Research prospects of user information detection from encrypted traffic of mobile devices
Encrypted traffic analysis of mobile devices can obtain multiple types of user information in an active or passive way, which provides protection for network security management and user privacy protection.The basic principles and key methods of data collection, feature selection, models and methods...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2021-02-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021040/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539257898893312 |
---|---|
author | Tengfei ZHANG Shunzheng YU |
author_facet | Tengfei ZHANG Shunzheng YU |
author_sort | Tengfei ZHANG |
collection | DOAJ |
description | Encrypted traffic analysis of mobile devices can obtain multiple types of user information in an active or passive way, which provides protection for network security management and user privacy protection.The basic principles and key methods of data collection, feature selection, models and methods, and evaluation systems involved in these user information detection were analyzed and summarized.The problems in the existing projects were summarized, as well as the future research directions and challenges. |
format | Article |
id | doaj-art-10be01c9dffd4785a4cb547e09097e37 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2021-02-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-10be01c9dffd4785a4cb547e09097e372025-01-14T07:21:41ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2021-02-014215416759740421Research prospects of user information detection from encrypted traffic of mobile devicesTengfei ZHANGShunzheng YUEncrypted traffic analysis of mobile devices can obtain multiple types of user information in an active or passive way, which provides protection for network security management and user privacy protection.The basic principles and key methods of data collection, feature selection, models and methods, and evaluation systems involved in these user information detection were analyzed and summarized.The problems in the existing projects were summarized, as well as the future research directions and challenges.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021040/mobile deviceencrypted traffic analysisnetwork securityprivacy protectioninformation detection |
spellingShingle | Tengfei ZHANG Shunzheng YU Research prospects of user information detection from encrypted traffic of mobile devices Tongxin xuebao mobile device encrypted traffic analysis network security privacy protection information detection |
title | Research prospects of user information detection from encrypted traffic of mobile devices |
title_full | Research prospects of user information detection from encrypted traffic of mobile devices |
title_fullStr | Research prospects of user information detection from encrypted traffic of mobile devices |
title_full_unstemmed | Research prospects of user information detection from encrypted traffic of mobile devices |
title_short | Research prospects of user information detection from encrypted traffic of mobile devices |
title_sort | research prospects of user information detection from encrypted traffic of mobile devices |
topic | mobile device encrypted traffic analysis network security privacy protection information detection |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021040/ |
work_keys_str_mv | AT tengfeizhang researchprospectsofuserinformationdetectionfromencryptedtrafficofmobiledevices AT shunzhengyu researchprospectsofuserinformationdetectionfromencryptedtrafficofmobiledevices |