{"title":"Detection of Suspicious Connections on Android Mobile Devices","authors":"Dragos Costea, N. Tapus","doi":"10.1109/CSCS.2019.00058","DOIUrl":null,"url":null,"abstract":"Mobile devices are vulnerable to becoming part of botnet operations just as any other computing device. Attackers use domain generation algorithms to increase their chance of controlling a mobile device. In order to harden a user's defense against such an attack, this paper proposes a method for inspecting outgoing connections. By inspecting DNS packets that are transferred between the mobile device and the Internet, domain names are extracted and classified as legit or suspicious based on specific lexical features inspired from existing literature. Packet inspection is done without superuser privilege and with minimal user interaction. The solution displays the connections established by a mobile devices with and without the user's consent. Performance analysis on the packet inspection process was done to understand and visualize the CPU and memory usage together with the impact on user experience.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSCS.2019.00058","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Mobile devices are vulnerable to becoming part of botnet operations just as any other computing device. Attackers use domain generation algorithms to increase their chance of controlling a mobile device. In order to harden a user's defense against such an attack, this paper proposes a method for inspecting outgoing connections. By inspecting DNS packets that are transferred between the mobile device and the Internet, domain names are extracted and classified as legit or suspicious based on specific lexical features inspired from existing literature. Packet inspection is done without superuser privilege and with minimal user interaction. The solution displays the connections established by a mobile devices with and without the user's consent. Performance analysis on the packet inspection process was done to understand and visualize the CPU and memory usage together with the impact on user experience.