Abstract
In today’s era, speedy growth in the popularity of smartphone have been witnessed, emerging it as a popular sophisticated smart computing device. It has also become an integral part of large number of people from all corners of the world. Traditional communication activities such as text messages and voice calls are no longer the only benefits of these mobile devices. Smartphones are available in the market offering plenty of advanced functionalities made available with the help of enormous multipurpose apps (e.g. e-commerce, gaming, emails, social communication, internet and many more). As a result, the massive adoption of smartphones generates a significant mobile network traffic that amounts to a critical share of whole internet traffic. Due to the network traffic generated via smartphone, many researchers are continuously investigating the privacy and security issues emerging with it, which can be analyzed to gather info that can be used for different goals extending from user behaviour analysis and system identification to malware detection. In this paper, we have reviewed the work associated with network traffic monitoring of smartphones. Particularly, we have provided an insight into the aim of the analysis, the most popular smartphone platforms and methods that exploit network traffic to detect vulnerabilities in smartphone. In this survey, a comparison of the different frameworks and methods proposed by researchers ranging from 2014, to till date has been carried out. This survey paper can be used as a reference for more research related to this field.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Statista (2019) Smartphone users worldwide 2016–2021, Oct 2019. https://www.statista.com/statistics/330695/number-of-smartphone-users-worldwide/. Visited on 29 Oct 2019
GSMA real-time intelligence (2019) Intelligence 2019, current year-end data except interpolated subscribers and connections. https://www.gsmaintelligence.com/. Visited on 30 Oct 2019
Ericsson (2019) Ericsson Mobility Report, June 2019. https://www.ericsson.com/49d1d9/assets/local/mobility-report/documents/2019/ericsson-mobility-report-june-2019.pdf. Visited on 28 Oct 2019
Conti M, Li Q, Maragno A, Spolaor R (2018) The Dark Side(-Channel) of mobile devices: a survey on network traffic analysis. In: IEEE communications surveys & tutorials
Naboulsi D, Fiore M, Ribot S, Stanica R (2016) Large-scale mobile traffic analysis: a survey. IEEE Commun Surv Tutor 18(1):124–161
Smartphone Market Share (2019) Oct. https://www.idc.com/promo/smartphone-market-share/os. Visited on 2 Nov 2019
Android (operating system) (2019). https://en.wikipedia.org/wiki/Android_(operating_system). Visited on 1 Nov 2019
Chen Z et al (2015) A first look at android malware traffic in first few minutes. In: IEEE Trustcom/BigDataSE/ISPA, pp 206–213
Nayam W, Laolee A, Charoenwatana L, Sripanidkulchai K (2016) An analysis of mobile application network behaviour. In: 12th Asian internet engineering conference, pp 9–16
Tadrous J, Sabharwal A (2016) Interactive app traffic: an actionbased model and data-driven analysis. In: 14th international symposium on modeling and optimization in mobile, ad hoc, and wireless networks, pp 187–194
Espada AR et al (2017) Performance analysis of spotify for android with model-basedtesting. Mob Inf Syst
Lindorfer M, Neugschwandtner M, Weichselbaum et al (2014) ANDRUBIS—1,000,000 apps later: a view on current Android malware behaviours. In: 3rd international workshop on building analysis datasets and gathering experience returns for security, pp 3–17
Fukuda K, Asai H, Nagami K (2015) Tracking the evolution and diversity in network usage of smartphones. In: ACM SIGCOMM internet measurement conference, pp 253–266
Wang S, Chen Z, Zhang L et al (2016) TrafficAV: an effective and explainable detection of mobile malware behaviour using network traffic. In: IEEE/ACM 24th international symposium on quality of service (IWQoS)
