AntMonitor: A System for Monitoring from Mobile Devices

Slides:



Advertisements
Similar presentations
Lightspeed Filtering Mark Shrimpton Schools Broadband Team EiS.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
FindAll: A Local Search Engine for Mobile Phones Aruna Balasubramanian University of Washington.
Security Awareness: Applying Practical Security in Your World
Application Identification in Information-poor Environments Charalampos (Haris) Rotsos Computer Laboratory University of Cambridge
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Using a Cisco Router as a DHCP Server.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
Company Presentation September 15, CONFIDENTIAL.
What is PaperCut MF? What is PaperCut MF? What is PaperCut MF?
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Chapter 5: Implementing Intrusion Prevention
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
1 Chapter 3: Multiprotocol Network Design Designs That Include Multiple Protocols IPX Design Concepts AppleTalk Design Concepts SNA Design Concepts.
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
WEST VIRGINIA UNIVERSITY Lane Department of Computer Science and Electrical Engineering CROWDSOURCED TRAFFIC MAP Team Members: Faculty Mentor: David Williams.
1 Chapter 8: DHCP in IP Configuration Designs Designs That Include DHCP Essential DHCP Design Concepts Configuration Protection in DHCP Designs DHCP Design.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
NT1210 Introduction to Networking
Visibook is instant, simple, and dynamic appointment booking We're headquartered in San Francisco, California "Visibook is awesome. My entire studio was.
Web Content Security Unlock the Power of the Web
Chapter 1: Explore the Network
OS Fingerprinting and Tethering Detection in Mobile Networks
Voice Performance Measurement and related technologies
Facebook privacy policy
CudaLaunch for Barracuda NG Firewall.
Instructor Materials Chapter 1: Explore the Network
Barracuda Firewall The Next-Generation Firewall for Everyone
Web Content Security Unlock the Power of the Web
Instructor Materials Chapter 8: Network Troubleshooting
PIWIK JUNIOR TIDAL ASSOCIATE PROF., WEB SERVICES & MULTIMEDIA LIBRARIAN NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY.
VPN Joshua Turner.
University of Maryland College Park
Advanced Troubleshooting with Cisco Prime NAM-3: Use Case
CS 268: Mobility Kevin Lai Feb 13, 2002.
How to have an Espresso Espresso User Guide.
Real-time protection for web sites and web apps against ATTACKS
CaRT eCapacity Initiative Ghana Productivity Apps
BIG Data 25 Need-to-Know Facts.
Outline Introduction Related Work
Remote Management of Gateways and Wifi within the home
2016 Citrix presentation.
Chapter 1: Explore the Network
EE-587 Spring FEB 08 William Mullins
ANTS Goals Today’s networks lack flexibility …
Wifi Map Pro APK By: atozapps.org.
3 | Analyzing Server, Network, and Client Health
Fastdroid Produced by : Firas Abdalhaq Mohammad Amour Supervised by : Dr. Raed Alqadi.
Introduction to Cloud Computing
Group 2: Qiuxi Zhu, Buchao Yu, Guoxi Wang
Prevent Costly Data Leaks from Microsoft Office 365
McAfee Total Protection 2018 Protection for PC, MAC, Smartphones and Tablets.
11/15/2018 3:42 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Home Internet Vulnerabilities
Chapter 8: Monitoring the Network
The Hacking Suite for Governmental Interception
“Location Privacy Protection for Smartphone Users”
The Software-Defined Perimeter in Action
Agenda Create certificates for the GlobalProtect Portal, internal gateway, and external gateway. Attach certificates to a SSL-TLS Service Profile. Configure.
Chapter 10: Advanced Cisco Adaptive Security Appliance
4/9/2019 5:05 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
Microsoft Virtual Academy
Kronos Mobile User Guide – CST Drivers
Building Windows Store Apps with Windows Azure Mobile Services
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
What’s New In WatchGuard Wi-Fi Cloud v8.6
Presentation transcript:

AntMonitor: A System for Monitoring from Mobile Devices Anh Le, Janus Varmarken, Simon Langhoff, Anastasia Shuba, Minas Gjoka, Athina Markopoulou UC Irvine & IT Univ. Copenhagen

Mobile Traffic Growth Cisco VNI Mobile Forecast 2014—2019

Mobile Traffic in Context comScore Mobile Report 2014

Monitoring and Analyzing Mobile Traffic ISP Traces [Xu, IMC’11] [Chen, IMC’12] … AntMonitor Scale User Traces [Falaki, IMC’10] [Rodriguez, IMC’13] … Granularity of Information

Objectives of AntMonitor Designed for Crowdsourcing Large-Scale Measurements High compatibility Fine-Grained Information Full packet trace Flexible annotation Attractive to Users Ease of use High performance Privacy control and protection

Outline Introduction & Motivation VPN Approaches System Design and Implementation Performance Evaluation Example Applications

VPN-Based Approaches Log Server VPN Server AntMonitor Collect, Analyze Meddle Collect, Analyze tPacketCpt. Collect

AntMonitor System

Traffic Interception & Routing

Traffic Interception & Routing

Traffic Interception & Routing

Traffic Interception & Routing

AntClient Compatible with 95%+ Android today Fine control of contributing apps Real-time privacy leaks prevention Log packets in PCAP-Next-Generation

AntClient: App Selection

AntServer Support client’s dynamic IP High-performance Session continuity High-performance Java: Netty asynchronous network I/O C++: critical components Cloud deployment ready Pilot deployment on AWS

LogServer Log files automatically parsed and inserted into a database Global analysis Example applications Network measurements App classification Privacy leaks detection

Performance Evaluation Stress Test: Download 1 GB on Wi-Fi and 100 MB on Cellular Typical Day

Application 1: Network Measurements Feb 5 – Mar 15, 2015: 9 volunteers 1.5 GB cellular, 16 GB Wi-Fi 95% HTTP/HTTPS Feb 5 – Mar 15, 2015: 9 volunteers Top apps

Application 2: App Classification Classification of network flows to apps: Fined-grained contextual information: ground truth F1-score up to 70.1% using only network (layer 3) features Previous work: precision of 64.1% using payload (host + user agent) Top 30 Feature Categories

Application 3: Privacy Leak Detection Personally Identifiable Information # Leaking Apps # Users IMEI 5 4 Android Device ID 6 Phone Number 1 Email Address Location 2

Ongoing Work Further improve performance, scaling, and user privacy Replacing VPN Server with Client-Side Connection Translation Module Enhance real-time privacy protection Get more users, Google Play release

AntMonitor Summary http://antmonitor.calit2.uci.edu Design for Crowdsourcing Large-scale measurements Fine-grained information Attractive to users Applications Network monitoring Application classification Privacy leak prevention … http://antmonitor.calit2.uci.edu

http://antmonitor.calit2.uci.edu Better to

VPN service with connection translation AntMonitor 2.0 Collect, Analyze Log Server Collect, Analyze VPN Server VPN service with connection translation

Battery Evaluation: A Typical Day 2014 Nielsen Survey: Averaging 58 minutes of app usage per day 22 minutes of Search, Portal, and Social Apps (Facebook, Chrome) 21 minutes of Entertainment (YouTube) 7 minutes of Communication (Gmail) 5 minutes of Productivity (Google Keep) 3 minutes of News (Reddit News) AM: Do we have one more figure on system evaluation? We need more on systems. Maybe lessons learnt? Back up slide for typical day.