Proceedings 2020 Network and Distributed System Security Symposium 2020
DOI: 10.14722/ndss.2020.24412
|View full text |Cite
|
Sign up to set email alerts
|

FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic

Abstract: Mobile-application fingerprinting of network traffic is valuable for many security solutions as it provides insights into the apps active on a network. Unfortunately, existing techniques require prior knowledge of apps to be able to recognize them. However, mobile environments are constantly evolving, i.e., apps are regularly installed, updated, and uninstalled. Therefore, it is infeasible for existing fingerprinting approaches to cover all apps that may appear on a network. Moreover, most mobile traffic is en… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
78
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 142 publications
(79 citation statements)
references
References 31 publications
1
78
0
Order By: Relevance
“…Many works have proposed a number of methods to identify the application associated with a traffic flow [79,103]. [31] Android application classification 2016 Taylor et al [146] Android application classification 2016 Lopez et al [94] IoT traffic classification 2017 Taylor et al [147] Android application classification 2018 Aceto et al [26] Mobile application classification 2018 Aceto et al [27] Mobile application classification 2019 Aiolli et al [30] Identification of user activities on smartphone-based Bitcoin wallet apps 2019 Yao et al [168] IoT traffic classification 2019 Ede et al [151] Mobile application classification 2020 Coull et al [54] Application Usage Identification however, assuming unencrypted packet payloads is not a realistic scenario in the present. The research community has investigated other ways to extract meaningful, side-channel information (packet-or network-level) that is able to be expressed into signatures.…”
Section: Network Traffic Processing and Inspectionmentioning
confidence: 99%
See 2 more Smart Citations
“…Many works have proposed a number of methods to identify the application associated with a traffic flow [79,103]. [31] Android application classification 2016 Taylor et al [146] Android application classification 2016 Lopez et al [94] IoT traffic classification 2017 Taylor et al [147] Android application classification 2018 Aceto et al [26] Mobile application classification 2018 Aceto et al [27] Mobile application classification 2019 Aiolli et al [30] Identification of user activities on smartphone-based Bitcoin wallet apps 2019 Yao et al [168] IoT traffic classification 2019 Ede et al [151] Mobile application classification 2020 Coull et al [54] Application Usage Identification however, assuming unencrypted packet payloads is not a realistic scenario in the present. The research community has investigated other ways to extract meaningful, side-channel information (packet-or network-level) that is able to be expressed into signatures.…”
Section: Network Traffic Processing and Inspectionmentioning
confidence: 99%
“…Their proposed work eliminates the process of manually selecting traffic features. FLOWPRINT [151] offers mobile application identification by analyzing the network traffic. It introduces an approach for application fingerprinting by combining destination-based clustering, browser isolation, and pattern recognition (in a semi-supervised manner).…”
Section: Protocol/application Identificationmentioning
confidence: 99%
See 1 more Smart Citation
“…For instance, AppScanner [40] used a flow-based detection approach that extracts side-channel features from the packet header and computes statistical features to train a machine learning model for mobile app classification. As apps use CDNs or shared services, similar flow characteristics will be observed, thus confusing the classification model [40,41,44]. Examples of shared services include crash analytics, mobile advertisement (ad) networks, social networks.…”
Section: Introductionmentioning
confidence: 99%
“…These services are often embedded through libraries that are used by many apps: e.g., googleads.g.doubleclick.net, lh4.googleusercontent.com and android.clients.google.com. Motivated by this issue, the authors of FlowPrint [44] proposed to construct the fingerprint of an app by considering the communication graph between the mobile device and other destinations (e.g., CDNs and third-party services) and the associated attributes such as destination IP, destination port and TLS-certificates. At the inference stage, the fingerprint collected in the past is compared with the new one to determine the app.…”
Section: Introductionmentioning
confidence: 99%