SlideShare a Scribd company logo
1 of 9
Service Usage Classification with Encrypted
Internet Traffic in Mobile Messaging Apps
ABSTRACT
The rapid adoption of mobile messaging Apps has enabled us to collect
massive amount of encrypted Internet traffic of mobile messaging. The
classification of this traffic into different types of in-App service usages can help
for intelligent network management, such as managing network bandwidth budget
and providing quality of services. Traditional approaches for classification of
Internet traffic rely on packet inspection, such as parsing HTTP headers. However,
messaging Apps are increasingly using secure protocols, such as HTTPS and SSL,
to transmit data. This imposes significant challenges on the performances of
service usage classification by packet inspection. To this end, in this paper, we
investigate how to exploit encrypted Internet traffic for classifying in-App usages.
Specifically, we develop a system, named CUMMA, for classifying service usages
of mobile messaging Apps by jointly modeling user behavioral patterns, network
traffic characteristics and temporal dependencies. Along this line, we first segment
Internet traffic from traffic-flows into sessions with a number of dialogs in a
hierarchical way. Also, we extract the discriminative features of traffic data from
two perspectives: (i) packet length and (ii) time delay. Next, we learn a service
usage predictor to classify these segmented dialogs into single-type usages or
outliers.. Indeed, CUMMA enables mobile analysts to identify service usages and
analyze end-user in-App behaviors even for encrypted Internet traffic. Finally, the
extensive experiments on real-world messaging data demonstrate the effectiveness
and efficiency of the proposed method for service usage classification.
ARCHITECTURE
SYSTEM ANALYSIS
EXISTING SYSTEM
A hierarchical segmentation based on the definitions of session and dialog:
we first segment each traffic-flow into sessions using a thresholding method; then
we segment each session into dialogs by a bottom-up hierarchical clustering based
method mixed with thresholding heuristics. The above method can segment the
raw Internet traffic into dialogs. Note that most dialogs contain single usage type,
and only a few are the mixture of multiple usage types.
PROPOSED SYSTEM
we developed a system for classifying service usages using encrypted
Internet traffic in mobile messaging Apps by jointly modeling behavior structure,
network traffic characteristics, and temporal dependencies. There are four modules
in our system including traffic segmentation, traffic feature extraction, service
usage prediction, and outlier detection and handling. Specifically, we first built a
data collection platform to collect the traffic-flows of in-App usages and the
corresponding usage types reported by mobile users. We then hierarchically
segment these traffic from traffic-flows to sessions to dialogs where each is
assumed to be of individual usage or mixed usages. Also, we extracted the packet
length related features and the time delay related features from traffic-flows to
prepare the training data. In addition, we learned service usage classifiers to
classify these segmented dialogs. Moreover, we detected the anomalous dialogs
with mixed usages and segmented these mixed dialogs into multiple sub-dialogs of
singletype usage. Finally, the experimental results on real world WeChat and
WhatsApp traffic data demonstrate the performances of the proposedmethod. With
this system, we showed that the valuable applications for in-App usage analytics
can be enabled to score quality of experiences, profile user behaviors and enhance
customer care.
PROPOSED SYSTEM ALGORITHMS
 Algorithm to provide efficient search In encryption Algorithm .
 A conventionally defined time interval in a schedule. Prime-time
television has two- to four-hour-long timeslots.
MODULE DESCRIPTION
MODULE
 Public Cloud Server.
 App Messaging.
 Timer control.
 Traffic flows of consequent service usages
 Symmetric key distribution Method.
MODULE DESCRIPTION
Public Cloud Server:
There exist many different security problems in the cloud computing This
paper is based on the research results of proxy cryptography, identity-based public
key cryptography and remote data integrity checking in public cloud. In some
cases, the cryptographic operation will be delegated to the third party, for example
proxy. Thus, we have to use the proxy cryptography. Proxy cryptography is a very
important cryptography primitive. In 1996, Mambo et al. proposed the notion of
the proxy cryptosystem . When the bilinear pairings are brought into the identity-
based cryptography, identitybased cryptography becomes efficient and practical.
Since identity-based cryptography becomes more efficient because it avoids of the
certificate management, more and more experts are apt to study identity-based
proxy cryptography. In 2013, Yoon et al. proposed an ID-based proxy signature
scheme with message recovery . Chen et al. proposed a proxy signature scheme
and a threshold proxy signature scheme from the Weil pairing . By combining the
proxy cryptography with encryption technique, some proxy re-encryption schemes
are proposed. Liu et al. formalize and construct the attribute-based proxy signature
. Guo et al. presented a non-interactive CPA(chosen-plaintext attack)-secure proxy
reencryption scheme, which is resistant to collusion attacks in forging re-
encryption keys . Many other concrete proxy re-encryption schemes and their
applications are also proposed.
App Messaging:
Recent years have witnessed the increased popularity of mobile messaging
Apps, such as WeChat and WhatsApp. Indeed, messaging Apps have become the
hubs for most activities of mobile users. For example, messaging Apps help people
text each another, share photos, chat, and engage in commercial activities such as
paying bills, booking tickets and shopping. Mobile companies monetize their
services in messaging Apps. Therefore, service usage analytics in messaging Apps
becomes critical for business, because it can help understand in-App behaviors of
end users, and thus enables a variety of applications. For instance, it provides in-
depth insights into end users and App performances, enhances user experiences,
and increases engagement, conversions and monetization. However, a key task of
in-App usage analytics is to classify Internet traffic of messaging Apps into
