CNN for User Activity Detection Using Encrypted In-App Mobile Data

被引:8
作者
Pathmaperuma, Madushi H. [1 ]
Rahulamathavan, Yogachandran [1 ]
Dogan, Safak [1 ]
Kondoz, Ahmet [1 ]
机构
[1] Loughborough Univ London, Inst Digital Technol, London E20 3BS, England
基金
英国工程与自然科学研究理事会;
关键词
encrypted traffic classification; network analysis; mobile data; network traffic to image; TRAFFIC CLASSIFICATION; NETWORK; INTERNET;
D O I
10.3390/fi14020067
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this study, a simple yet effective framework is proposed to characterize fine-grained in-app user activities performed on mobile applications using a convolutional neural network (CNN). The proposed framework uses a time window-based approach to split the activity's encrypted traffic flow into segments, so that in-app activities can be identified just by observing only a part of the activity-related encrypted traffic. In this study, matrices were constructed for each encrypted traffic flow segment. These matrices acted as input into the CNN model, allowing it to learn to differentiate previously trained (known) and previously untrained (unknown) in-app activities as well as the known in-app activity type. The proposed method extracts and selects salient features for encrypted traffic classification. This is the first-known approach proposing to filter unknown traffic with an average accuracy of 88%. Once the unknown traffic is filtered, the classification accuracy of our model would be 92%.
引用
收藏
页数:18
相关论文
共 29 条
[1]   MIMETIC: Mobile encrypted traffic classification using multimodal deep learning [J].
Aceto, Giuseppe ;
Ciuonzo, Domenico ;
Montieri, Antonio ;
Pescape, Antonio .
COMPUTER NETWORKS, 2019, 165
[2]   Analyzing Android Encrypted Network Traffic to Identify User Actions [J].
Conti, Mauro ;
Mancini, Luigi Vincenzo ;
Spolaor, Riccardo ;
Verde, Nino Vincenzo .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (01) :114-125
[3]  
Draper-Gil Gerard, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P407
[4]  
He YJ, 2020, 2020 IEEE FIFTH INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE, DSC, P271, DOI 10.1109/DSC50466.2020.00048
[5]   Image-based anomaly detection technique: Algorithm, implementation and effectiveness [J].
Kim, Seong Soo ;
Reddy, A. L. Narasimha .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (10) :1942-1954
[6]  
Kim SS, 2005, IEEE ICC, P168
[7]  
Kim SS, 2005, IEEE INFOCOM SER, P2056
[8]   Network Traffic Classifier With Convolutional and Recurrent Neural Networks for Internet of Things [J].
Lopez-Martin, Manuel ;
Carro, Belen ;
Sanchez-Esguevillas, Antonio ;
Lloret, Jaime .
IEEE ACCESS, 2017, 5 :18042-18050
[9]   Deep packet: a novel approach for encrypted traffic classification using deep learning [J].
Lotfollahi, Mohammad ;
Siavoshani, Mahdi Jafari ;
Zade, Ramin Shirali Hossein ;
Saberian, Mohammdsadegh .
SOFT COMPUTING, 2020, 24 (03) :1999-2012
[10]   Traffic Flow Prediction With Big Data: A Deep Learning Approach [J].
Lv, Yisheng ;
Duan, Yanjie ;
Kang, Wenwen ;
Li, Zhengxi ;
Wang, Fei-Yue .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2015, 16 (02) :865-873