SlideShare a Scribd company logo
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING
PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET
PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING .
CELL: +91 8870791415
Mail to: finalyearprojects2all@gmail.com
Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
Abstract
The rapid adoption of mobile messaging Apps has enabled us to collect massive amount
of encrypted Internet traffic of mobile messaging. The classification of this traffic into different
types of in-App service usages can help for intelligent network management, such as managing
network bandwidth budget and providing quality of services. Traditional approaches for
classification of Internet traffic rely on packet inspection, such as parsing HTTP headers.
However, messaging Apps are increasingly using secure protocols, such as HTTPS and SSL, to
transmit data. This imposes significant challenges on the performances of service usage
classification by packet inspection. To this end, in this paper, we investigate how to exploit
encrypted Internet traffic for classifying in-App usages. Specifically, we develop a system,
named CUMMA, for classifying service usages of mobile messaging Apps by jointly modeling
user behavioral patterns, network traffic characteristics and temporal dependencies. Along this
line, we first segment Internet traffic from traffic-flows into sessions with a number of dialogs in
a hierarchical way. Also, we extract the discriminative features of traffic data from two
perspectives: (i) packet length and (ii) time delay. Next, we learn a service usage predictor to
classify these segmented dialogs into single-type usages or outliers. In addition, we design a
clustering Hidden Markov Model (HMM) based method to detect mixed dialogs from outliers
and decompose mixed dialogs into sub-dialogs of single-type usage. Indeed, CUMMA enables
mobile analysts to identify service usages and analyze end-user in-App behaviors even for
encrypted Internet traffic. Finally, the extensive experiments on real-world messaging data
demonstrate the effectiveness and efficiency of the proposed method for service usage
classification.
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING
PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET
PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING .
CELL: +91 8870791415
Mail to: finalyearprojects2all@gmail.com
System Specification
System Requirements:
Hardware Requirements:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING
PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET
PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING .
CELL: +91 8870791415
Mail to: finalyearprojects2all@gmail.com
• Mouse : Logitech.
• Ram : 512 Mb.
Software Requirements:
• Operating system : - Windows 7. 32 bit
• Coding Language : C#.net 4.0
• Data Base : SQL Server 2008
Ad

Recommended

Stochastic load balancing for virtual resource management in datacenters
Stochastic load balancing for virtual resource management in datacenters
Finalyearprojects Toall
 
Organizationconnectivity
Organizationconnectivity
lpress
 
A Multipath Connection Model for Traffic Matrices
A Multipath Connection Model for Traffic Matrices
IJERA Editor
 
WebAccel: Accelerating Web access for low-bandwidth hosts
WebAccel: Accelerating Web access for low-bandwidth hosts
Zhenyun Zhuang
 
Client-side web acceleration for low-bandwidth hosts
Client-side web acceleration for low-bandwidth hosts
Zhenyun Zhuang
 
presentation_SB_v01
presentation_SB_v01
Salvatore Balzano
 
Evaluation of models for predicting user’s next request in web usage mining
Evaluation of models for predicting user’s next request in web usage mining
IJCI JOURNAL
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detection
Gyan Prakash
 
Week10
Week10
s1200023
 
EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...
EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...
IJNSA Journal
 
Performance analysis of routing protocol in MANET
Performance analysis of routing protocol in MANET
jannahyusoff1
 
Improving the search mechanism for unstructured peer to-peer networks using t...
Improving the search mechanism for unstructured peer to-peer networks using t...
Aditya Kumar
 
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
SBGC
 
Networking Project/Thesis Report
Networking Project/Thesis Report
Jayed Imran
 
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...
dbpublications
 
Service usage classification with encrypted
Service usage classification with encrypted
Kamal Spring
 
Social Media Android APP
Social Media Android APP
RADHERAMANTIWARI
 
Scaling habits of ASP.NET
Scaling habits of ASP.NET
David Giard
 
Mobile Network Performance Testing
Mobile Network Performance Testing
XBOSoft
 
PHP At 5000 Requests Per Second: Hootsuite’s Scaling Story
PHP At 5000 Requests Per Second: Hootsuite’s Scaling Story
vanphp
 
InfoSecurity Europe 2017 - On The Hunt for Advanced Attacks? C&C Channels are...
InfoSecurity Europe 2017 - On The Hunt for Advanced Attacks? C&C Channels are...
Moshe Zioni
 
