Call for Paper - October 2019 Edition
IJCA solicits original research papers for the October 2019 Edition. Last date of manuscript submission is September 20, 2019. Read More

SPA: A Smart Packet Analyzer for Network Traffic Analysis on Smartphones

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2018
Authors:
Dilip Singh, Ankit Kumar Singh, Shabnam Sharma, Chandan Prasad
10.5120/ijca2018918282

Dilip Singh, Ankit Kumar Singh, Shabnam Sharma and Chandan Prasad. SPA: A Smart Packet Analyzer for Network Traffic Analysis on Smartphones. International Journal of Computer Applications 181(32):28-32, December 2018. BibTeX

@article{10.5120/ijca2018918282,
	author = {Dilip Singh and Ankit Kumar Singh and Shabnam Sharma and Chandan Prasad},
	title = {SPA: A Smart Packet Analyzer for Network Traffic Analysis on Smartphones},
	journal = {International Journal of Computer Applications},
	issue_date = {December 2018},
	volume = {181},
	number = {32},
	month = {Dec},
	year = {2018},
	issn = {0975-8887},
	pages = {28-32},
	numpages = {5},
	url = {http://www.ijcaonline.org/archives/volume181/number32/30197-2018918282},
	doi = {10.5120/ijca2018918282},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

The intensifying growth of the internet and machinery whether its mobile or computer technology has brought countless good and proficient things for people such as E-commerce, E-mail, Cloud Computing, Data Sharing, Application and many more but there are also a dark and unseen sides of it such as Network Hacks, Computer hacks, Mobile Breach, Backdoors etc. In today’s era, Cybercrime been one of the communal practices made by the computer specialists and is growing swiftly in numbers. Network monitoring performance of mobiles or computer are becoming increasingly significant for the security protection within today’s organizational, ISP and carriers. There are the numerous tools which are available for network analysis, packet analysis such as Wireshark, Netresec, Termux. In this paper propose system is about an application idea through which user can analyze the network traffic, detect malicious packet, MAC spoofing, ARP spoofing, protocol filtering. Which will assist the user to identify the malicious packet that can cause damage to user’s assets.

References

  1. S. James P. Anderson, Computer security threat monitoring and surveillance”, Technical report, Fort Washington, PA, April 1980.
  2. Stephen E. Smaha,” Haystack: An intrusion detection system”, In Proceedings of the Fourth Aerospace Computer Security Applications Conference, pages 37-44, December 1988.
  3. L. Todd Heberlein, Gihan V. Dias, Karl N. Levitt,Biswanath Mukherjee, Jeff Wood, and David Wolber, ”A network security monitor”, In Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, pages 296- 304, May 1990.
  4. Cao, Jie, et al. (2015): ”Network Traffic Classification Using Feature Selection and Parameter Optimization.Journal of Communications 10.10.
  5. http://www.mathworks.com/help/stats/supervised- learningmachinelearning-workflow-and-algorithms.html.
  6. Arthur Callado, Carlos Kamienski, Geza Szabo, Balazs Peter GerYo, Judith Kelner,Stenio Fernandes, and Djamel Sadok.(2009): ”A Survey on Internet Traffic Identification,” IEEE Communications Survey tutorials, Vol. II, No. 3, pp. 37-52,Third Quarter 2009.
  7. Ian H. Witten and Eibe Frank (2005): Data Mining: Practical Machine Learning Tools and Techniques, 2th edition, Morgan Kaufmann Publishers, San Francisco, CA.
  8. S. Y. Jalali, S. Wani, M. Derwesh, “Qualitative Analysis and Performance Evaluation of RIP, IGRP, OSPF and EGRP Using OPNET” Research India Publications., Vol. 4, pp.389-396,2014. https://pdfs.semanticscholar.org/b616/f7b1a8e13f18b71998c557dc6f18d1fcba33.pdf.
  9. C. Fancy, L. M. M. Thanveer,“An evaluation of alternative protocols-based Virtual Private LAN Service (VPLS)” in IoT and Application (ICIOT), International Conference, Nagapattinam, India, May. 2017, pp. 1-6 (2017) https://ieeexplore.ieee.org/document/8073621/
  10. S.U. Masruroh, F. Robby, and N. Hakiem, “Performance Evaluation of Routing Protocols RIPng, OSPFv3, and EIGRP in an IPv6 Network” in International Conference on Informatics and Computing (ICIC), Mataram, Indonesia Oct. 2016, pp. 111-116 (2016). https://ieeexplore.ieee.org/document/7905699/
  11. D. R. Al-Ani, A. R. Al-Ani, “The performance of IPv4 and IPv6 in terms of Routing Protocols using GNS 3 Simulator” in 9th International Conference on Ambient Systems, Networks and Technologies, ANT-2018 and the 8th International Conference on Sustainable Energy Information Technology, SEIT 2018, May. 2018, pp. 1-6 (2018). https://dl.acm.org/citation.cfm?id=3223610
  12. Bowman, M., Debray, S. K., and Peterson, L. L. 1993. Reasoning about naming systems.
  13. Ding, W. and Marchionini, G. 1997 A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
  14. Fröhlich, B. and Plate, J. 2000. The cubic mouse: a new device for three-dimensional input. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
  15. Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
  16. Sannella, M. J. 1994 Constraint Satisfaction and Debugging for Interactive User Interfaces. Doctoral Thesis. UMI Order Number: UMI Order No. GAX95-09398., University of Washington.
  17. Forman, G. 2003. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar. 2003), 1289-1305.
  18. Brown, L. D., Hua, H., and Gao, C. 2003. A widget framework for augmented interaction in SCAPE.
  19. Y.T. Yu, M.F. Lau, "A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions", Journal of Systems and Software, 2005, in press.
  20. Spector, A. Z. 1989. Achieving application requirements. In Distributed Systems, S. Mullender
  21. Kai Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Nan Zhang, Heqing Huang, Wei Zou, and Peng Liu. 2015. Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale.. In USENIX Security Symposium. 659–674.
  22. Kai Chen, Xueqiang Wang, Yi Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Bin Ma, Aohui Wang, Yingjun Zhang, and Wei Zou. 2016. Following devil’s footprints: Cross-platform analysis of potentially harmful libraries on android and ios. In Security and Privacy (SP), 2016 IEEE Symposium on. IEEE, 357–376.
  23. Gartner. 2017. Managed Security Service Provider (MSSP).http://www.gartner.com/it-glossary/mssp-managed-security-service-provider/. (2017).
  24. Google. 2017. The Google Android Security Team’s Classifications for Potentially Harmful Applications. https://static.googleusercontent.com/media/source.andro id.com/en//security/reports/Google Android Security PHA classifications.pdf. (2017).
  25. ApplicationFundamentals https://developer.android.com/guide/components/fundamentals.html
  26. Android(operation system)https://en.wikipedia.org/wiki/Android_(operating_system)
  27. Jice Wang and Hongqi Wu, “Android Inter-App Communication: Threats, Solutions, and Challenges” in arxiv.org on March 2018.https://arxiv.org/ftp/arxiv/papers/1803/1803.05039.pdf

Keywords

Android, Network Monitoring, Packet Analysis, Termux, Wireshark.