AppSniffer: Towards robust mobile app fingerprinting against VPN

S Oh, M Lee, H Lee, E Bertino, H Kim - Proceedings of the ACM Web …, 2023 - dl.acm.org
Application fingerprinting is a useful data analysis technique for network administrators,
marketing agencies, and security analysts. For example, an administrator can adopt …

Exploiting diversity in android tls implementations for mobile app traffic classification

S Sengupta, N Ganguly, P De… - The World Wide Web …, 2019 - dl.acm.org
Network traffic classification is an important tool for network administrators in enabling
monitoring and service provisioning. Traditional techniques employed in classifying traffic do …

Mass discovery of android traffic imprints through instantiated partial execution

Y Chen, W You, Y Lee, K Chen, XF Wang… - Proceedings of the 2017 …, 2017 - dl.acm.org
Monitoring network behaviors of mobile applications, controlling their resource access and
detecting potentially harmful apps are becoming increasingly important for the security …

Benchmark data for mobile app traffic research

R Wang, Z Liu, Y Cai, D Tang, J Yang… - Proceedings of the 15th …, 2018 - dl.acm.org
Mobile app traffic classification aims to automatically map mobile packets into apps. It has
become an active task in mobile traffic engineering, and numerous algorithms have been …

Headprint: detecting anomalous communications through header-based application fingerprinting

R Bortolameotti, T Van Ede, A Continella… - Proceedings of the 35th …, 2020 - dl.acm.org
Passive application fingerprinting is a technique to detect anomalous outgoing connections.
By monitoring the network traffic, a security monitor passively learns the network …

Role-based deception in enterprise networks

I Anjum, M Zhu, I Polinsky, W Enck, MK Reiter… - Proceedings of the …, 2021 - dl.acm.org
Historically, enterprise network reconnaissance is an active process, often involving port
scanning. However, as routers and switches become more complex, they also become more …

DeviceWatch: a data-driven network analysis approach to identifying compromised mobile devices with graph-inference

E Choo, M Nabeel, M Alsabah, I Khalil, T Yu… - ACM Transactions on …, 2022 - dl.acm.org
We propose to identify compromised mobile devices from a network administrator's point of
view. Intuitively, inadvertent users (and thus their devices) who download apps through …

Trigger relationship aware mobile traffic classification

H Tang, Y Cui, J Wu, X Yang, Z Yang - Proceedings of the International …, 2019 - dl.acm.org
Network traffic classification is important to network operators to ensure visibility of traffic.
Network management, monitoring, and other services are built upon such classification …