A novel method for mobile application recognition in encrypted channels
-
Published:2023
Issue:1
Volume:32
Page:193-223
-
ISSN:2688-1594
-
Container-title:Electronic Research Archive
-
language:
-
Short-container-title:era
Author:
Zhai Jiangtao12, Wang Zihao12, Duan Kun12, Wang Tao12
Affiliation:
1. School of Electronic & Information Engineering, Nanjing University of Information Science & Technology, Nanjing 210044, China 2. Key Laboratory of Intelligent Support Technology for Complex Environments, Ministry of Education, Nanjing 210044, China
Abstract
<abstract><p>In the field of mobile application traffic analysis, existing methods for accurately identifying encrypted traffic often encounter challenges due to the widespread adoption of encryption channels and the presence of background traffic. Consequently, this study presents a novel mobile application traffic identification model that is in encrypted channels. The proposed model utilizes an adaptive feature extraction technique that combines Convolutional Neural Networks (CNNs) and Gated Recurrent Units (GRUs) to effectively extract abstract features from encrypted mobile application traffic. Additionally, by employing a probability-based comprehensive analysis to filter out low-confidence background traffic interference, the reliability of recognition is further enhanced. Experimental comparisons are conducted to validate the efficacy of the proposed approach. The results demonstrate that the proposed method achieves a remarkable classification accuracy of 95.4% when confronted with background traffic interference, surpassing existing techniques by over 15% in terms of anti-interference performance.</p></abstract>
Publisher
American Institute of Mathematical Sciences (AIMS)
Subject
General Mathematics
Reference30 articles.
1. S. Kumar, S. Indu, G. S. Walia, Smartphone traffic analysis: a contemporary survey of the state-of-the-art, in Proceedings of the Sixth International Conference on Mathematics and Computing, Springer, 1262 (2021), 325–343. https://doi.org/10.1007/978-981-15-8061-1_26 2. J. Wang, H. Han, H. Li, S. He, P. K. Sharma, L. Chen, Multiple strategies differential privacy on sparse tensor factorization for network traffic analysis in 5G, IEEE Trans. Ind. Inform., 18 (2022), 1939–1948. https://doi.org/10.1109/TII.2021.3082576 3. J. Wang, Y. Yang, T. Wang, R. Sherratt, J. Zhang, Big data service architecture: a survey, J. Internet Technol., 21 (2020), 393–405. 4. P. Wang, X. Chen, F. Ye, Z. Sun, A survey of techniques for mobile service encrypted traffic classification using deep learning, IEEE Access, 7 (2019), 54024–54033. https://doi.org/10.1109/ACCESS.2019.2912896 5. H. Yan, H. Li, M. Xiao, R. Dai, X. Zheng, X. Zhao, et al., PGSM-DPI: precisely guided signature matching of deep packet inspection for traffic analysis, in 2019 IEEE Global Communications Conference (GLOBECOM), IEEE, (2019), 1–6. https://doi.org/10.1109/GLOBECOM38437.2019.9013941
|
|