Passive cyber-security attacks do not require any modification of the data stream generated by the victim, nor the creation of a false statement; in particular, those attacks based on statistical analysis aim at acquiring sensible information by just analyzing traffic patterns. Our work sits on the conjecture that the PDCCH, which is transmitted in clear text, may be effectively used to statistically characterize the traffic generated by a smartphone in standby mode. Through this statistical signature, the attacker may then infer whether an unknown traffic pattern is generated by the victim user's terminal, guessing if the victim is in a certain geographical area, and in turn gaining the ability to track the victim's movements and/or to profile their habits. In this work, we propose a data collection and processing framework that successfully obtains such signatures. User data patterns (transport block sizes and communications direction) are retrieved by analyzing the mobile network scheduling. Hence, a sequence-to-sequence learning framework to extract smartphone signatures from passive traffic is put forward, and is experimentally validated using a dataset of 40 user traces, successfully identifying up to 90 percent of the users.

Smartphone Identification via Passive Traffic Fingerprinting: A Sequence-to-Sequence Learning Approach

Meneghello F.;Rossi M.;
2020

Abstract

Passive cyber-security attacks do not require any modification of the data stream generated by the victim, nor the creation of a false statement; in particular, those attacks based on statistical analysis aim at acquiring sensible information by just analyzing traffic patterns. Our work sits on the conjecture that the PDCCH, which is transmitted in clear text, may be effectively used to statistically characterize the traffic generated by a smartphone in standby mode. Through this statistical signature, the attacker may then infer whether an unknown traffic pattern is generated by the victim user's terminal, guessing if the victim is in a certain geographical area, and in turn gaining the ability to track the victim's movements and/or to profile their habits. In this work, we propose a data collection and processing framework that successfully obtains such signatures. User data patterns (transport block sizes and communications direction) are retrieved by analyzing the mobile network scheduling. Hence, a sequence-to-sequence learning framework to extract smartphone signatures from passive traffic is put forward, and is experimentally validated using a dataset of 40 user traces, successfully identifying up to 90 percent of the users.
2020
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11577/3367811
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 11
  • ???jsp.display-item.citation.isi??? 7
social impact