Network Measurement and Monitori - Assigment 1, Group3, "Classification"
Network Measurement and Monitori - Assigment 1, Group3, "Classification"
Valentin Thirion
 
Tuenti Tech Teams. Frontend, Backend, Systems and more, working together
Tuenti Tech Teams. Frontend, Backend, Systems and more, working together
Tuenti
 
ASHISH CV
ASHISH CV
Ashish R. Singh
 
Ankush_Goyal_Resume_2years_Exp
Ankush_Goyal_Resume_2years_Exp
Ankush Goyal
 
Ranjitha_R_V_Resume
Ranjitha_R_V_Resume
Ranjitha Madhu
 
Freelance
Freelance
Vinay Ratra
 
Aman Sharma
Aman Sharma
amansharma1990
 
Work Measurement Application - Ghent Internship Report - Adel Belasker
Work Measurement Application - Ghent Internship Report - Adel Belasker
Adel Belasker
 
Capacity Planning for fun & profit
Capacity Planning for fun & profit
Rodrigo Campos
 

More Related Content

What's hot (6)

Week10
Week10
s1200023
 
EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...
EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...
IJNSA Journal
 
Performance analysis of routing protocol in MANET
Performance analysis of routing protocol in MANET
jannahyusoff1
 
Improving the search mechanism for unstructured peer to-peer networks using t...
Improving the search mechanism for unstructured peer to-peer networks using t...
Aditya Kumar
 
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
SBGC
 
Networking Project/Thesis Report
Networking Project/Thesis Report
Jayed Imran
 
EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...
EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...
IJNSA Journal
 
Performance analysis of routing protocol in MANET
Performance analysis of routing protocol in MANET
jannahyusoff1
 
Improving the search mechanism for unstructured peer to-peer networks using t...
Improving the search mechanism for unstructured peer to-peer networks using t...
Aditya Kumar
 
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
SBGC
 
Networking Project/Thesis Report
Networking Project/Thesis Report
Jayed Imran
 

Similar to Service usage classification with encrypted internet traffic in mobile messaging apps (20)

A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...
dbpublications
 
Service usage classification with encrypted
Service usage classification with encrypted
Kamal Spring
 
Social Media Android APP
Social Media Android APP
RADHERAMANTIWARI
 
Scaling habits of ASP.NET
Scaling habits of ASP.NET
David Giard
 
Mobile Network Performance Testing
Mobile Network Performance Testing
XBOSoft
 
PHP At 5000 Requests Per Second: Hootsuite’s Scaling Story
PHP At 5000 Requests Per Second: Hootsuite’s Scaling Story
vanphp
 
InfoSecurity Europe 2017 - On The Hunt for Advanced Attacks? C&C Channels are...
InfoSecurity Europe 2017 - On The Hunt for Advanced Attacks? C&C Channels are...
Moshe Zioni
 
Network Measurement and Monitori - Assigment 1, Group3, "Classification"
Network Measurement and Monitori - Assigment 1, Group3, "Classification"
Valentin Thirion
 
Tuenti Tech Teams. Frontend, Backend, Systems and more, working together
Tuenti Tech Teams. Frontend, Backend, Systems and more, working together
Tuenti
 
ASHISH CV
ASHISH CV
Ashish R. Singh
 
Ankush_Goyal_Resume_2years_Exp
Ankush_Goyal_Resume_2years_Exp
Ankush Goyal
 
Ranjitha_R_V_Resume
Ranjitha_R_V_Resume
Ranjitha Madhu
 
Freelance
Freelance
Vinay Ratra
 
Aman Sharma
Aman Sharma
amansharma1990
 
Work Measurement Application - Ghent Internship Report - Adel Belasker
Work Measurement Application - Ghent Internship Report - Adel Belasker
Adel Belasker
 
Capacity Planning for fun & profit
Capacity Planning for fun & profit
Rodrigo Campos
 
Airtel-BML
Airtel-BML
Thrifty Kapila
 
Profiling for Grown-Ups
Profiling for Grown-Ups
Johann-Peter Hartmann
 
Network Testing ques
Network Testing ques
Pragya Rastogi
 
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
Engr. Md. Jamal Uddin Rayhan
 
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...
dbpublications
 
Service usage classification with encrypted
Service usage classification with encrypted
Kamal Spring
 
