Skip to main content

Mind the Gap Between HTTP and HTTPS in Mobile Networks

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 10176))

Abstract

Fueled by a plethora of applications and Internet services, mobile data consumption is on the rise. Over the years, mobile operators deployed webproxies to optimize HTTP content delivery. Webproxies also produce HTTP-logs which are a fundamental data source to understand network/services performance and user behavior. The recent surge of HTTPS is progressively reducing such wealth of information, to the point that it is unclear whether HTTP-logs are still representative of the overall traffic. Unfortunately, HTTPS monitoring is challenging and adds some extra cost which refrains operators from “turning on the switch”. In this work, we study the “gap” between HTTP and HTTPS both quantifying their intrinsic traffic characteristics, and investigating the usability of the information that can be logged from their transactions. We leverage a 24-hours dataset collected from a webproxy operated by a European mobile carrier with more than 10M subscribers. Our quantification of this gap suggests that its importance is strictly related to the target analysis.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    https://www.google.com/transparencyreport/https/?hl=en.

  2. 2.

    https://imeidb.gsma.com/imei/login.jsp.

  3. 3.

    The TAC is part of the IMEI, i.e., the unique identifier of a mobile device.

  4. 4.

    http://www.team-cymru.org/IP-ASN-mapping.html#dns.

  5. 5.

    www.peeringdb.com.

  6. 6.

    http://bit.ly/1Uv9hNF.

References

  1. CAIDA: As rank. http://as-rank.caida.org

  2. Casas, P., Fiadino, P., Bär, A.: Understanding HTTP traffic and CDN behavior from the eyes of a mobile ISP. In: Faloutsos, M., Kuzmanovic, A. (eds.) PAM 2014. LNCS, vol. 8362, pp. 268–271. Springer, Cham (2014). doi:10.1007/978-3-319-04918-2_28

    Chapter  Google Scholar 

  3. Erman, J., Ramakrishnan, K.: Understanding the super-sized traffic of the super bowl. In: Proceedings of the ACM Internet Measurement Conference (IMC), October 2013

    Google Scholar 

  4. Erman, J.E., Gerber, A., Hajiaghayi, M., Pei, D.: To cache or not to cache: The 3G case. IEEE Internet Comput. 15(2), 27–34 (2011)

    Article  Google Scholar 

  5. Falaki, H., Lymberopoulos, D., Mahajan, R., Kandula, S., Estrin, D.: A first look at traffic on smartphones. In: Proceedings of the ACM Internet Measurement Conference (IMC), November 2010

    Google Scholar 

  6. Keralapura, R., Nucci, A., Zhang, Z.L., Gao, L.: Profiling users in a 3G network using hourglass co-clustering. In: Proceedings of the ACM MobiCom, September 2010

    Google Scholar 

  7. Mozilla: Public suffix list. http://publicsuffix.org/

  8. Mucelli, E., Oliveira, R., Carneiro, A.V., Naveen, K.P., Sarraute, C.: Measurement-driven mobile data traffic modeling in a large metropolitan area. In: Proceedings of the IEEE Conference on Pervasive Computing and Communications (PerCom), St. Luis, March 2015

    Google Scholar 

  9. Ranjan, G., Zang, H., Zhang, Z.L., Bolot, J.: Are call detail records biased for sampling human mobility? ACM SIGCOMM Mob. Comput. Commun. Rev. 16(3), 33–44 (2012)

    Article  Google Scholar 

  10. Sandvine, Global Internet Phenomena: Spotlight: encrypted internet traffic. https://www.sandvine.com/trends/encryption.html

  11. Shafiq, M.Z., Ji, L., Liu, A.X., Pang, J., Venkataraman, S., Wang, J.: A first look at cellular network performance during crowded events. In: Proceedings of the ACM SIGMETRICS, June 2013

    Google Scholar 

  12. Trestian, I., Ranjan, S., Kuzmanovic, A., Nucci, A.: Measuring serendipity: connecting people, locations and interests in a mobile 3G network. In: Proceedings of the ACM Internet Measurement Conference (IMC), November 2009

    Google Scholar 

  13. Vallina-Rodriguez, N., Sundaresan, S., Kreibich, C., Weaver, N., Paxson, V.: Beyond the radio: illuminating the higher layers of mobile networks. In: Proceedings of the ACM MobiSys, November 2015

    Google Scholar 

  14. Blondel, V.D., Adeline Decuyper, G.K.: A survey of results on mobile phone datasets analysis. CoRR arXiv arXiv:1502.03406 (2015)

  15. Vni, C.: The Zettabyte Era: Trends and analysis. http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/vni-hyperconnectivity-wp.html

  16. Xu, Q., Erman, J., Gerber, A., Mao, Z., Pang, J., Venkataraman, S.: Identifying diverse usage behaviors of smartphone apps. In: Proceedings of the ACM Internet Measurement Conference (IMC), November 2011

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alessandro Finamore .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Finamore, A., Varvello, M., Papagiannaki, K. (2017). Mind the Gap Between HTTP and HTTPS in Mobile Networks. In: Kaafar, M., Uhlig, S., Amann, J. (eds) Passive and Active Measurement. PAM 2017. Lecture Notes in Computer Science(), vol 10176. Springer, Cham. https://doi.org/10.1007/978-3-319-54328-4_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-54328-4_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-54327-7

  • Online ISBN: 978-3-319-54328-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics