Smartphone Application Identification by Convolutional Neural Network

  • Shuang ZhaoEmail author
  • Shuhui Chen
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 251)


Mobile traffic has received much attention within the field of network security and management due to the rapid development of mobile networks. Unlike fixed wired workstation traffic, mobile traffic is mostly carried over HTTP/HTTPS, which brings new challenges to traditional traffic identification methods. Although there have been some attempts to address this problem with side-channel traffic information and machine learning, the effectiveness of these methods majorly depends on predefined statistics features. In this paper, we presented an approach based on convolutional neural network without explicit feature extraction process. And owing to no payload inspection requirement, this method also works well even encrypted traffic appears. Six instant message applications are used to verify our approach. The evaluation shows the proposed approach can achieve more than 96% accuracy. Additionally, we also discussed how this approach performed under real-world conditions.


Application identification Convolutional neural network Mobile traffic Encrypted traffic Network management 


  1. 1.
  2. 2.
    The 40th China Statistical Report on Internet Development.
  3. 3.
    Gerard, D., Arash, L., Mamun, M., Ali, G.: Characterization of encrypted and VPN traffic using time-related features. In: The International Conference on Information Systems Security and Privacy, Italy, pp. 94–98 (2016)Google Scholar
  4. 4.
    Zhang, J., Chen, X., Xiang, Y., Zhou, W.-L., Wu, J.: Robust network traffic classification. J. IEEE/ACM Trans. Netw. 23(4), 1257–1270 (2015)CrossRefGoogle Scholar
  5. 5.
    Taylor, V., Spolaor, R., Conti, M., Martinovic, I.: AppScanner: automatic fingerprinting of smartphone apps from encrypted network traffic. In: IEEE Symposium on Security and Privacy, pp. 439–454 (2016)Google Scholar
  6. 6.
    Xu, Q., Ermanet, J., Gerber, A., Mao, Z., Pang, J., Venkaraeaman, S.: Identifying diverse usage behaviors of smartphone apps. In: Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, Berlin, pp. 329–344 (2011)Google Scholar
  7. 7.
    Dai, S.-F., Tongaonkar, A., Wang, X.-Y., Nucci, A., Song, D.: NetworkProfiler: towards automatic fingerprinting of Android apps. In: Proceeding IEEE INFOCOM, Italy, pp. 809–817 (2013)Google Scholar
  8. 8.
    Miskovic, S., Lee, G.M., Liao, Y., Baldi, M.: AppPrint: automatic fingerprinting of mobile applications in network traffic. In: Mirkovic, J., Liu, Y. (eds.) PAM 2015. LNCS, vol. 8995, pp. 57–69. Springer, Cham (2015). Scholar
  9. 9.
    Wang Q.-L., Yahyavi, A., Kemme, B., He, W.-B.: I know what you did on your smartphone: inferring app usage over encrypted data traffic. In: Communications and Networking Symposium, pp. 433–441 (2015)Google Scholar
  10. 10.
    Taylor, V., Spolaor, R., Conti, M., Martinovic, I.: Robust smartphone app identification via encrypted network traffic analysis. J IEEE Trans. Inf. Forensics Secur. 13, 63–78 (2018)CrossRefGoogle Scholar
  11. 11.
    Alan, F., Kaur, J.: Can android applications be identified using only TCP/IP headers of their launch time traffic? In: Wireless Network Security, pp. 61–66 (2016)Google Scholar
  12. 12.
    Chen, Z.-Y., Yu, B.-W., Zhang, Y., Zhang, J.-Z., Xu, J.-D.: Automatic mobile application traffic identification by convolutional neural networks. In: Trustcom/bigdatase/ispa, pp. 301–307(2017)Google Scholar
  13. 13.
    Lotfollahi, M., Zade, R., Siavoshani, M., Saberian, M.: Deep Packet: A Novel Approach for Encrypted Traffic Classification Using Deep Learning. arXiv (2017)Google Scholar
  14. 14.
    Wang, W., Zhu, M., Wang, J.-L., Zeng, X.-W., Yang, Z.-Z.: End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: IEEE International Conference on Intelligence & Security Informatics, pp. 43–48. IEEE Press, Beijing (2017)Google Scholar
  15. 15.
    Wang, W., Zhu, M., Zeng, X.-W., Ye, X.-Z., Sheng, Y.-Q.: Malware traffic classification using convolutional neural network for representation learning. In: 2017 International Conference on Information Networking, pp. 712–717. IEEE Press, Da Nang (2017)Google Scholar
  16. 16.
  17. 17.
  18. 18.
    Keras: The Python Deep Learning library.
  19. 19.
    Weka 3: Data Mining Software in Java.

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018

Authors and Affiliations

  1. 1.College of ComputerNational University of Defense TechnologyChangshaChina

Personalised recommendations