Zaman M, Siddiqui T, Amin M, Hossain Md (2015) Malware detection in android by network traffic analysis. In: International conference on networking systems and security (NSysS), pp 183–187
Arora A, Peddoju S (2017) Minimizing network traffic features for android mobile malware detection. In: ICDCN
Narudin FA, Feizollah A, Anuar NB, Gani A (2016) Evaluation of machine learning classifiers for mobile malware detection. Soft Comput 20(1):343–357 (Jan)
Ruffing N, Zhu Y, Libertini R, Guan Y, Bettati R (2016) Smartphone reconnaissance: operating system identification. In: 13th IEEE annual consumer communications and networking conference, pp 1086–1091
Malik N, Chandramouli J, Suresh P, Fairbanks K, Watkins L, Robinson WH (2017) Using network traffic to verify mobile device forensic artifacts. In: 14th IEEE annual consumer communications and networking conference, pp 114–119
iOS (2019). https://en.wikipedia.org/wiki/IOS. Visited on 2 Nov 2019
Rao V, Hande K (2017) A comparative study of static, dynamic and hybrid analysis techniques for android malware detection. Int J Eng Dev Res (IJEDR) 5(2)
Saltaformaggio B, Choi H, Johnson K, Kwon Y et al (2016) Eavesdropping on fine-grained user activities within smartphone apps over encrypted network traffic. In: 10th USENIX workshop on offensive technologies, pp 69–78
Vanrykel E, Acar G, Herrmann M, Diaz C (2017) Leaky birds: exploiting mobile application traffic for surveillance. In: 20th international conference on financial cryptography and data security, pp 367–384
Spreitzer R, Griesmayr S, Korak T, Mangard S (2016) Exploiting data-usage statistics for website fingerprinting attacks on Android. In: 9th ACM conference on security and privacy in wireless and mobile networks, pp 49–60
Mongkollluksamee S, Visoottivisetg V, Fukuda K (2016) Combining communication patterns & traffic patterns to enhance mobile traffic identification performance. J Inf Process 24(2):247–254 (Mar)
Taylor VF, Spolaor R, Conti M, Martinovic I (2018) Robust smartphone app identification via encrypted network traffic analysis. IEEE Trans Inf Forensics Secur 13(1):63–78 (Jan)
Yuankun H et al (2019) Identification of VoIP speech with multiple domain deep features. IEEE Trans Inf Forens Secur 1556–6013
Giuseppe A et al (2019) Mobile encrypted traffic classification using deep learning: experimental evaluation, lessons learned, and challenges. IEEE Trans Netw Serv Manag 16(2), June
Coull SE, Dyer KP (2014) Traffic analysis of encrypted messaging services: Apple iMessage and beyond. ACM SIGCOMM Comput Commun Rev 44(5):5–11
Song Y, Hengartner U (2015) PrivacyGuard: a VPN-based platform to detect information leakage on Android devices. In: 5th annual ACM CCS workshop on security and privacy in smartphones and mobile devices, pp 15–26
Su X, Chuah MC, Tan G (2012) Smartphone dual defense protection framework: detecting malicious applications in Android markets. In: Proceedings of the 8th international conference on mobile ad-hoc and sensor networks, ser. MSN 2012. Washington, District of Columbia, USA: IEEE Computer Society, 2012, pp 153–160
Shabtai A, Chekina L et al (2014) Mobile malware detection through analysis of deviations in application network behaviour. Comput Secur 43:1–18
Esmaeili S, Shahriari H (2019) PodBot: a new botnet detection method by host and network- based analysis. In: 27th Iranian conference on electrical engineering (ICEE 2019), pp 1900–1904
Zulkifli A et al (2018) Android malware detection based on network traffic using decision tree algorithm. In: Recent advances on soft computing and data mining, pp 485–494
Arora A, Peddoju S (2018) NTPDroid: a hybrid android malware detector using network traffic and system permissions. In: 12th IEEE international conference on big data science and engineering
Zhou Y, Jiang X (2012) Dissecting Android malware: characterization and evolution. In: Proceedings of the IEEE symposium on security and privacy, pp 95–109
Wei S, Jiang P, YuanQ, Wang J (2018) Mobile application network behaviour detection and evaluation with WGAN and Bi-LSTM. In: Proceedings of TENCON 2018 - 2018 IEEE region 10 conference, pp 44–49