different usage types as shown in Table Traditional methods for traffic
classification rely on packet inspection by analyzing the TCP or UDP port numbers
of an IP packet or reconstructing protocol signatures in its payload For example,
an IP packet usually has five tuples of protocol types, source address, source port,
destination address and destination port. People estimate the usage types.
Timer control:
Second, a traffic-flow of M observations (packets in this study) usually
contains two sequences: an Msize sequence of packet lengths representing the data
transmission of service usages and an (M-1)-size sequence of time delays
representing the time intervals of consecutive packet pairs. In terms of the packet
length, as shown in, different service usages have different global characteristics
(e.g., distribution properties such as mean and variance of packet lengths, etc.) and
local characteristics (e.g., packet-level features such as forward or backward
variances at important observation positions, etc.). For example, texts are more
frequently used, shorter in time, and smaller in data size comparing to stream video
call, therefore any traffic intervals with flow rate lower than certain thresholds are
likely determined as text streams. Aside from global characteristics, local (i.e.,
packet-level) characteristics are from the fact that the packet lengths of different
usage types vary over observation positions in the sequence of packet lengths. For
example, shows the process that a mobile user sends out a text message, and thus
generates a pulse in traffic, followed by another pulse representing a text reply.
Also, Figure shows that, in stream video call, most packets are fully loaded (i.e.,
close to 1500 bytes) in the sequence of packet lengths. In terms of time delay,
different in-App usages adopt different design logics and control flows for function
implementation and different network protocols for packet transmission, and thus
show unique characteristics of time delay distribution. For example, shows that, for
location sharing, most of packets are sent in the initial phase. However, for short
video, data transmission is completed.
Traffic flows of consequent service usages:
Specifically, we study these patterns from three perspectives: behavioral
structure, flow characteristics, and temporal dependencies. First, service usage
behaviors in messaging Apps have their unique hierarchical structure. We employ
the term of traffic-flow to denote the encrypted network traffic (with only time
stamp and packet length information being available) generated by mobile
messaging Apps, and the terms of session and dialog to represent the segments of
traffic-flow in different granularity. For example, in web browsing, a session is
initiated when a user opens the browser, and torn down after the browser being
closed. A session usually includes multiple dialogs, each of which starts from a
new tab being opened and lasts until this tab is closed. In one dialog, some users
may view only one web page while others may view multiple web pages. This
example shows a behavioral hierarchy. In other words, a sequence of activities can
be divided into multiple sessions, and each session can be divided into multiple
dialogs. Similarly, in mobile messaging Apps, a session generally starts when a
user opens the App and lasts until this user closes it. Each session consists of
multiple dialogs. Most dialogs are of single-type usage, such as text, location
sharing, voice, or stream video, while other dialogs are of mixed usages. Second, a
traffic-flow of M observations (packets in this study) usually contains two
sequences an Msize sequence of packet lengths representing the data transmission
of service usages and an (M-1)-size sequence of time delays representing the time
intervals of consecutive packet pairs. In terms of the packet length, as shown in ,
different service usages have different global characteristics (e.g., distribution
properties such as mean and variance of packet lengths, etc.) and local
characteristics (e.g., packet-level features such as forward or backward variances at
important observation
Symmetric key distribution method:
Balanced incomplete block design (BIBD) is a combinatorial design
methodology used in key pre-distribution schemes. BIBD arranges v distinct key
objects of a key pool into b different blocks each block representing a key ring
assigned to a node. Each BIBD design is expressed with a quintuplet where v is
the number of keys, b is the number of key rings, r is the number of nodes sharing
a key, and k is the number of keys in each key ring. Further, each pair of distinct
keys occur together in exactly blocks. Any BIBD design can be expressed with the
equivalent tuple because the relationship always holds.
SYSTEM SPECIFICATION
Hardware Requirements:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 14’ Colour Monitor.
• Mouse : Optical Mouse.
• Ram : 512 Mb.
Software Requirements:
• Operating system : Windows 7 Ultimate.
• Coding Language : ASP.Net with C#
• Front-End : Visual Studio 2012 Professional.
• Data Base : SQL Server 2008.
CONCLUSION
We developed a system for classifying service usages using encrypted
Internet traffic in mobile messaging Apps by jointly modeling behavior structure,
network traffic characteristics, and temporal dependencies. There are four modules
in our system including traffic segmentation, traffic feature extraction, service
usage prediction, and outlier detection and handling. Specifically, we first built a
data collection platform to collect the traffic-flows of in-App usages and the
corresponding usage types reported by mobile users. We then hierarchically
segment these traffic from traffic-flows to sessions to dialogs where each is
assumed to be of individual usage or mixed usages. Also, we extracted the packet
length related features and the time delay related features from traffic-flows to
prepare the training data. In addition, we learned service usage classifiers to
classify these segmented dialogs. Moreover, we detected the anomalous dialogs
with mixed usages and segmented these mixed dialogs into multiple sub-dialogs of
single type usage. Finally, the experimental results on real world WeChat and
WhatsApp traffic data demonstrate the performances of the proposedmethod. With
this system, we showed that the valuable applications for in-App usage analytics
can be enabled to score quality of experiences, profile user behaviors and enhance
customer care.