Scaling habits of ASP.NET
Scaling habits of ASP.NET
David Giard
 
Mobile Network Performance Testing
Mobile Network Performance Testing
XBOSoft
 
PHP At 5000 Requests Per Second: Hootsuite’s Scaling Story
PHP At 5000 Requests Per Second: Hootsuite’s Scaling Story
vanphp
 
InfoSecurity Europe 2017 - On The Hunt for Advanced Attacks? C&C Channels are...
InfoSecurity Europe 2017 - On The Hunt for Advanced Attacks? C&C Channels are...
Moshe Zioni
 
Network Measurement and Monitori - Assigment 1, Group3, "Classification"
Network Measurement and Monitori - Assigment 1, Group3, "Classification"
Valentin Thirion
 
Tuenti Tech Teams. Frontend, Backend, Systems and more, working together
Tuenti Tech Teams. Frontend, Backend, Systems and more, working together
Tuenti
 
Ankush_Goyal_Resume_2years_Exp
Ankush_Goyal_Resume_2years_Exp
Ankush Goyal
 
Work Measurement Application - Ghent Internship Report - Adel Belasker
Work Measurement Application - Ghent Internship Report - Adel Belasker
Adel Belasker
 
Capacity Planning for fun & profit
Capacity Planning for fun & profit
Rodrigo Campos
 
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
Engr. Md. Jamal Uddin Rayhan
 
Ad

More from Finalyearprojects Toall (17)

Ieee 2018 2019 project titiles
Ieee 2018 2019 project titiles
Finalyearprojects Toall
 
Video stream analysis in clouds an object detection and classification frame...
Video stream analysis in clouds an object detection and classification frame...
Finalyearprojects Toall
 
Unlicensed spectra fusion and interference coordination for lte systems
Unlicensed spectra fusion and interference coordination for lte systems
Finalyearprojects Toall
 
Text mining the contributors to rail accidents
Text mining the contributors to rail accidents
Finalyearprojects Toall
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
Finalyearprojects Toall
 
On the performance impact of data access middleware for no sql data stores
On the performance impact of data access middleware for no sql data stores
Finalyearprojects Toall
 
Minimizing radio resource usage for machine to-machine communications through...
Minimizing radio resource usage for machine to-machine communications through...
Finalyearprojects Toall
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
Finalyearprojects Toall
 
Identity based private matching over outsourced encrypted datasets
Identity based private matching over outsourced encrypted datasets
Finalyearprojects Toall
 
Follow me cloud-when cloud services follow mobile users
Follow me cloud-when cloud services follow mobile users
Finalyearprojects Toall
 
Follow me cloud-when cloud services follow mobile users
Follow me cloud-when cloud services follow mobile users
Finalyearprojects Toall
 
Distributed and fair beaconing rate adaptation for congestion control in vehi...
Distributed and fair beaconing rate adaptation for congestion control in vehi...
Finalyearprojects Toall
 
Assurance of security and privacy requirements for cloud deployment model
Assurance of security and privacy requirements for cloud deployment model
Finalyearprojects Toall
 
An optimization framework for mobile data collection in energy harvesting wir...
An optimization framework for mobile data collection in energy harvesting wir...
Finalyearprojects Toall
 
A novel statistical cost model and an algorithm for efficient application off...
A novel statistical cost model and an algorithm for efficient application off...
Finalyearprojects Toall
 
A data and task co scheduling algorithm for scientific cloud workflows
A data and task co scheduling algorithm for scientific cloud workflows
Finalyearprojects Toall
 
A context aware service evaluation approach over big data for cloud applications
A context aware service evaluation approach over big data for cloud applications
Finalyearprojects Toall
 
Video stream analysis in clouds an object detection and classification frame...
Video stream analysis in clouds an object detection and classification frame...
Finalyearprojects Toall
 
Unlicensed spectra fusion and interference coordination for lte systems
Unlicensed spectra fusion and interference coordination for lte systems
Finalyearprojects Toall
 
Text mining the contributors to rail accidents
Text mining the contributors to rail accidents
Finalyearprojects Toall
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
Finalyearprojects Toall
 
On the performance impact of data access middleware for no sql data stores
On the performance impact of data access middleware for no sql data stores
Finalyearprojects Toall
 
Minimizing radio resource usage for machine to-machine communications through...
Minimizing radio resource usage for machine to-machine communications through...
Finalyearprojects Toall
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
Finalyearprojects Toall
 
