Back to Search Start Over

Analyzing Android Encrypted Network Traffic to Identify User Actions.

Authors :
Conti, Mauro
Mancini, Luigi Vincenzo
Spolaor, Riccardo
Verde, Nino Vincenzo
Source :
IEEE Transactions on Information Forensics & Security; Jan2016, Vol. 11 Issue 1, p114-125, 12p
Publication Year :
2016

Abstract

Mobile devices can be maliciously exploited to violate the privacy of people. In most attack scenarios, the adversary takes the local or remote control of the mobile device, by leveraging a vulnerability of the system, hence sending back the collected information to some remote web service. In this paper, we consider a different adversary, who does not interact actively with the mobile device, but he is able to eavesdrop the network traffic of the device from the network side (e.g., controlling a Wi-Fi access point). The fact that the network traffic is often encrypted makes the attack even more challenging. In this paper, we investigate to what extent such an external attacker can identify the specific actions that a user is performing on her mobile apps. We design a system that achieves this goal using advanced machine learning techniques. We built a complete implementation of this system, and we also run a thorough set of experiments, which show that our attack can achieve accuracy and precision higher than 95%, for most of the considered actions. We compared our solution with the three state-of-the-art algorithms, and confirming that our system outperforms all these direct competitors. [ABSTRACT FROM PUBLISHER]

Details

Language :
English
ISSN :
15566013
Volume :
11
Issue :
1
Database :
Complementary Index
Journal :
IEEE Transactions on Information Forensics & Security
Publication Type :
Academic Journal
Accession number :
110756368
Full Text :
https://doi.org/10.1109/TIFS.2015.2478741