[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Server-Side Traffic Analysis Reveals Mobile Location Information over the Internet

Published: 01 June 2019 Publication History

Abstract

Users can attempt to thwart third-party services from discovering their location by disabling location services on their mobile device. In this paper, we show that web services can use throughput information to reveal the path taken by the phone and its owner among a set of possibilities. For example, a TCP-based music streaming service can compile a sequence of throughputs over several minutes. We collected hundreds of traces of music that we streamed to phones in two different scenarios: a user traveling to four different towns from campus (or the reverse direction); and a user traveling within our campus. We evaluate three classifiers: $k$k-Nearest Neighbors ($k$k-NN), which compares a test sequence with respective time points of training sequences; a Hidden Markov Model (HMM), which computes the transition and emission probabilities of different geographic areas and chooses the most likely sequence of a test trace; and a Naive Bayes Classifier with KDE-based throughput estimates (NB-KDE), which looks at the density of throughputs at each time point along a path. In our study, the $k$k-NN, HMM, and NB-KDE approaches can distinguish between a small number of geographic routes taken by mobile users using only throughput measurements. The NB-KDE method performed best, using throughput alone to identify the path and direction among two roads within a University campus (four classes) with 77 percent accuracy, and the path and direction among four roads (eight classes) out of town with 83 percent accuracy. Furthermore, it was able to classify among eight paths with greater than 59 percent accuracy after one minute. We examine the limitations of these techniques.

References

[1]
M. Balakrishnan, I. Mohomed, and V. Ramasubramanian, “ Where's that phone? Geolocating IP addresses on 3G networks,” in Proc. 9th ACM SIGCOMM Conf. Internet Meas., 2009, pp. 294–300.
[2]
R. A. Becker, R. Caceres, K. Hanson, J. M. Loh, S. Urbanek, A. Varshavsky, and C. Volinsky, “ Route classification using cellular handoff patterns,” in Proc. 13th Int. Conf. Ubiquitous Comput., 2011, pp. 123–132.
[3]
D. J. Berndt and J. Clifford, “ Using dynamic time warping to find patterns in time series,” in Proc. 3rd Int. Conf. Knowl. Discovery Data Mining, 1994, pp. 359–370.
[4]
M. C. Chan and R. Ramjee, “ TCP/IP performance over 3G wireless links with rate and delay variation,” in Proc. 8th Annu. Int. Conf. Mobile Comput. Netw., 2002, pp. 71–82.
[5]
S. R. Eddy, “ Hidden markov models,” Current Opinion Struct. Biol., vol. Volume 6, no. Issue 3, pp. 361–365, 1996.
[6]
B. Ferris, D. Fox, and N. D. Lawrence, “ WiFi-SLAM using gaussian process latent variable models,” in Proc. Int. Joint Conf. Artif. Intell., 2007, pp. 2480–2485.
[7]
M. L. Goldstein, et al., “ Mobile device location data (United States Government Accountability Office),” 2012. {Online}. Available: http://www.gao.gov/assets/650/648044.pdf
[8]
J. Hightower, A. LaMarca, and I. Smith, “ Practical lessons from place lab,” IEEE Pervasive Comput., vol. Volume 5, no. Issue 3, pp. 32–39, 2006.
[9]
H. H. Jo, M. Karsai, J. Kertész, and K. Kaski, “ Circadian pattern and burstiness in mobile phone communication,” New J. Phys., vol. Volume 14, no. Issue 1, 2012, Art. no. .
[10]
M. J. Johnson and A. S. Willsky, “ Bayesian nonparametric hidden semi-Markov models,” J. Mach. Learn. Res., vol. Volume 14, no. Issue Feb, pp. 673–701, 2013.
[11]
T. Kohno, A. Broido, and K. Claffy, “ Remote physical device fingerprinting,” IEEE Trans. Depend. Sec. Comput., vol. Volume 2, no. Issue 2, pp. 93–108, 2005.
[12]
D. F. Kune, J. Koelndorfer, N. Hopper, and Y. Kim, “ Location leaks on the GSM air interface,” in Proc. ISOC Netw. Distrib. Syst. Security Symp., Feb. 2012, https://www.ndss-symposium.org/ndss2012/ndss-2012-programme/location-leaks-over-gsm-air-interface/
[13]
J. Padhye, V. Firoiu, D. F. Towsley, and J. F. Kurose, “ Modeling TCP reno performance,” IEEE/ACM Trans. Netw., vol. Volume 8, no. Issue 2, pp. 133–145, 2000.
[14]
V. C. Perta, M. V. Barbera, and A. Mei, “ Exploiting delay patterns for user IPS identification in cellular networks,” in Proc. Int. Symp. Privacy Enhancing Technol. Symp., 2014, pp. 224–243.
[15]
D. W. Scott, Multivariate Density Estimation: Theory, Practice, and Visualization . Hoboken, NJ, USA: Wiley, 2015.
[16]
B. W. Silverman, Density Estimation for Statistics and Data Analysis, vol. Volume 26 . Boca Raton, FL, USA: CRC Press, 1986.
[17]
H. Soroush, K. Sung, E. Learned-Miller, B. N. Levine, and M. Liberatore, “ Turning off GPS is not enough: Cellular location leaks over the Internet,” in Proc. Privacy Enhancing Technol. Symp., Jul. 2013, pp. 103–122. {Online}. Available: http://forensics.umass.edu/pubs/soroush.pets.2013.pdf
[18]
A. Thiagarajan, L. Ravindranath, H. Balakrishnan, S. Madden, and L. Girod, “ Accurate, low-energy trajectory mapping for mobile devices,” in Proc. 8th USENIX Conf. Netw. Syst. Des. Implementation, Mar. 2011, pp. 267–280.
[19]
A. Viterbi, “ Error bounds for convolutional codes and an asymptotically optimum decoding algorithm,” IEEE Trans. Inf. Theory, vol. Volume 13, no. Issue 2, pp. 260–269, 1967. {Online}. Available:
[20]
Z. Wang, Z. Qian, Q. Xu, Z. Mao, and M. Zhang, “ An untold story of middleboxes in cellular networks,” in Proc. ACM SIGCOMM Conf., Aug. 2011, pp. 374–385.
[21]
Z. Xing, J. Pei, and E. Keogh, “ A brief survey on sequence classification,” SIGKDD Explorations Newslett., vol. Volume 12, no. Issue 1, pp. 40–48, 2010.
[22]
Q. Xu, A. Gerber, Z. Mao, and J. Pang, “ AccuLoc: Practical localization of performance measurements in 3G networks,” in Proc. 9th Int. Conf. Mobile Syst. Appl. Serv., Aug. 2011, pp. 183–196.
[23]
Q. Xu, J. Huang, Z. Wang, F. Qian, A. Gerber, and Z. Mao, “ Cellular data network infrastructure characterization and implication on mobile content placement,” in Proc. ACM SIGMETRICS Joint Int. Conf. Meas. Model. Comput. Syst., 2011, pp. 317–328.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Mobile Computing
IEEE Transactions on Mobile Computing  Volume 18, Issue 6
June 2019
245 pages

Publisher

IEEE Educational Activities Department

United States

Publication History

Published: 01 June 2019

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 24 Dec 2024

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media