Identity based private matching over outsourced encrypted datasets
Identity based private matching over outsourced encrypted datasets
Finalyearprojects Toall
 
Follow me cloud-when cloud services follow mobile users
Follow me cloud-when cloud services follow mobile users
Finalyearprojects Toall
 
Follow me cloud-when cloud services follow mobile users
Follow me cloud-when cloud services follow mobile users
Finalyearprojects Toall
 
Distributed and fair beaconing rate adaptation for congestion control in vehi...
Distributed and fair beaconing rate adaptation for congestion control in vehi...
Finalyearprojects Toall
 
Assurance of security and privacy requirements for cloud deployment model
Assurance of security and privacy requirements for cloud deployment model
Finalyearprojects Toall
 
An optimization framework for mobile data collection in energy harvesting wir...
An optimization framework for mobile data collection in energy harvesting wir...
Finalyearprojects Toall
 
A novel statistical cost model and an algorithm for efficient application off...
A novel statistical cost model and an algorithm for efficient application off...
Finalyearprojects Toall
 
A data and task co scheduling algorithm for scientific cloud workflows
A data and task co scheduling algorithm for scientific cloud workflows
Finalyearprojects Toall
 
A context aware service evaluation approach over big data for cloud applications
A context aware service evaluation approach over big data for cloud applications
Finalyearprojects Toall
 
Ad

Recently uploaded (20)

Photo chemistry Power Point Presentation
Photo chemistry Power Point Presentation
mprpgcwa2024
 
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
mprpgcwa2024
 
LDMMIA Shop & Student News Summer Solstice 25
LDMMIA Shop & Student News Summer Solstice 25
LDM & Mia eStudios
 
Aprendendo Arquitetura Framework Salesforce - Dia 02
Aprendendo Arquitetura Framework Salesforce - Dia 02
Mauricio Alexandre Silva
 
University of Ghana Cracks Down on Misconduct: Over 100 Students Sanctioned
University of Ghana Cracks Down on Misconduct: Over 100 Students Sanctioned
Kweku Zurek
 
How to use _name_search() method in Odoo 18
How to use _name_search() method in Odoo 18
Celine George
 
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
nabilahk908
 
Q1_TLE 8_Week 1- Day 1 tools and equipment
Q1_TLE 8_Week 1- Day 1 tools and equipment
clairenotado3
 
HistoPathology Ppt. Arshita Gupta for Diploma
HistoPathology Ppt. Arshita Gupta for Diploma
arshitagupta674
 
OBSESSIVE COMPULSIVE DISORDER.pptx IN 5TH SEMESTER B.SC NURSING, 2ND YEAR GNM...
OBSESSIVE COMPULSIVE DISORDER.pptx IN 5TH SEMESTER B.SC NURSING, 2ND YEAR GNM...
parmarjuli1412
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 6-14-2025.pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 6-14-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
ENGLISH-5 Q1 Lesson 1.pptx - Story Elements
ENGLISH-5 Q1 Lesson 1.pptx - Story Elements
Mayvel Nadal
 
NSUMD_M1 Library Orientation_June 11, 2025.pptx
NSUMD_M1 Library Orientation_June 11, 2025.pptx
Julie Sarpy
 
K12 Tableau User Group virtual event June 18, 2025
K12 Tableau User Group virtual event June 18, 2025
dogden2
 
List View Components in Odoo 18 - Odoo Slides
List View Components in Odoo 18 - Odoo Slides
Celine George
 
How payment terms are configured in Odoo 18
How payment terms are configured in Odoo 18
Celine George
 
INDUCTIVE EFFECT slide for first prof pharamacy students
INDUCTIVE EFFECT slide for first prof pharamacy students
SHABNAM FAIZ
 
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT Kharagpur Quiz Club
 
A Visual Introduction to the Prophet Jeremiah
A Visual Introduction to the Prophet Jeremiah
Steve Thomason
 
Public Health For The 21st Century 1st Edition Judy Orme Jane Powell
Public Health For The 21st Century 1st Edition Judy Orme Jane Powell
trjnesjnqg7801
 
Photo chemistry Power Point Presentation
Photo chemistry Power Point Presentation
mprpgcwa2024
 
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
mprpgcwa2024
 
LDMMIA Shop & Student News Summer Solstice 25
LDMMIA Shop & Student News Summer Solstice 25
LDM & Mia eStudios
 
