A Survey on Analyzing Encrypted Network Traffic of Mobile Devices.
Ashutosh BhatiaAnkit AgrawalAyush BahugunaKamlesh TiwariK. HaribabuDeepak VishwakarmaPublished in: CoRR (2020)
Keyphrases
- network traffic
- mobile devices
- intrusion detection
- network security
- anomaly detection
- computer networks
- traffic analysis
- mobile phone
- intrusion detection system
- network management
- mobile applications
- network monitoring
- traffic data
- network bandwidth
- network intrusion detection
- context aware
- mobile computing
- mobile users
- internet traffic
- network traffic data
- traffic volume
- mobile environments
- detecting anomalous
- machine learning
- long range dependence
- mobile networks
- normal traffic
- feature selection