Machine learning-powered encrypted network traffic analysis: A comprehensive survey

M Shen, K Ye, X Liu, L Zhu, J Kang… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Traffic analysis is the process of monitoring network activities, discovering specific patterns,
and gleaning valuable information from network traffic. It can be applied in various fields …

A survey on encrypted network traffic analysis applications, techniques, and countermeasures

E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …

Mobile encrypted traffic classification using deep learning: Experimental evaluation, lessons learned, and challenges

G Aceto, D Ciuonzo, A Montieri… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
The massive adoption of hand-held devices has led to the explosion of mobile traffic
volumes traversing home and enterprise networks, as well as the Internet. Traffic …

MIMETIC: Mobile encrypted traffic classification using multimodal deep learning

G Aceto, D Ciuonzo, A Montieri, A Pescapè - Computer networks, 2019 - Elsevier
Abstract Mobile Traffic Classification (TC) has become nowadays the enabler for valuable
profiling information, other than being the workhorse for service differentiation or blocking …

Flowprint: Semi-supervised mobile-app fingerprinting on encrypted network traffic

T Van Ede, R Bortolameotti, A Continella… - Network and distributed …, 2020 - par.nsf.gov
Mobile-application fingerprinting of network traffic is valuable for many security solutions as
it provides insights into the apps active on a network. Unfortunately, existing techniques …

Robust smartphone app identification via encrypted network traffic analysis

VF Taylor, R Spolaor, M Conti… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The apps installed on a smartphone can reveal much information about a user, such as their
medical conditions, sexual orientation, or religious beliefs. In addition, the presence or …

Systematic classification of side-channel attacks: A case study for mobile devices

R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …

Multi-classification approaches for classifying mobile app traffic

G Aceto, D Ciuonzo, A Montieri, A Pescapé - Journal of Network and …, 2018 - Elsevier
The growing usage of smartphones in everyday life is deeply (and rapidly) changing the
nature of traffic traversing home and enterprise networks, and the Internet. Different tools …

Toward effective mobile encrypted traffic classification through deep learning

G Aceto, D Ciuonzo, A Montieri, A Pescapé - Neurocomputing, 2020 - Elsevier
Traffic Classification (TC), consisting in how to infer applications generating network traffic, is
currently the enabler for valuable profiling information, other than being the workhorse for …

Mobile encrypted traffic classification using deep learning

G Aceto, D Ciuonzo, A Montieri… - 2018 Network traffic …, 2018 - ieeexplore.ieee.org
The massive adoption of hand-held devices has led to the explosion of mobile traffic
volumes traversing home and enterprise networks, as well as the Internet. Procedures for …