Enmob: Unveil the Behavior with Multi-flow Analysis of Encrypted App Traffic
Abstract In the contemporary digital landscape, mobile applications have become the predominant conduit for internet connectivity and daily tasks. Simultaneously, the advent of application encryption technology has safeguarded users’ privacy. However, this encryption, while fortifying privacy, intro...
| Published in: | Cybersecurity |
|---|---|
| Main Authors: | , , , , , , |
| Format: | Article |
| Language: | English |
| Published: |
SpringerOpen
2025-04-01
|
| Subjects: | |
| Online Access: | https://doi.org/10.1186/s42400-024-00301-0 |
| _version_ | 1849671197164306432 |
|---|---|
| author | Ge Mengmeng Feng Ruitao Liu Likun Yu Xiangzhan Sachidananda Vinay Xie Xiaofei Liu Yang |
| author_facet | Ge Mengmeng Feng Ruitao Liu Likun Yu Xiangzhan Sachidananda Vinay Xie Xiaofei Liu Yang |
| author_sort | Ge Mengmeng |
| collection | DOAJ |
| container_title | Cybersecurity |
| description | Abstract In the contemporary digital landscape, mobile applications have become the predominant conduit for internet connectivity and daily tasks. Simultaneously, the advent of application encryption technology has safeguarded users’ privacy. However, this encryption, while fortifying privacy, introduces challenges to security by hindering the effective management of network applications within encrypted data streams. Conventional detection methods for encrypted application traffic, relying heavily on statistical metrics like payload, packet size, and distribution, are constrained to single traffic flows, often yielding results of limited specificity. To address this limitation, our paper introduces an innovative approach that elucidates the multi-flow nature of application behavior traffic and provides context to encrypted application traffic. This method offers a more nuanced and comprehensive perspective for understanding and representing network traffic, even when encrypted. The efficacy of our approach was evaluated using a substantial volume of real network traffic data. Results indicate that our method achieves an average accuracy of 0.958 in identifying application behavior traffic and 0.955 in classifying application traffic. These outcomes signify a substantial enhancement over single network flow-based detection methods, demonstrating a notable 5.3% improvement. |
| format | Article |
| id | doaj-art-12864f6432a147ca82cc5f6c1902e0ee |
| institution | Directory of Open Access Journals |
| issn | 2523-3246 |
| language | English |
| publishDate | 2025-04-01 |
| publisher | SpringerOpen |
| record_format | Article |
| spelling | doaj-art-12864f6432a147ca82cc5f6c1902e0ee2025-08-20T02:17:56ZengSpringerOpenCybersecurity2523-32462025-04-018111710.1186/s42400-024-00301-0Enmob: Unveil the Behavior with Multi-flow Analysis of Encrypted App TrafficGe Mengmeng0Feng Ruitao1Liu Likun2Yu Xiangzhan3Sachidananda Vinay4Xie Xiaofei5Liu Yang6School of Cyberspace Science, Harbin Institute of TechnologySchool of Computing and Information Systems, Singapore Management UniversitySchool of Cyberspace Science, Harbin Institute of TechnologySchool of Cyberspace Science, Harbin Institute of TechnologySchool of Computer Science and Engineering, Nanyang Technlogical UniversitySchool of Computing and Information Systems, Singapore Management UniversitySchool of Computer Science and Engineering, Nanyang Technlogical UniversityAbstract In the contemporary digital landscape, mobile applications have become the predominant conduit for internet connectivity and daily tasks. Simultaneously, the advent of application encryption technology has safeguarded users’ privacy. However, this encryption, while fortifying privacy, introduces challenges to security by hindering the effective management of network applications within encrypted data streams. Conventional detection methods for encrypted application traffic, relying heavily on statistical metrics like payload, packet size, and distribution, are constrained to single traffic flows, often yielding results of limited specificity. To address this limitation, our paper introduces an innovative approach that elucidates the multi-flow nature of application behavior traffic and provides context to encrypted application traffic. This method offers a more nuanced and comprehensive perspective for understanding and representing network traffic, even when encrypted. The efficacy of our approach was evaluated using a substantial volume of real network traffic data. Results indicate that our method achieves an average accuracy of 0.958 in identifying application behavior traffic and 0.955 in classifying application traffic. These outcomes signify a substantial enhancement over single network flow-based detection methods, demonstrating a notable 5.3% improvement.https://doi.org/10.1186/s42400-024-00301-0Traffic analysisEncryption trafficBehavior Traffic Classification |
| spellingShingle | Ge Mengmeng Feng Ruitao Liu Likun Yu Xiangzhan Sachidananda Vinay Xie Xiaofei Liu Yang Enmob: Unveil the Behavior with Multi-flow Analysis of Encrypted App Traffic Traffic analysis Encryption traffic Behavior Traffic Classification |
| title | Enmob: Unveil the Behavior with Multi-flow Analysis of Encrypted App Traffic |
| title_full | Enmob: Unveil the Behavior with Multi-flow Analysis of Encrypted App Traffic |
| title_fullStr | Enmob: Unveil the Behavior with Multi-flow Analysis of Encrypted App Traffic |
| title_full_unstemmed | Enmob: Unveil the Behavior with Multi-flow Analysis of Encrypted App Traffic |
| title_short | Enmob: Unveil the Behavior with Multi-flow Analysis of Encrypted App Traffic |
| title_sort | enmob unveil the behavior with multi flow analysis of encrypted app traffic |
| topic | Traffic analysis Encryption traffic Behavior Traffic Classification |
| url | https://doi.org/10.1186/s42400-024-00301-0 |
| work_keys_str_mv | AT gemengmeng enmobunveilthebehaviorwithmultiflowanalysisofencryptedapptraffic AT fengruitao enmobunveilthebehaviorwithmultiflowanalysisofencryptedapptraffic AT liulikun enmobunveilthebehaviorwithmultiflowanalysisofencryptedapptraffic AT yuxiangzhan enmobunveilthebehaviorwithmultiflowanalysisofencryptedapptraffic AT sachidanandavinay enmobunveilthebehaviorwithmultiflowanalysisofencryptedapptraffic AT xiexiaofei enmobunveilthebehaviorwithmultiflowanalysisofencryptedapptraffic AT liuyang enmobunveilthebehaviorwithmultiflowanalysisofencryptedapptraffic |
