A survey on encrypted network traffic analysis applications, techniques, and countermeasures

E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …

When machine learning meets privacy in 6G: A survey

Y Sun, J Liu, J Wang, Y Cao… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
The rapid-develo** Artificial Intelligence (AI) technology, fast-growing network traffic, and
emerging intelligent applications (eg, autonomous driving, virtual reality, etc.) urgently …

Fs-net: A flow sequence network for encrypted traffic classification

C Liu, L He, G **ong, Z Cao, Z Li - IEEE INFOCOM 2019-IEEE …, 2019 - ieeexplore.ieee.org
With more attention paid to user privacy and communication security, the volume of
encrypted traffic rises sharply, which brings a huge challenge to traditional rule-based traffic …

Mobile encrypted traffic classification using deep learning: Experimental evaluation, lessons learned, and challenges

G Aceto, D Ciuonzo, A Montieri… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
The massive adoption of hand-held devices has led to the explosion of mobile traffic
volumes traversing home and enterprise networks, as well as the Internet. Traffic …

Accurate decentralized application identification via encrypted traffic analysis using graph neural networks

M Shen, J Zhang, L Zhu, K Xu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Decentralized Applications (DApps) are increasingly developed and deployed on
blockchain platforms such as Ethereum. DApp fingerprinting can identify users' visits to …

Peek-a-boo: I see your smart home activities, even encrypted!

A Acar, H Fereidooni, T Abera, AK Sikder… - Proceedings of the 13th …, 2020 - dl.acm.org
A myriad of IoT devices such as bulbs, switches, speakers in a smart home environment
allow users to easily control the physical world around them and facilitate their living styles …

FlowPic: A generic representation for encrypted traffic classification and applications identification

T Shapira, Y Shavitt - IEEE Transactions on Network and …, 2021 - ieeexplore.ieee.org
Identifying the type of a network flow or a specific application has many advantages, such
as, traffic engineering, or to detect and prevent application or application types that violate …

Robust smartphone app identification via encrypted network traffic analysis

VF Taylor, R Spolaor, M Conti… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The apps installed on a smartphone can reveal much information about a user, such as their
medical conditions, sexual orientation, or religious beliefs. In addition, the presence or …

Appscanner: Automatic fingerprinting of smartphone apps from encrypted network traffic

VF Taylor, R Spolaor, M Conti… - 2016 IEEE European …, 2016 - ieeexplore.ieee.org
Automatic fingerprinting and identification of smartphone apps is becoming a very attractive
data gathering technique for adversaries, network administrators, investigators and …

Tfe-gnn: A temporal fusion encoder using graph neural networks for fine-grained encrypted traffic classification

H Zhang, L Yu, X **ao, Q Li, F Mercaldo… - Proceedings of the ACM …, 2023 - dl.acm.org
Encrypted traffic classification is receiving widespread attention from researchers and
industrial companies. However, the existing methods only extract flow-level features, failing …