic Analysis: A Contemporary Survey of the State-of-the-Art. In: Giri, D., Buyya, R., Ponnusamy, S., De, D., Adamatzky, A., Abawajy, J.H. (eds) Proceedings of the Sixth International Conference on Mathematics and Computing. Advances in Intelligent Systems and Computing, vol 1262. Springer, Singapore. https://doi.org/10.1007/978-981-15-8061-1_26

Download citation

Publish with us

Policies and ethics