More Related Content

What's hot

Visualization of Relationship between Social Bookmark Users
Visualization of Relationship between Social Bookmark UsersVisualization of Relationship between Social Bookmark Users
Visualization of Relationship between Social Bookmark UsersKyohei Hamada
 
GAP A Tool for Visualize Web Site in Heterogeneus Mobile Devices
GAP A Tool for Visualize Web Site in Heterogeneus Mobile DevicesGAP A Tool for Visualize Web Site in Heterogeneus Mobile Devices
GAP A Tool for Visualize Web Site in Heterogeneus Mobile DevicesJuan Carlos Olivares Rojas
 
Machine Learning Applications in Grid Computing
Machine Learning Applications in Grid ComputingMachine Learning Applications in Grid Computing
Machine Learning Applications in Grid Computingbutest
 
ONC Direct Project Boot Camp
ONC Direct Project Boot CampONC Direct Project Boot Camp
ONC Direct Project Boot CampBrian Ahier
 
TWO WAY CHAINED PACKETS MARKING TECHNIQUE FOR SECURE COMMUNICATION IN WIRELES...
TWO WAY CHAINED PACKETS MARKING TECHNIQUE FOR SECURE COMMUNICATION IN WIRELES...TWO WAY CHAINED PACKETS MARKING TECHNIQUE FOR SECURE COMMUNICATION IN WIRELES...
TWO WAY CHAINED PACKETS MARKING TECHNIQUE FOR SECURE COMMUNICATION IN WIRELES...pharmaindexing
 

What's hot (7)

