SlideShare a Scribd company logo
SUMMARY OF “FLOWPRINT: SEMI-SUPERVISED MOBILE-APP FINGERPRINTING
ON ENCRYPTED NETWORK TRAFFIC”
Tesi di laurea triennale in ingegneria elettronica e
informatica
ANNO ACCADEMICO 2022-2023
CANDIDATO: RELATORE:
MAHDI AYOUB PROF. ALBERTO BARTOLI
Thijs van Ede, Riccardo Bortolameotti, Andrea Continella, Jingjing Ren, Daniel J. Dubois, Martina Lindorfer, David Choffnes, Maarten van Steen, and
Andreas Peter. University of Twente, Bitdefender, UC Santa Barbara, Northeastern University, TU Wien.
Network secure
 Having a secure network is a critical requirement for large organizations,
since:
2
More
users
More
devices
More
apps
Harder
to
monitor
 Users can install, uninstall, and update apps
 Organizations need a solution that can work without prior
knowledge
Challenges of Data traffic
3
 The majority of mobile data traffic is encrypted.
 Data traffic is: - dynamic
- Homogeneous
- Evolving
Challenges
Extract features
4
Since the data
is encrypted, then extract
features:
 Temporal features
 Device features
 Destination features
 Size features
Only features that showed a high AMI score had been considered
Fingerprinting approach (I)
Clustering
Browser
isolation
Cross-
correlation
5
… . . .
Fingerprinting approach (II)
Fingerprinting
fingerprint
comparison
6
… . . .
Matching or updating
Example correlation graph for three apps
Evaluation
Dataset Accuracy of FlowPrint Accuracy of AppScanner
ReCon 0.9447 0.4284
Cross Platform 0.8923 0.5028
Andrubis (≥1000 flows) 0.8111 0.6005
7
Performance of FlowPrint approach in comparison to AppScanner in the app recognition
experiment.
Possible flaws
• Potential for evasion by using VPN or PROXY
• Timing of communication
• Low-traffic apps
• Invade users privacy
• …
8
Future application
 High accuracy in recognizing apps
 High precision in detecting previously unseen apps
 Possible solution to the problem of network security
 Promising tool for other uses
9
Thank you for your time
Grazie per l'attenzione
10

More Related Content

Similar to FLOWPRINT: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic.pptx

Review on effectiveness of deep learning approach in digital forensics
Review on effectiveness of deep learning approach in digital  forensicsReview on effectiveness of deep learning approach in digital  forensics
Review on effectiveness of deep learning approach in digital forensics
IJECEIAES
 
THE USE OF VIRTUAL PRIVATE NETWORK IN THE CONTEXT OF “BRING YOUR OWN DEVICE” ...
THE USE OF VIRTUAL PRIVATE NETWORK IN THE CONTEXT OF “BRING YOUR OWN DEVICE” ...THE USE OF VIRTUAL PRIVATE NETWORK IN THE CONTEXT OF “BRING YOUR OWN DEVICE” ...
THE USE OF VIRTUAL PRIVATE NETWORK IN THE CONTEXT OF “BRING YOUR OWN DEVICE” ...
ijcsitcejournal
 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docx
lorainedeserre
 
Hydrix ausbiotech presentation wireless integration of medical devices 22...
Hydrix ausbiotech presentation  wireless integration  of medical devices   22...Hydrix ausbiotech presentation  wireless integration  of medical devices   22...
Hydrix ausbiotech presentation wireless integration of medical devices 22...
Hydrix Pty Ltd
 
Hydrix ausbiotech presentation wireless integration of medical devices 22...
Hydrix ausbiotech presentation  wireless integration  of medical devices   22...Hydrix ausbiotech presentation  wireless integration  of medical devices   22...
Hydrix ausbiotech presentation wireless integration of medical devices 22...
Hydrix Pty Ltd
 
Wireless Integration Of Medical Devices (Ausbiotech 22 10 10)
Wireless Integration  Of Medical Devices   (Ausbiotech 22 10 10)Wireless Integration  Of Medical Devices   (Ausbiotech 22 10 10)
Wireless Integration Of Medical Devices (Ausbiotech 22 10 10)
innovation9
 
Hydrix ausbiotech presentation wireless integration of medical devices 22...
Hydrix ausbiotech presentation  wireless integration  of medical devices   22...Hydrix ausbiotech presentation  wireless integration  of medical devices   22...
Hydrix ausbiotech presentation wireless integration of medical devices 22...
Hydrix Pty Ltd
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
journalBEEI
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile SecurityArrow ECS UK
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
TELKOMNIKA JOURNAL
 
Unique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative SolutionsUnique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative Solutions
Juniper Networks
 
Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?
GENIANS, INC.
 