Wang S et al (2018) Detecting android malware leveraging text semantics of network flows. IEEE Trans Inf Forens Secur 13(5):1096–1109
VirusShare.Com. https://virusshare.com/
Baidu Mobile Assistant. https://shouji.baidu.com/
Kandukuru S, Sharma RM (2017) Android malicious application detection using permission vector and network traffic analysis. In: 2nd international conference for convergence in technology (I2CT), pp 1126–1132
Google play store (2018) https://play.google.com/store
Cam N et al (2017) NeSeDroid- android malware detection based on network traffic and sensitive resource accessing. In: Proceedings of the international conference on data engineering and communication technology, pp 19–30
Lashkari AH et al (2017) Towards a network-based framework for android malware detection and characterization. In: 15th annual conference on privacy, security and trust, pp 233–242
Pang et al (2017) Finding android malware trace from highly imbalanced network traffic. In: IEEE international conference on CSE and IEEE international conference on EUC, pp 588–595
Arp D, Spreitzenbarth M, Hubner M, Gascon H, Rieck K (2014) Drebin: effective and explainable detection of Android malware in your pocket. In: NDSS
Arora A, Garg S, Peddoju S (2014) Malware detection using network traffic analysis in android based mobile devices. In: 8th international conference on next generation mobile apps, services and technologies, pp 66–71
Feizollah A, Anuar N, Salleh R, Amalina F (2014) Comparative study of K-means and mini batch K-means clustering algorithms in android malware detection using network traffic analysis. In: International symposium on biometrics and security technologies (ISBAST), pp 193–197
Li J, Zhai L, Zhang X, Quan D (2014) Research of android malware detection based on network traffic monitoring. In: 9th IEEE conference on industrial electronics and applications, pp 1739–1744
Cheng Z et al (2017) Detecting information theft based on mobile network flows for android users. In: International conference on networking, architecture, and storage (NAS), Aug
Watkins L, Kalathummarath A, Robinson W (2018) Network-based detection of mobile malware exhibiting obfuscated or silent network behaviour. In: 15th IEEE annual consumer communications & networking conference (CCNC)
Wang S et al (2018) Deep and broad learning based detection of android malware via network traffic. In: IEEE/ACM 26th international symposium on quality of service (IWQoS), June
Nancy SD (2016) Android malware detection using decision trees and network traffic. Int J Comput Sci Inf Technol 7(4):1970–1974
Khatri V, Abendroth J (2015) Mobile Guard demo network based malware detection. In: IEEE Trustcom/BigDataSE/ISPA, pp 1177–1179
Wei S, Wu G, Zhou Z, Yang L (2015) Mining network traffic for application category recognition on android platform. In: IEEE international conference on progress in informatics and computing (PIC), pp 409–413
Anran L et al (2018) A fast and effective detection of mobile malware behavior using network traffic. Springer Nature Switzerland AG, pp 109–120
Xinyue Het al (2019) Fuzzing the android applications with HTTP/HTTPS network data. IEEE Access 7: 2169–3536
Shanshan W et al (2019) Deep and broad URL feature mining for android malware detection. Information Sciences, Elsevier, November
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kumar, S., Indu, S., Walia, G.S. (2021). Smartphone Traffic Analysis: A Contemporary Survey of the State-of-the-Art. In: Giri, D., Buyya, R., Ponnusamy, S., De, D., Adamatzky, A., Abawajy, J.H. (eds) Proceedings of the Sixth International Conference on Mathematics and Computing. Advances in Intelligent Systems and Computing, vol 1262. Springer, Singapore. https://doi.org/10.1007/978-981-15-8061-1_26
Download citation
DOI: https://doi.org/10.1007/978-981-15-8061-1_26
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-8060-4
Online ISBN: 978-981-15-8061-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)