USPatents
USPatentsUSPatents
USPatents
 
Qos
QosQos
Qos
 
Visualization of Relationship between Social Bookmark Users
Visualization of Relationship between Social Bookmark UsersVisualization of Relationship between Social Bookmark Users
Visualization of Relationship between Social Bookmark Users
 
GAP A Tool for Visualize Web Site in Heterogeneus Mobile Devices
GAP A Tool for Visualize Web Site in Heterogeneus Mobile DevicesGAP A Tool for Visualize Web Site in Heterogeneus Mobile Devices
GAP A Tool for Visualize Web Site in Heterogeneus Mobile Devices
 
Machine Learning Applications in Grid Computing
Machine Learning Applications in Grid ComputingMachine Learning Applications in Grid Computing
Machine Learning Applications in Grid Computing
 
ONC Direct Project Boot Camp
ONC Direct Project Boot CampONC Direct Project Boot Camp
ONC Direct Project Boot Camp
 
TWO WAY CHAINED PACKETS MARKING TECHNIQUE FOR SECURE COMMUNICATION IN WIRELES...
TWO WAY CHAINED PACKETS MARKING TECHNIQUE FOR SECURE COMMUNICATION IN WIRELES...TWO WAY CHAINED PACKETS MARKING TECHNIQUE FOR SECURE COMMUNICATION IN WIRELES...
TWO WAY CHAINED PACKETS MARKING TECHNIQUE FOR SECURE COMMUNICATION IN WIRELES...
 

Similar to Service usage classification with encrypted

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...IEEEFINALYEARPROJECTS
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...IEEEGLOBALSOFTTECHNOLOGIES
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...IEEEGLOBALSOFTTECHNOLOGIES
 
Sending the data already gathered from the client to the Server
Sending the data already gathered from the client to the ServerSending the data already gathered from the client to the Server
Sending the data already gathered from the client to the Serverhussam242
 
Review paper on web service security
Review paper on web service securityReview paper on web service security
Review paper on web service securityEditor Jacotech
 
Project - UG - BTech IT - Cluster based Approach for Service Discovery using ...
Project - UG - BTech IT - Cluster based Approach for Service Discovery using ...Project - UG - BTech IT - Cluster based Approach for Service Discovery using ...
Project - UG - BTech IT - Cluster based Approach for Service Discovery using ...Yogesh Santhan
 
Service usage classification with encrypted internet traffic in mobile messag...
Service usage classification with encrypted internet traffic in mobile messag...Service usage classification with encrypted internet traffic in mobile messag...
Service usage classification with encrypted internet traffic in mobile messag...Finalyearprojects Toall
 
Automated Traffic Classification And Application Identification Using Machine...
Automated Traffic Classification And Application Identification Using Machine...Automated Traffic Classification And Application Identification Using Machine...
Automated Traffic Classification And Application Identification Using Machine...Jennifer Daniel
 
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICESXML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICESijcsit
 
XML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesXML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesCSEIJJournal
 
M.Phil Computer Science Server Computing Projects
M.Phil Computer Science Server Computing ProjectsM.Phil Computer Science Server Computing Projects
M.Phil Computer Science Server Computing ProjectsVijay Karan
 
M phil-computer-science-server-computing-projects
M phil-computer-science-server-computing-projectsM phil-computer-science-server-computing-projects
M phil-computer-science-server-computing-projectsVijay Karan
 
M.E Computer Science Server Computing Projects
M.E Computer Science Server Computing ProjectsM.E Computer Science Server Computing Projects
M.E Computer Science Server Computing ProjectsVijay Karan
 
A Message-Passing Model For Service Oriented Computing
A Message-Passing Model For Service Oriented ComputingA Message-Passing Model For Service Oriented Computing
A Message-Passing Model For Service Oriented ComputingCheryl Brown
 
Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Ses...
Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Ses...Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Ses...
Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Ses...IOSR Journals
 

Similar to Service usage classification with encrypted (20)

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
 
Sending the data already gathered from the client to the Server
Sending the data already gathered from the client to the ServerSending the data already gathered from the client to the Server
Sending the data already gathered from the client to the Server
 
Cc unit 2 updated
Cc unit 2 updatedCc unit 2 updated
Cc unit 2 updated
 
Review paper on web service security
Review paper on web service securityReview paper on web service security
Review paper on web service security
 
Project - UG - BTech IT - Cluster based Approach for Service Discovery using ...
Project - UG - BTech IT - Cluster based Approach for Service Discovery using ...Project - UG - BTech IT - Cluster based Approach for Service Discovery using ...
Project - UG - BTech IT - Cluster based Approach for Service Discovery using ...
 
