Browse > Article
http://dx.doi.org/10.13089/JKIISC.2015.25.4.829

Spyware detection system related to wiretapping based on android power consumption and network traffics  

Park, Bum-joon (Hanyang University)
Lee, Ook (Hanyang University)
Cho, Sung-phil (Hanyang University)
Choi, Jung-woon (Hanyang University)
Abstract
As the number of smartphone users have increased, many kinds of malwares have emerged. Unlike existing malwares, spyware can be installed normally after user authentication and agreement according to security policy. For this reason, it is not easy to catch spywares involving harmful functionalities to users by using existing malware detection system. Therefore, our paper focuses on study about detecting mainly wiretapping spywares among them by developing a new wiretapping detection model and application. Specifically, this study conducts to find out power consumption on each application and modular and network consumption to detect voice wiretapping so Open Source Project Power Tutor is used to do this. The risk assessment of wiretapping is measured by gathered all power consumption data from Open Source Project Power Tutor. In addition, developed application in our study can detect at-risk wiretapping spyware through collecting and analyzing data. After we install the application to the smartphone, we collect needed data and measure it.
Keywords
smartphone; spyware; wiretapping; detection;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Android (operating system),Wikipedia, 2013.07,http://ko.wikipedia.org/wiki/%EC%95%88%EB%93%9C%EB%A1%9C%EC%9D%B4%EB%93%9C_(%EC%9A%B4%EC%98%81_%EC%B2%B4%EC%A0%9C).
2 Symantec internet security threat report, Symantec Corporation, vol.18, pp.10,Apr.2013.
3 Aubrey-Derrick Schmidt and Sahin Albayrak ,"Malicious Software for Smartphones," Technical Report, pp.19-20,Feb. 2008.
4 Sang Wook Nam, "A study on counterplan of Spyware being abused on the Web," Korea University, pp.1-47, Dec.2014.
5 e-Nara Jipyo ,The number of counseling for private information abuse, 2012.,http://www.index.go.kr/potal/main/EachDtlPageDetail.do?idx_cd=1366
6 Jin-young Kim, "2012 Mobile Market Forecasts," ROA CONSULTING, pp.6, Feb.2011.
7 Junbong Baik, MyoungHo Choi, Bumseok Hong and Eugene Park, "Variation from Smart Revolution : The Achievements and Tasks," kt economy & business research institution, pp.12, 2012.
8 SungIl Kim and Hyunna Cha, "The threats and responses of smartphone hacking," kt economy & business research institution pp.2, 2013.
9 Heongdu Park, "The first detetion of tapping-app in korea", The KyungHyang
10 Hwashin Moon, Bohong Jung, Yongsup Jeon and Jungnyou Kim, "A Survey of Mobile Malware Detection Techniques," ETRI, pp.5-7, 2013.
11 D. Samfat and R. Molva , "IDAMN: An Intrusion Detection Architecture for Mobile Networks," IEEE Journal on Selected Areas in Communications,Vol 15. ,no. 7, pp.1373-1380, Sep. 1997.   DOI
12 M. Miettinen , P. Halonen and K. Hatonen, "Host-Based Intrusion Detection for Advanced Mobile Devices," In: AINA '06: Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Vol. 2 (AINA'06), Washington, DC, USA, IEEE Computer Society, pp. 72-76, 2006.
13 D.C. Nash, T.L. Martin, D.S. Ha and M.S. Hsiao , "Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices," In: PERCOMW'05: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops, Washington, DC, USA, IEEE Computer Society, pp. 141-145, 2005.
14 G.A. Jacoby , R. Marchany and N.J.Davis IV. , "How mobile host batteries can improve network security," IEEE Security and Privacy, Vol 4., no 5.,pp. 40-49, 2006.
15 Audio, Multimedia, Bit_rate : http://en.wikipedia.org/wiki/Bit_rate
16 J. Cheng, S.H. Wong, H. Yang and S. Lu, "Smartsiren: virus detection and alert for smartphones," In: MobiSys '07: Proceedings of the 5th iternational conference on Mobile systems, applications and services, New York, NY, USA, ACM, pp. 258-271, 2007