A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

A review on machine learning–based approaches for Internet traffic classification

O Salman, IH Elhajj, A Kayssi, A Chehab - Annals of Telecommunications, 2020 - Springer
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …

Mobile encrypted traffic classification using deep learning: Experimental evaluation, lessons learned, and challenges

G Aceto, D Ciuonzo, A Montieri… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
The massive adoption of hand-held devices has led to the explosion of mobile traffic
volumes traversing home and enterprise networks, as well as the Internet. Traffic …

XAI meets mobile traffic classification: Understanding and improving multimodal deep learning architectures

A Nascita, A Montieri, G Aceto… - … on Network and …, 2021 - ieeexplore.ieee.org
The increasing diffusion of mobile devices has dramatically changed the network traffic
landscape, with Traffic Classification (TC) surging into a fundamental role while facing new …

Flowprint: Semi-supervised mobile-app fingerprinting on encrypted network traffic

T Van Ede, R Bortolameotti, A Continella… - Network and distributed …, 2020 - par.nsf.gov
Mobile-application fingerprinting of network traffic is valuable for many security solutions as
it provides insights into the apps active on a network. Unfortunately, existing techniques …

50 ways to leak your data: An exploration of apps' circumvention of the android permissions system

J Reardon, Á Feal, P Wijesekera, AEB On… - 28th USENIX security …, 2019 - usenix.org
Modern smartphone platforms implement permission-based models to protect access to
sensitive data and system resources. However, apps can circumvent the permission model …

Iot inspector: Crowdsourcing labeled network traffic from smart home devices at scale

DY Huang, N Apthorpe, F Li, G Acar… - Proceedings of the ACM …, 2020 - dl.acm.org
The proliferation of smart home devices has created new opportunities for empirical
research in ubiquitous computing, ranging from security and privacy to personal health. Yet …

“Won't somebody think of the children?” examining COPPA compliance at scale

I Reyes, P Wijesekera, J Reardon… - The 18th Privacy …, 2018 - dspace.networks.imdea.org
We present a scalable dynamic analysis frame-work that allows for the automatic evaluation
of the privacy behaviors of Android apps. We use our system to analyze mobile apps' …

Mobile encrypted traffic classification using deep learning

G Aceto, D Ciuonzo, A Montieri… - 2018 Network traffic …, 2018 - ieeexplore.ieee.org
The massive adoption of hand-held devices has led to the explosion of mobile traffic
volumes traversing home and enterprise networks, as well as the Internet. Procedures for …

Improving performance, reliability, and feasibility in multimodal multitask traffic classification with XAI

A Nascita, A Montieri, G Aceto… - … on Network and …, 2023 - ieeexplore.ieee.org
The promise of Deep Learning (DL) in solving hard problems such as network Traffic
Classification (TC) is being held back by the severe lack of transparency and explainability …