Service usage classification with encrypted internet traffic in mobile messag...
Service usage classification with encrypted internet traffic in mobile messag...Service usage classification with encrypted internet traffic in mobile messag...
Service usage classification with encrypted internet traffic in mobile messag...
 
Automated Traffic Classification And Application Identification Using Machine...
Automated Traffic Classification And Application Identification Using Machine...Automated Traffic Classification And Application Identification Using Machine...
Automated Traffic Classification And Application Identification Using Machine...
 
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICESXML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
 
XML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesXML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web Services
 
M.Phil Computer Science Server Computing Projects
M.Phil Computer Science Server Computing ProjectsM.Phil Computer Science Server Computing Projects
M.Phil Computer Science Server Computing Projects
 
M phil-computer-science-server-computing-projects
M phil-computer-science-server-computing-projectsM phil-computer-science-server-computing-projects
M phil-computer-science-server-computing-projects
 
Service view
Service viewService view
Service view
 
M.E Computer Science Server Computing Projects
M.E Computer Science Server Computing ProjectsM.E Computer Science Server Computing Projects
M.E Computer Science Server Computing Projects
 
A Message-Passing Model For Service Oriented Computing
A Message-Passing Model For Service Oriented ComputingA Message-Passing Model For Service Oriented Computing
A Message-Passing Model For Service Oriented Computing
 
Componenets of osb12c
Componenets of osb12cComponenets of osb12c
Componenets of osb12c
 
componenets of osb12c
componenets of osb12ccomponenets of osb12c
componenets of osb12c
 
Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Ses...
Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Ses...Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Ses...
Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Ses...
 

Recently uploaded

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 

Recently uploaded (20)

