Reading: Traffic Analysis (SKIM before group presentation 15/9/21, 10-12h)
- Due 15 Sep 2021 by 9:59
- Points None
- Available after 1 Sep 2021 at 8:00
Traffic analysis
Explanation by Sonja:
Due to the short notice, your result of the corresponding quiz will not be taken into account for grading. Skim the papers (start with the first optional one if you haven't heard of traffic analysis, it's a very short summary, not a research paper) before the seminar, and read more thoroughly later. You'll get multiple attempts for the quiz, use it as feedback for yourself.
Explanation by the group:
The first paper lifts how Traffic analysis can be used in a sinister way.
The second paper shows how it can be used in a defensive manner.
Both of them regard Android so they are in a comparable and similar area.
The first optional paper is for those that have no footing in what Traffic Analysis is.
The second option paper is very interesting in how Traffic Analysis can harm TOR users.
Required Reading:
First paper:
Conti, Mauro, et al. "Analyzing android encrypted network traffic to identify user actions." IEEE Transactions on Information Forensics and Security 11.1 (2015): 114-125.
(pdf, log in via KTH to access)
Links to an external site.
Second paper:
Wang, Shanshan, et al. "A mobile malware detection method using behavior features in network traffic." Journal of Network and Computer Applications 133 (2019): 15-25.
(pdf, log in via KTH to access)
Optional:
First Optional:
Awake Arista, Network traffic analysis
(short web article)
Links to an external site.
Second Optional:
Basyoni, Lamiaa, et al. "Traffic analysis attacks on Tor: a survey." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
(pdf via KTH library)