Aprendendo Arquitetura Framework Salesforce - Dia 02
Aprendendo Arquitetura Framework Salesforce - Dia 02
Mauricio Alexandre Silva
 
University of Ghana Cracks Down on Misconduct: Over 100 Students Sanctioned
University of Ghana Cracks Down on Misconduct: Over 100 Students Sanctioned
Kweku Zurek
 
How to use _name_search() method in Odoo 18
How to use _name_search() method in Odoo 18
Celine George
 
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
nabilahk908
 
Q1_TLE 8_Week 1- Day 1 tools and equipment
Q1_TLE 8_Week 1- Day 1 tools and equipment
clairenotado3
 
HistoPathology Ppt. Arshita Gupta for Diploma
HistoPathology Ppt. Arshita Gupta for Diploma
arshitagupta674
 
OBSESSIVE COMPULSIVE DISORDER.pptx IN 5TH SEMESTER B.SC NURSING, 2ND YEAR GNM...
OBSESSIVE COMPULSIVE DISORDER.pptx IN 5TH SEMESTER B.SC NURSING, 2ND YEAR GNM...
parmarjuli1412
 
ENGLISH-5 Q1 Lesson 1.pptx - Story Elements
ENGLISH-5 Q1 Lesson 1.pptx - Story Elements
Mayvel Nadal
 
NSUMD_M1 Library Orientation_June 11, 2025.pptx
NSUMD_M1 Library Orientation_June 11, 2025.pptx
Julie Sarpy
 
K12 Tableau User Group virtual event June 18, 2025
K12 Tableau User Group virtual event June 18, 2025
dogden2
 
List View Components in Odoo 18 - Odoo Slides
List View Components in Odoo 18 - Odoo Slides
Celine George
 
How payment terms are configured in Odoo 18
How payment terms are configured in Odoo 18
Celine George
 
INDUCTIVE EFFECT slide for first prof pharamacy students
INDUCTIVE EFFECT slide for first prof pharamacy students
SHABNAM FAIZ
 
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT Kharagpur Quiz Club
 
A Visual Introduction to the Prophet Jeremiah
A Visual Introduction to the Prophet Jeremiah
Steve Thomason
 
Public Health For The 21st Century 1st Edition Judy Orme Jane Powell
Public Health For The 21st Century 1st Edition Judy Orme Jane Powell
trjnesjnqg7801
 

Service usage classification with encrypted internet traffic in mobile messaging apps

  • 1. IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING . CELL: +91 8870791415 Mail to: [email protected] Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps Abstract The rapid adoption of mobile messaging Apps has enabled us to collect massive amount of encrypted Internet traffic of mobile messaging. The classification of this traffic into different types of in-App service usages can help for intelligent network management, such as managing network bandwidth budget and providing quality of services. Traditional approaches for classification of Internet traffic rely on packet inspection, such as parsing HTTP headers. However, messaging Apps are increasingly using secure protocols, such as HTTPS and SSL, to transmit data. This imposes significant challenges on the performances of service usage classification by packet inspection. To this end, in this paper, we investigate how to exploit encrypted Internet traffic for classifying in-App usages. Specifically, we develop a system, named CUMMA, for classifying service usages of mobile messaging Apps by jointly modeling user behavioral patterns, network traffic characteristics and temporal dependencies. Along this line, we first segment Internet traffic from traffic-flows into sessions with a number of dialogs in a hierarchical way. Also, we extract the discriminative features of traffic data from two perspectives: (i) packet length and (ii) time delay. Next, we learn a service usage predictor to classify these segmented dialogs into single-type usages or outliers. In addition, we design a clustering Hidden Markov Model (HMM) based method to detect mixed dialogs from outliers and decompose mixed dialogs into sub-dialogs of single-type usage. Indeed, CUMMA enables mobile analysts to identify service usages and analyze end-user in-App behaviors even for encrypted Internet traffic. Finally, the extensive experiments on real-world messaging data demonstrate the effectiveness and efficiency of the proposed method for service usage classification.
  • 2. IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING . CELL: +91 8870791415 Mail to: [email protected] System Specification System Requirements: Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour.
  • 3. IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING . CELL: +91 8870791415 Mail to: [email protected] • Mouse : Logitech. • Ram : 512 Mb. Software Requirements: • Operating system : - Windows 7. 32 bit • Coding Language : C#.net 4.0 • Data Base : SQL Server 2008