Research prospects of user information detection from encrypted traffic of mobile devices

Encrypted traffic analysis of mobile devices can obtain multiple types of user information in an active or passive way, which provides protection for network security management and user privacy protection.The basic principles and key methods of data collection, feature selection, models and methods...

Full description

Saved in:
Bibliographic Details
Main Authors: Tengfei ZHANG, Shunzheng YU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2021-02-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021040/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539257898893312
author Tengfei ZHANG
Shunzheng YU
author_facet Tengfei ZHANG
Shunzheng YU
author_sort Tengfei ZHANG
collection DOAJ
description Encrypted traffic analysis of mobile devices can obtain multiple types of user information in an active or passive way, which provides protection for network security management and user privacy protection.The basic principles and key methods of data collection, feature selection, models and methods, and evaluation systems involved in these user information detection were analyzed and summarized.The problems in the existing projects were summarized, as well as the future research directions and challenges.
format Article
id doaj-art-10be01c9dffd4785a4cb547e09097e37
institution Kabale University
issn 1000-436X
language zho
publishDate 2021-02-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-10be01c9dffd4785a4cb547e09097e372025-01-14T07:21:41ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2021-02-014215416759740421Research prospects of user information detection from encrypted traffic of mobile devicesTengfei ZHANGShunzheng YUEncrypted traffic analysis of mobile devices can obtain multiple types of user information in an active or passive way, which provides protection for network security management and user privacy protection.The basic principles and key methods of data collection, feature selection, models and methods, and evaluation systems involved in these user information detection were analyzed and summarized.The problems in the existing projects were summarized, as well as the future research directions and challenges.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021040/mobile deviceencrypted traffic analysisnetwork securityprivacy protectioninformation detection
spellingShingle Tengfei ZHANG
Shunzheng YU
Research prospects of user information detection from encrypted traffic of mobile devices
Tongxin xuebao
mobile device
encrypted traffic analysis
network security
privacy protection
information detection
title Research prospects of user information detection from encrypted traffic of mobile devices
title_full Research prospects of user information detection from encrypted traffic of mobile devices
title_fullStr Research prospects of user information detection from encrypted traffic of mobile devices
title_full_unstemmed Research prospects of user information detection from encrypted traffic of mobile devices
title_short Research prospects of user information detection from encrypted traffic of mobile devices
title_sort research prospects of user information detection from encrypted traffic of mobile devices
topic mobile device
encrypted traffic analysis
network security
privacy protection
information detection
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021040/
work_keys_str_mv AT tengfeizhang researchprospectsofuserinformationdetectionfromencryptedtrafficofmobiledevices
AT shunzhengyu researchprospectsofuserinformationdetectionfromencryptedtrafficofmobiledevices