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 

Service usage classification with encrypted

  • 1. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps ABSTRACT The rapid adoption of mobile messaging Apps has enabled us to collect massive amount of encrypted Internet traffic of mobile messaging. The classification of this traffic into different types of in-App service usages can help for intelligent network management, such as managing network bandwidth budget and providing quality of services. Traditional approaches for classification of Internet traffic rely on packet inspection, such as parsing HTTP headers. However, messaging Apps are increasingly using secure protocols, such as HTTPS and SSL, to transmit data. This imposes significant challenges on the performances of service usage classification by packet inspection. To this end, in this paper, we investigate how to exploit encrypted Internet traffic for classifying in-App usages. Specifically, we develop a system, named CUMMA, for classifying service usages of mobile messaging Apps by jointly modeling user behavioral patterns, network traffic characteristics and temporal dependencies. Along this line, we first segment Internet traffic from traffic-flows into sessions with a number of dialogs in a hierarchical way. Also, we extract the discriminative features of traffic data from two perspectives: (i) packet length and (ii) time delay. Next, we learn a service usage predictor to classify these segmented dialogs into single-type usages or outliers.. Indeed, CUMMA enables mobile analysts to identify service usages and analyze end-user in-App behaviors even for encrypted Internet traffic. Finally, the extensive experiments on real-world messaging data demonstrate the effectiveness and efficiency of the proposed method for service usage classification.
  • 2. ARCHITECTURE SYSTEM ANALYSIS EXISTING SYSTEM A hierarchical segmentation based on the definitions of session and dialog: we first segment each traffic-flow into sessions using a thresholding method; then we segment each session into dialogs by a bottom-up hierarchical clustering based method mixed with thresholding heuristics. The above method can segment the raw Internet traffic into dialogs. Note that most dialogs contain single usage type, and only a few are the mixture of multiple usage types.
  • 3. PROPOSED SYSTEM we developed a system for classifying service usages using encrypted Internet traffic in mobile messaging Apps by jointly modeling behavior structure, network traffic characteristics, and temporal dependencies. There are four modules in our system including traffic segmentation, traffic feature extraction, service usage prediction, and outlier detection and handling. Specifically, we first built a data collection platform to collect the traffic-flows of in-App usages and the corresponding usage types reported by mobile users. We then hierarchically segment these traffic from traffic-flows to sessions to dialogs where each is assumed to be of individual usage or mixed usages. Also, we extracted the packet length related features and the time delay related features from traffic-flows to prepare the training data. In addition, we learned service usage classifiers to classify these segmented dialogs. Moreover, we detected the anomalous dialogs with mixed usages and segmented these mixed dialogs into multiple sub-dialogs of singletype usage. Finally, the experimental results on real world WeChat and WhatsApp traffic data demonstrate the performances of the proposedmethod. With this system, we showed that the valuable applications for in-App usage analytics can be enabled to score quality of experiences, profile user behaviors and enhance customer care. PROPOSED SYSTEM ALGORITHMS  Algorithm to provide efficient search In encryption Algorithm .  A conventionally defined time interval in a schedule. Prime-time television has two- to four-hour-long timeslots.
  • 4. MODULE DESCRIPTION MODULE  Public Cloud Server.  App Messaging.  Timer control.  Traffic flows of consequent service usages  Symmetric key distribution Method. MODULE DESCRIPTION Public Cloud Server: There exist many different security problems in the cloud computing This paper is based on the research results of proxy cryptography, identity-based public key cryptography and remote data integrity checking in public cloud. In some cases, the cryptographic operation will be delegated to the third party, for example proxy. Thus, we have to use the proxy cryptography. Proxy cryptography is a very important cryptography primitive. In 1996, Mambo et al. proposed the notion of the proxy cryptosystem . When the bilinear pairings are brought into the identity- based cryptography, identitybased cryptography becomes efficient and practical. Since identity-based cryptography becomes more efficient because it avoids of the certificate management, more and more experts are apt to study identity-based
  • 5. proxy cryptography. In 2013, Yoon et al. proposed an ID-based proxy signature scheme with message recovery . Chen et al. proposed a proxy signature scheme and a threshold proxy signature scheme from the Weil pairing . By combining the proxy cryptography with encryption technique, some proxy re-encryption schemes are proposed. Liu et al. formalize and construct the attribute-based proxy signature . Guo et al. presented a non-interactive CPA(chosen-plaintext attack)-secure proxy reencryption scheme, which is resistant to collusion attacks in forging re- encryption keys . Many other concrete proxy re-encryption schemes and their applications are also proposed. App Messaging: Recent years have witnessed the increased popularity of mobile messaging Apps, such as WeChat and WhatsApp. Indeed, messaging Apps have become the hubs for most activities of mobile users. For example, messaging Apps help people text each another, share photos, chat, and engage in commercial activities such as paying bills, booking tickets and shopping. Mobile companies monetize their services in messaging Apps. Therefore, service usage analytics in messaging Apps becomes critical for business, because it can help understand in-App behaviors of end users, and thus enables a variety of applications. For instance, it provides in- depth insights into end users and App performances, enhances user experiences, and increases engagement, conversions and monetization. However, a key task of in-App usage analytics is to classify Internet traffic of messaging Apps into different usage types as shown in Table Traditional methods for traffic classification rely on packet inspection by analyzing the TCP or UDP port numbers of an IP packet or reconstructing protocol signatures in its payload For example, an IP packet usually has five tuples of protocol types, source address, source port, destination address and destination port. People estimate the usage types.
