skip to main content
10.1145/2787394.2787396acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free Access

AntMonitor: A System for Monitoring from Mobile Devices

Authors Info & Claims
Published:17 August 2015Publication History

ABSTRACT

We propose AntMonitor - a system for passive monitoring, collection and analysis of fine-grained, large-scale packet measurements from Android devices. AntMonitor is the first system of its kind that combines the following properties: (i) it provides participating users with fine-grained control of which data to contribute; (ii) it does not require administrative privileges; (iii) it supports client-side analysis of traffic; and (iv) it supports collection of large-scale, fine-grained, and semantic-rich traffic. The first three properties benefit mobile users, by giving them control over their privacy while also enabling a number of services to incentivize their participation. The last property makes AntMonitor a powerful tool for network researchers who want to collect and analyze large-scale, yet fine-grained mobile measurements. As a proof-of-concept, we have developed and deployed a prototype of AntMonitor, and we have used it to monitor 9 users for several months. AntMonitor has high network throughput while incurring lower CPU and battery costs than existing mobile monitoring systems. Our preliminary experience with the prototype demonstrates its capabilities and its potential for enabling several research activities, including network measurement from the edge, classification of mobile traffic, and detection of privacy leakage and other malicious behaviors.

References

  1. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update 2014--2019. http://goo.gl/Zu8f2r.Google ScholarGoogle Scholar
  2. Q. Xu, J. Erman, A. Gerber, Z. Mao, J. Pang, and S. Venkataraman. Identifying Diverse Usage Behaviors of Smartphone Apps. IMC'11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. X. Chen, R. Jin, K. Suh, B. Wang, and W. Wei. Network Performance of Smart Mobile Handhelds in a University Campus WiFi Network. IMC'12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. H. Falaki, D. Lymberopoulos, R. Mahajan, S. Kandula, and D. Estrin. A First Look at Traffic on Smartphones. IMC'10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. N. Vallina-Rodriguez, A. Auçinas, M. Almeida, Y. Grunenberger, K. Papagiannaki, and J. Crowcroft. RILAnalyzer: A Comprehensive 3G Monitor on Your Phone. IMC'13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Netalyzr. https://goo.gl/i7HyLU.Google ScholarGoogle Scholar
  7. A. Rao, A. M. Kakhki, A. Razaghpanah, A. Tang, S. Wang, J. Sherry, P. Gill, A. Krishnamurthy, A. Legout, A. Mislove, and D. Choffnes. Using the Middle to Meddle with Mobile. Technical report, Northeastern University, Dec. 2013.Google ScholarGoogle Scholar
  8. Android VpnService. http://goo.gl/kV7ZZL, 2014.Google ScholarGoogle Scholar
  9. Android Versions. developer.android.com/about/dashboards.Google ScholarGoogle Scholar
  10. PCAPNG File Format. http://goo.gl/y89d9U.Google ScholarGoogle Scholar
  11. tPacket. www.taosoftware.co.jp/en/android/packetcapture.Google ScholarGoogle Scholar
  12. PhoneLab, University at Buffalo. https://www.phone-lab.org/.Google ScholarGoogle Scholar
  13. J. Sommers and P. Barford. Cell vs. WiFi: On the Performance of Metro Area Mobile Connections. IMC'12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. X. Wei, L. Gomez, I. Neamtiu, and M. Faloutsos. ProfileDroid: Multi-layer Profiling of Android Applications. MobiCom'12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Private Internet Access Privacy Policy. http://goo.gl/Yt8jNx.Google ScholarGoogle Scholar
  16. strongSwan VPN Client. https://goo.gl/okVQYL.Google ScholarGoogle Scholar
  17. Netty. http://netty.io.Google ScholarGoogle Scholar
  18. MultiMedia. Smartphones: So Many Apps, So Much Time, 2014.Google ScholarGoogle Scholar
  19. FRep - Finger Replayer. https://goo.gl/Qtfcva.Google ScholarGoogle Scholar
  20. W. Enck, P. Gilbert, B. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. OSDI'10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. S. Dai, A. Tongaonkar, X. Wang, A. Nucci, and D. Song. Networkprofiler: Towards Automatic Fingerprinting of Android Apps. INFOCOM'13.Google ScholarGoogle Scholar
  22. S. Miskovic, G. M. Lee, Y. Liao, and M. Baldi. AppPrint: Automatic Fingerprinting of Mobile Applications in Network Traffic. PAM '15.Google ScholarGoogle Scholar
  23. AntMonitor Project Website. http://antmonitor.calit2.uci.edu.Google ScholarGoogle Scholar

Index Terms

  1. AntMonitor: A System for Monitoring from Mobile Devices

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        C2B(1)D '15: Proceedings of the 2015 ACM SIGCOMM Workshop on Crowdsourcing and Crowdsharing of Big (Internet) Data
        August 2015
        58 pages
        ISBN:9781450335393
        DOI:10.1145/2787394

        Copyright © 2015 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 17 August 2015

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader