Abstract

Mobile users install different types of applications on their mobile devices based on their interests and needs and perform various activities on them (known as in-app activities). In this paper, we demonstrate that a passive eavesdropper can identify fine grained in-app activities by analysing encrypted network traffic information obtained by sniffing a Wireless Local Area Network (WLAN). Even though encryption protocols are used to provide security over Internet communications, side channel data is still leaked from encrypted traffic. We utilise this data (frame length, inter arrival time and direction) to identify the in-app activities. Further as a first study of its kind, we show that it is possible to identify in-app activities accurately by observing a very small subset of traffic, rather than observing the entire transaction of an activity as presented in existing literature. To reach these observations, we evaluated 51 in-app activities from three popular social networking apps and identified more than 85% of them correctly using the Bayes Net machine learning algorithm.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.