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
IRJET Journal
 
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
IRJET Journal
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
IJECEIAES
 
Smart Computing Mobile Cloud
Smart Computing Mobile CloudSmart Computing Mobile Cloud
Smart Computing Mobile Cloud
ijtsrd
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
Putra Wanda
 
Paper id 25201417
Paper id 25201417Paper id 25201417
Paper id 25201417IJRAT
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOT
IJEACS
 
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersWhy Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Crawsec
 

Similar to FLOWPRINT: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic.pptx (20)

Review on effectiveness of deep learning approach in digital forensics
Review on effectiveness of deep learning approach in digital  forensicsReview on effectiveness of deep learning approach in digital  forensics
Review on effectiveness of deep learning approach in digital forensics
 
THE USE OF VIRTUAL PRIVATE NETWORK IN THE CONTEXT OF “BRING YOUR OWN DEVICE” ...
THE USE OF VIRTUAL PRIVATE NETWORK IN THE CONTEXT OF “BRING YOUR OWN DEVICE” ...THE USE OF VIRTUAL PRIVATE NETWORK IN THE CONTEXT OF “BRING YOUR OWN DEVICE” ...
THE USE OF VIRTUAL PRIVATE NETWORK IN THE CONTEXT OF “BRING YOUR OWN DEVICE” ...
 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docx
 
Hydrix ausbiotech presentation wireless integration of medical devices 22...
Hydrix ausbiotech presentation  wireless integration  of medical devices   22...Hydrix ausbiotech presentation  wireless integration  of medical devices   22...
Hydrix ausbiotech presentation wireless integration of medical devices 22...
 
Hydrix ausbiotech presentation wireless integration of medical devices 22...
Hydrix ausbiotech presentation  wireless integration  of medical devices   22...Hydrix ausbiotech presentation  wireless integration  of medical devices   22...
Hydrix ausbiotech presentation wireless integration of medical devices 22...
 
Wireless Integration Of Medical Devices (Ausbiotech 22 10 10)
Wireless Integration  Of Medical Devices   (Ausbiotech 22 10 10)Wireless Integration  Of Medical Devices   (Ausbiotech 22 10 10)
Wireless Integration Of Medical Devices (Ausbiotech 22 10 10)
 
Hydrix ausbiotech presentation wireless integration of medical devices 22...
Hydrix ausbiotech presentation  wireless integration  of medical devices   22...Hydrix ausbiotech presentation  wireless integration  of medical devices   22...
Hydrix ausbiotech presentation wireless integration of medical devices 22...
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
 
Unique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative SolutionsUnique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative Solutions
 
Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?
 
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
 
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
 
Smart Computing Mobile Cloud
Smart Computing Mobile CloudSmart Computing Mobile Cloud
Smart Computing Mobile Cloud
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
 
Paper id 25201417
Paper id 25201417Paper id 25201417
Paper id 25201417
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOT
 
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersWhy Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
 

Recently uploaded

Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 

Recently uploaded (20)

Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 

FLOWPRINT: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic.pptx

  • 1. SUMMARY OF “FLOWPRINT: SEMI-SUPERVISED MOBILE-APP FINGERPRINTING ON ENCRYPTED NETWORK TRAFFIC” Tesi di laurea triennale in ingegneria elettronica e informatica ANNO ACCADEMICO 2022-2023 CANDIDATO: RELATORE: MAHDI AYOUB PROF. ALBERTO BARTOLI Thijs van Ede, Riccardo Bortolameotti, Andrea Continella, Jingjing Ren, Daniel J. Dubois, Martina Lindorfer, David Choffnes, Maarten van Steen, and Andreas Peter. University of Twente, Bitdefender, UC Santa Barbara, Northeastern University, TU Wien.
  • 2. Network secure  Having a secure network is a critical requirement for large organizations, since: 2 More users More devices More apps Harder to monitor  Users can install, uninstall, and update apps  Organizations need a solution that can work without prior knowledge
  • 3. Challenges of Data traffic 3  The majority of mobile data traffic is encrypted.  Data traffic is: - dynamic - Homogeneous - Evolving Challenges
  • 4. Extract features 4 Since the data is encrypted, then extract features:  Temporal features  Device features  Destination features  Size features Only features that showed a high AMI score had been considered
  • 6. Fingerprinting approach (II) Fingerprinting fingerprint comparison 6 … . . . Matching or updating Example correlation graph for three apps
  • 7. Evaluation Dataset Accuracy of FlowPrint Accuracy of AppScanner ReCon 0.9447 0.4284 Cross Platform 0.8923 0.5028 Andrubis (≥1000 flows) 0.8111 0.6005 7 Performance of FlowPrint approach in comparison to AppScanner in the app recognition experiment.
  • 8. Possible flaws • Potential for evasion by using VPN or PROXY • Timing of communication • Low-traffic apps • Invade users privacy • … 8
  • 9. Future application  High accuracy in recognizing apps  High precision in detecting previously unseen apps  Possible solution to the problem of network security  Promising tool for other uses 9
  • 10. Thank you for your time Grazie per l'attenzione 10