  • 6. Timer control: Second, a traffic-flow of M observations (packets in this study) usually contains two sequences: an Msize sequence of packet lengths representing the data transmission of service usages and an (M-1)-size sequence of time delays representing the time intervals of consecutive packet pairs. In terms of the packet length, as shown in, different service usages have different global characteristics (e.g., distribution properties such as mean and variance of packet lengths, etc.) and local characteristics (e.g., packet-level features such as forward or backward variances at important observation positions, etc.). For example, texts are more frequently used, shorter in time, and smaller in data size comparing to stream video call, therefore any traffic intervals with flow rate lower than certain thresholds are likely determined as text streams. Aside from global characteristics, local (i.e., packet-level) characteristics are from the fact that the packet lengths of different usage types vary over observation positions in the sequence of packet lengths. For example, shows the process that a mobile user sends out a text message, and thus generates a pulse in traffic, followed by another pulse representing a text reply. Also, Figure shows that, in stream video call, most packets are fully loaded (i.e., close to 1500 bytes) in the sequence of packet lengths. In terms of time delay, different in-App usages adopt different design logics and control flows for function implementation and different network protocols for packet transmission, and thus show unique characteristics of time delay distribution. For example, shows that, for location sharing, most of packets are sent in the initial phase. However, for short video, data transmission is completed.
  • 7. Traffic flows of consequent service usages: Specifically, we study these patterns from three perspectives: behavioral structure, flow characteristics, and temporal dependencies. First, service usage behaviors in messaging Apps have their unique hierarchical structure. We employ the term of traffic-flow to denote the encrypted network traffic (with only time stamp and packet length information being available) generated by mobile messaging Apps, and the terms of session and dialog to represent the segments of traffic-flow in different granularity. For example, in web browsing, a session is initiated when a user opens the browser, and torn down after the browser being closed. A session usually includes multiple dialogs, each of which starts from a new tab being opened and lasts until this tab is closed. In one dialog, some users may view only one web page while others may view multiple web pages. This example shows a behavioral hierarchy. In other words, a sequence of activities can be divided into multiple sessions, and each session can be divided into multiple dialogs. Similarly, in mobile messaging Apps, a session generally starts when a user opens the App and lasts until this user closes it. Each session consists of multiple dialogs. Most dialogs are of single-type usage, such as text, location sharing, voice, or stream video, while other dialogs are of mixed usages. Second, a traffic-flow of M observations (packets in this study) usually contains two sequences an Msize sequence of packet lengths representing the data transmission of service usages and an (M-1)-size sequence of time delays representing the time intervals of consecutive packet pairs. In terms of the packet length, as shown in , different service usages have different global characteristics (e.g., distribution properties such as mean and variance of packet lengths, etc.) and local characteristics (e.g., packet-level features such as forward or backward variances at important observation
  • 8. Symmetric key distribution method: Balanced incomplete block design (BIBD) is a combinatorial design methodology used in key pre-distribution schemes. BIBD arranges v distinct key objects of a key pool into b different blocks each block representing a key ring assigned to a node. Each BIBD design is expressed with a quintuplet where v is the number of keys, b is the number of key rings, r is the number of nodes sharing a key, and k is the number of keys in each key ring. Further, each pair of distinct keys occur together in exactly blocks. Any BIBD design can be expressed with the equivalent tuple because the relationship always holds. SYSTEM SPECIFICATION Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 14’ Colour Monitor. • Mouse : Optical Mouse. • Ram : 512 Mb. Software Requirements: • Operating system : Windows 7 Ultimate. • Coding Language : ASP.Net with C# • Front-End : Visual Studio 2012 Professional. • Data Base : SQL Server 2008.
  • 9. CONCLUSION We developed a system for classifying service usages using encrypted Internet traffic in mobile messaging Apps by jointly modeling behavior structure, network traffic characteristics, and temporal dependencies. There are four modules in our system including traffic segmentation, traffic feature extraction, service usage prediction, and outlier detection and handling. Specifically, we first built a data collection platform to collect the traffic-flows of in-App usages and the corresponding usage types reported by mobile users. We then hierarchically segment these traffic from traffic-flows to sessions to dialogs where each is assumed to be of individual usage or mixed usages. Also, we extracted the packet length related features and the time delay related features from traffic-flows to prepare the training data. In addition, we learned service usage classifiers to classify these segmented dialogs. Moreover, we detected the anomalous dialogs with mixed usages and segmented these mixed dialogs into multiple sub-dialogs of single type usage. Finally, the experimental results on real world WeChat and WhatsApp traffic data demonstrate the performances of the proposedmethod. With this system, we showed that the valuable applications for in-App usage analytics can be enabled to score quality of experiences, profile user behaviors and enhance customer care.