The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis

被引:74
作者
Conti, Mauro [1 ,2 ,3 ]
Li, Qian Qian [1 ,2 ]
Maragno, Alberto [1 ,2 ]
Spolaor, Riccardo [1 ,2 ]
机构
[1] Univ Padua, Dept Math, SPRITZ Res Grp, I-35131 Padua, Italy
[2] Univ Padua, Human Inspired Technol Res Ctr, I-35131 Padua, Italy
[3] Univ Washington, Dept Elect Engn, Seattle, WA 98195 USA
基金
欧盟地平线“2020”;
关键词
Internet traffic; machine learning; mobile device; network traffic analysis; smartphone; tablet computer;
D O I
10.1109/COMST.2018.2843533
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, mobile devices (e.g., smartphones and tablets) have met an increasing commercial success and have become a fundamental element of the everyday life for billions of people all around the world. Mobile devices are used not only for traditional communication activities (e.g., voice calls and messages) but also for more advanced tasks made possible by an enormous amount of multi-purpose applications (e.g., finance, gaming, and shopping). As a result, those devices generate a significant network traffic (a consistent part of the overall Internet traffic). For this reason, the research community has been investigating security and privacy issues that are related to the network traffic generated by mobile devices, which could be analyzed to obtain information useful for a variety of goals (ranging from fine-grained user profiling to device security and network optimization). In this paper, we review the works that contributed to the state of the art of network traffic analysis targeting mobile devices. In particular, we present a systematic classification of the works in the literature according to three criteria: 1) the goal of the analysis; 2) the point where the network traffic is captured; and 3) the targeted mobile platforms. In this survey, we consider points of capturing such as Wi-Fi access points, software simulation, and inside real mobile devices or emulators. For the surveyed works, we review and compare analysis techniques, validation methods, and achieved results. We also discuss possible countermeasures, challenges, and possible directions for future research on mobile traffic analysis and other emerging domains (e.g., Internet of Things). We believe our survey will be a reference work for researchers and practitioners in this research field.
引用
收藏
页码:2658 / 2713
页数:56
相关论文
共 90 条
[1]   Friends and neighbors on the Web [J].
Adamic, LA ;
Adar, E .
SOCIAL NETWORKS, 2003, 25 (03) :211-230
[2]   Usage Patterns in an Urban WiFi Network [J].
Afanasyev, Mikhail ;
Chen, Tsuwei ;
Voelker, Geoffrey M. ;
Snoeren, Alex C. .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2010, 18 (05) :1359-1372
[3]   Can Android Applications Be Identified Using Only TCP/IP Headers of Their Launch Time Traffic? [J].
Alan, Hasan Faik ;
Kaur, Jasleen .
PROCEEDINGS OF THE 9TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC'16), 2016, :61-66
[4]  
[Anonymous], NUMB ANDR APPL
[5]  
[Anonymous], 1989, Principal components analysis
[6]  
[Anonymous], MOB OP SYST MARK SHA
[7]  
[Anonymous], 2015, P 2015 ACM SIGCOMM W, DOI DOI 10.1145/2787394
[8]  
[Anonymous], P 2 WORKSH MOB SEC T
[9]  
[Anonymous], P 18 NAT C COMM NCC
[10]  
[Anonymous], NUMB AV APPS APPL AP