Connection Pattern Based Android Network Traffic Clustering

被引:0
|
作者
Chen, Chunlei [1 ]
Zhang, Huixiang [2 ]
Qi, Ming [3 ]
Zhang, Yonghui [1 ]
Zhang, Peng [1 ,4 ]
机构
[1] Weifang Univ, Sch Comp Engn, Weifang, Peoples R China
[2] Northwestern Polytech Univ, Sch Automat, Xian, Shaanxi, Peoples R China
[3] Weifang Vocat Coll, Coll Informat Engn, Weifang, Peoples R China
[4] Shandong Univ, Sch Informat Sci & Engn, Jinan, Shandong, Peoples R China
来源
PROCEEDINGS OF 2018 IEEE 4TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2018) | 2018年
基金
中国国家自然科学基金;
关键词
Android; network traffic clustering; network connection pattern;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network traffic clustering plays a fundamental role in network flow analysis. Existing Android network traffic clustering methods have three shortages. First, these methods always focus on partial features, such as port numbers, with the absence of holistic features. Second, existing methods sometimes fail to work if payload of one network package is encrypted. Third, some methods are valid only for several specific application-layer network protocols. To handle these inefficiencies, we adopted network-connection-pattern based features to facilitate Android network traffic clustering. First, a record platform was constructed. This platform executed 575 Android applications and recorded network traffic. Second, we obtained input datasets of clustering through the record platform and extracted features based on network connection pattern. Then, we clustered the input datasets. Finally, we employed Information Gain algorithm and Fast Correlation-Based Filter algorithm separately to rank contributions of features according to the clustering results. Experiments show that the network-connection-pattern-based features lead to more efficient clustering result than the port-number-based features.
引用
收藏
页码:844 / 848
页数:5
相关论文
共 50 条
  • [1] Network security management with traffic pattern clustering
    Tao-Wei Chiou
    Shi-Chun Tsai
    Yi-Bing Lin
    Soft Computing, 2014, 18 : 1757 - 1770
  • [2] Network security management with traffic pattern clustering
    Chiou, Tao-Wei
    Tsai, Shi-Chun
    Lin, Yi-Bing
    SOFT COMPUTING, 2014, 18 (09) : 1757 - 1770
  • [3] Fuzzy Clustering based Traffic Pattern Identification
    Li, Tianjun
    Chen, Long
    Chen, C. L. Philip
    2016 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE), 2016, : 1181 - 1187
  • [4] Clustering Android Malware Families by Http Traffic
    Aresu, Marco
    Ariu, Davide
    Ahmadi, Mansour
    Maiorca, Davide
    Giacinto, Giorgio
    2015 10TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), 2015, : 128 - 135
  • [5] Research of Android Malware Detection Based on Network Traffic Monitoring
    Li, Jun
    Zhai, Lidong
    Zhang, Xinyou
    Quan, Daiyong
    PROCEEDINGS OF THE 2014 9TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), 2014, : 1739 - +
  • [6] Traffic Pattern based Virtual Network Embedding
    Blenk, Andreas
    Kellerer, Wolfgang
    CONEXT STUDENT WORKSHOP '13, 2013, : 23 - 25
  • [7] Novel Approach for Network Traffic Pattern Analysis using Clustering-based Collective Anomaly Detection
    Ahmed M.
    Mahmood A.N.
    Annals of Data Science, 2015, 2 (1) : 111 - 130
  • [8] A traffic-based evolutionary algorithm for network clustering
    Naldi, Maurizio
    Salcedo-Sanz, Sancho
    Carro-Calvo, Leopoldo
    Laura, Luigi
    Portilla-Figueras, Antonio
    Italiano, Giuseppe F.
    APPLIED SOFT COMPUTING, 2013, 13 (11) : 4303 - 4319
  • [9] Interactive Network Clustering Layout Method Based on Implicit Connection
    Hu, Huaquan
    Wu, Lingda
    Yu, Ronghuan
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 339 - 342
  • [10] Android App Recommendation Approach Based on Network Traffic Measurement and Analysis
    Su, Xin
    Zhang, Dafang
    Li, Wenjia
    Li, Wenwei
    2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2015, : 988 - 994