Characterizing Encrypted Application Traffic through Cellular Radio Interface Protocol
- URL: http://arxiv.org/abs/2407.07361v2
- Date: Sat, 20 Jul 2024 16:33:09 GMT
- Title: Characterizing Encrypted Application Traffic through Cellular Radio Interface Protocol
- Authors: Md Ruman Islam, Raja Hasnain Anwar, Spyridon Mastorakis, Muhammad Taqi Raza,
- Abstract summary: We show that 5G radio communication becomes the side channel to precisely infer the user's applications in real-time.
We consider four different categories of applications: online shopping, voice/video conferencing, video streaming, and Over-The-Top (OTT) media platforms.
- Score: 2.199918533021483
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Modern applications are end-to-end encrypted to prevent data from being read or secretly modified. 5G tech nology provides ubiquitous access to these applications without compromising the application-specific performance and latency goals. In this paper, we empirically demonstrate that 5G radio communication becomes the side channel to precisely infer the user's applications in real-time. The key idea lies in observing the 5G physical and MAC layer interactions over time that reveal the application's behavior. The MAC layer receives the data from the application and requests the network to assign the radio resource blocks. The network assigns the radio resources as per application requirements, such as priority, Quality of Service (QoS) needs, amount of data to be transmitted, and buffer size. The adversary can passively observe the radio resources to fingerprint the applications. We empirically demonstrate this attack by considering four different categories of applications: online shopping, voice/video conferencing, video streaming, and Over-The-Top (OTT) media platforms. Finally, we have also demonstrated that an attacker can differentiate various types of applications in real-time within each category.
Related papers
- What If We Had Used a Different App? Reliable Counterfactual KPI Analysis in Wireless Systems [52.499838151272016]
This paper addresses the "what-if" problem of estimating the values of key performance indicators (KPIs) that would have been obtained if a different app had been implemented by the radio access network (RAN)
We propose a conformal-prediction-based counterfactual analysis method for wireless systems that provides reliable "error bars" for the estimated, containing the true with a user-defined probability.
arXiv Detail & Related papers (2024-09-30T18:47:26Z) - Eavesdropping Mobile Apps and Actions through Wireless Traffic in the Open World [4.055413037442821]
Existing traffic analysis attacks mainly target TCP/IP layers or are limited to the closed-world assumption.
We propose MACPrint, a novel system that infers mobile apps and in-app actions based on WiFi MAC layer traffic in the open-world setting.
The experimental results show that MAC-Print can achieve an accuracy of over 96% for recognizing apps and actions in the closed-world setting, and obtains an accuracy of over 86% in the open-world setting.
arXiv Detail & Related papers (2024-08-14T03:03:05Z) - Exploring the Dynamics of Data Transmission in 5G Networks: A Conceptual Analysis [1.3351610617039973]
This conceptual analysis examines the dynamics of data transmission in 5G networks.
It addresses various aspects of sending data from cameras and LiDARs installed on a remote-controlled ferry to a land-control center.
arXiv Detail & Related papers (2024-04-25T11:02:54Z) - SqueezerFaceNet: Reducing a Small Face Recognition CNN Even More Via
Filter Pruning [55.84746218227712]
We develop SqueezerFaceNet, a light face recognition network which less than 1M parameters.
We show that it can be further reduced (up to 40%) without an appreciable loss in performance.
arXiv Detail & Related papers (2023-07-20T08:38:50Z) - Real-time Traffic Classification for 5G NSA Encrypted Data Flows With
Physical Channel Records [3.8998980344852856]
classification of fifth-generation New-Radio (5G-NR) mobile network traffic is an emerging topic in the field of telecommunications.
Traditional approaches such as Deep Packet Inspection (DPI) can not be directly applied to encrypted data flows.
In this study, we examine the real-time encrypted 5G Non-Standalone (NSA) application-level traffic classification using physical channel records.
arXiv Detail & Related papers (2023-07-15T09:32:34Z) - A Study of Designing Compact Audio-Visual Wake Word Spotting System
Based on Iterative Fine-Tuning in Neural Network Pruning [57.28467469709369]
We investigate on designing a compact audio-visual wake word spotting (WWS) system by utilizing visual information.
We introduce a neural network pruning strategy via the lottery ticket hypothesis in an iterative fine-tuning manner (LTH-IF)
The proposed audio-visual system achieves significant performance improvements over the single-modality (audio-only or video-only) system under different noisy conditions.
arXiv Detail & Related papers (2022-02-17T08:26:25Z) - Real-Time GPU-Accelerated Machine Learning Based Multiuser Detection for
5G and Beyond [70.81551587109833]
nonlinear beamforming filters can significantly outperform linear approaches in stationary scenarios with massive connectivity.
One of the main challenges comes from the real-time implementation of these algorithms.
This paper explores the acceleration of APSM-based algorithms through massive parallelization.
arXiv Detail & Related papers (2022-01-13T15:20:45Z) - Attribute Inference Attack of Speech Emotion Recognition in Federated
Learning Settings [56.93025161787725]
Federated learning (FL) is a distributed machine learning paradigm that coordinates clients to train a model collaboratively without sharing local data.
We propose an attribute inference attack framework that infers sensitive attribute information of the clients from shared gradients or model parameters.
We show that the attribute inference attack is achievable for SER systems trained using FL.
arXiv Detail & Related papers (2021-12-26T16:50:42Z) - DeepRT: A Soft Real Time Scheduler for Computer Vision Applications on
the Edge [17.725750510361884]
This paper focuses on applications which make soft real time requests to perform inference on their data.
DeepRT provides latency guarantee to the requests while maintaining high overall system throughput.
Our evaluation results show that DeepRT outperforms state-of-the-art works in terms of the number of deadline misses and throughput.
arXiv Detail & Related papers (2021-05-05T00:08:17Z) - A Deep Learning Approach for Low-Latency Packet Loss Concealment of
Audio Signals in Networked Music Performance Applications [66.56753488329096]
Networked Music Performance (NMP) is envisioned as a potential game changer among Internet applications.
This article describes a technique for predicting lost packet content in real-time using a deep learning approach.
arXiv Detail & Related papers (2020-07-14T15:51:52Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.