2016
DOI: 10.1109/tmc.2016.2516020
|View full text |Cite
|
Sign up to set email alerts
|

Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
51
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 112 publications
(52 citation statements)
references
References 35 publications
1
51
0
Order By: Relevance
“…Shbair et al [6] consider classification of encrypted traffic, and suggest a multi-level approach to identify application classes in HTTPS traffic. Fu et al [7] study encrypted cellular traffic, focusing in particular on how to classify mobile messaging apps. Correlating HTTPS traffic and DNS requests to allow hostbased service classification of encrypted traffic is examined by Mori et al [8].…”
Section: Related Workmentioning
confidence: 99%
“…Shbair et al [6] consider classification of encrypted traffic, and suggest a multi-level approach to identify application classes in HTTPS traffic. Fu et al [7] study encrypted cellular traffic, focusing in particular on how to classify mobile messaging apps. Correlating HTTPS traffic and DNS requests to allow hostbased service classification of encrypted traffic is examined by Mori et al [8].…”
Section: Related Workmentioning
confidence: 99%
“…Shbair et al [6] consider classification of encrypted traffic, and suggest a multi-level approach to identify application classes in HTTPS traffic. Fu et al [7] study encrypted cellular traffic, focusing in particular on how to classify mobile messaging apps. Correlating HTTPS traffic and DNS requests to allow host-based service classification of encrypted traffic is examined by Mori et al [8].…”
Section: Related Workmentioning
confidence: 99%
“…Here it can be observed that three of the clusters (2,3,6) appears to capture flows with characteristics consistent with transporting actual video data. The three remaining clusters (1,4,5) captures flows which are generated by video applications, but are unlikely to be transferring actual video data.…”
Section: Dbscan Clusteringmentioning
confidence: 99%
“…Regarding classifying encrypted traffic, Shbair et al [10] proposed a multi-level approach to identify application classes in HTTPS traffic. Fu et al [5] examines encrypted cellular traffic, with a particular interest in classifying mobile messaging apps. By analyzing a recent cellular data set we in this study extend the knowledge regarding video flow behavior as observable inside the core of the cellular network, with a focus on features also available for encrypted traffic.…”
Section: Introductionmentioning
confidence: 99%