Development of Mobile Sandbox Based On Cyberdeck for Security Testing on Android Phones Using DNS Proxy and Port Mirroring

  • Dedy Hariyadi Universitas Jenderal Achmad Yani Yogyakarta http://orcid.org/0000-0003-2941-7654
  • Ibnu Abdul Rosid Universitas Jenderal Achmad Yani Yogyakarta
  • Grita Supriyanto Dewi Universitas Jenderal Achmad Yani Yogyakarta
Keywords: malvertising, malware, malicious traffic, mobile sandbox, cyberdeck

Abstract

The increase in internet usage in Indonesia has an impact in the form of potential cyber attacks such as malvertising, which is inserting malicious code or malware into advertisements when accessing the internet. In addition to malvertising, other malware activities are also detected in Badan Siber dan Sandi Negara (BSSN) malicious traffic monitoring system. The increase in internet access in Indonesia is also influenced by the growth of smartphone users who are always connected to the internet. The connection of digital devices such as smartphones requires testing of their activities. This study proposes testing the security of internet access on smartphones using the sandbox method. To facilitate testing, a cyberdeck-based mobile sandbox with integrated sensors was developed. The sensors used are malvertising sensors and anomalous traffic. Based on testing of mobile phone activity using the mobile sandbox, smartphones with the vanilla version of the Android operating system have fewer malvertising attacks than those operating systems that have been redeveloped by manufacturers. Although the malvertising attacks are the lowest, they have the potential for anomalous traffic caused by internet access by users or the installation of additional applications.

Downloads

Download data is not yet available.

References

[1] Asosiasi Penyelenggara Jasa Internet Indonesia, “Survei Penetrasi Internet Indonesia 2024.” 2024.
[2] Meltwater, “Digital Indonesia - 2024.” 2024.
[3] A. Arrate, J. González-Cabañas, Á. Cuevas, dan R. Cuevas, “Malvertising in Facebook: Analysis, Quantification and Solution,” Electronics, vol. 9, no. 8, hlm. 1332, Agu 2020, doi: 10.3390/electronics9081332.
[4] Nindya Dwi Anggana, Dedi Hariyadi, Rama Sahtyawan, dan Alfun Roehatul Jannah, “Implementasi Pi-Hole Untuk Membangun Sistem Pertahanan Jaringan Dari Serangan Malvertising,” teknomatika, vol. 15, no. 1, hlm. 1–10, Mar 2022, doi: 10.30989/teknomatika.v15i1.1104.
[5] A. H. Maulana, I. G. P. Ari Suyasa, dan E. Kurniawan, “Analysis of the Demilitarized Zone Implementation in Java Madura Bali Electrical Systems to Increase the Level of IT/OT Cyber Security With the Dual DMZ Firewall Architecture Method,” dalam 2023 International Conference on Smart Applications, Communications and Networking (SmartNets), Istanbul, Turkiye: IEEE, Jul 2023, hlm. 1–6. doi: 10.1109/SmartNets58706.2023.10215960.
[6] A. Ashari dan H. Setiawan, “Cloud Computing: Solusi ICT,” Jurnal Sistem Informasi, vol. 3, no. 2, hlm. 80, 2011, doi: 10.16192/j.cnki.1003-2053.2015.02.013.
[7] Y.-T. Huang, C. Y. Lin, Y.-R. Guo, K.-C. Lo, Y. S. Sun, dan M. C. Chen, “Open Source Intelligence for Malicious Behavior Discovery and Interpretation,” IEEE Trans. Dependable Secure Comput., vol. 19, no. 2, hlm. 776–789, 2022, doi: 10.1109/TDSC.2021.3119008.
[8] Badan Siber dan Sandi Negara, “Lanskap Keamanan Siber Indonesia 2023.” 2024.
[9] D. Hariyadi dan C. Finansia, “Analisis Insider Threat pada Sistem Keamanan Rumah Cerdas Menggunakan Malicious Traffic Monitoring,” 2023.
[10] T. Miley dan T. McFadden, “A sonar, interactive dance and music system,” Computers & Mathematics with Applications, vol. 32, no. 1, hlm. 97–107, Jul 1996, doi: 10.1016/0898-1221(96)00093-4.
[11] G. L. Wenas, H. Herlawati, dan P. D. Atika, “Simulasi Management Network Menggunakan Metode VLAN Pada SMPN 255 Jakarta,” JSRCS, vol. 2, no. 1, hlm. 99–110, Mei 2021, doi: 10.31599/jsrcs.v2i1.638.
[12] H. Kayabaş dan G. Tuna, “Cyber Wars and Cyber Threats Against Mobile Devices: Analysis of Mobile Devices,” dalam Advances in Digital Crime, Forensics, and Cyber Terrorism, F. Özsungur, Ed., IGI Global, 2023, hlm. 85–107. doi: 10.4018/978-1-6684-6741-1.ch005.
[13] D. Hariyadi, M. R. Jinan, N. S. Bayuaji, dan A. S. Hasan, “Analisis Jaringan pada Aplikasi Pengamanan Akses Internet,” Cybersecurity dan Forensik Digital, vol. 2, no. 1, hlm. 16–23, 2019.
[14] S. S. B. Subrahmanyam, P. Goutham, V. K. R. Ambati, C. V. Bijitha, dan H. V. Nath, “A hybrid method for analysis and detection of malicious executables in IoT network,” Computers & Security, vol. 132, hlm. 103339, Sep 2023, doi: 10.1016/j.cose.2023.103339.
[15] M. Vermeer, N. Kadenko, M. van Eeten, C. Gañán, dan S. Parkin, “Alert Alchemy: SOC Workflows and Decisions in the Management of NIDS Rules,” dalam CCS - Proc. ACM SIGSAC Conf. Comput. Commun. Secur., Association for Computing Machinery, Inc, 2023, hlm. 2770–2784. doi: 10.1145/3576915.3616581.
[16] M. Stampar dan Mikhail Kasimov, “Maltrail - Malicious Traffic Detection System.” IMPACT, 2018. doi: 10.23721/100/1503924.
[17] G. Hu dan K. Fukuda, “Characterizing Privacy Leakage in Encrypted DNS Traffic,” IEICE Trans. Commun., vol. E106.B, no. 2, hlm. 156–165, Feb 2023, doi: 10.1587/transcom.2022EBP3014.
[18] S. Chengwei, W. Quanhong, W. Zhenjun, dan Y. Xiaoyi, “Research and Demonstration of Measuring and Evaluation System of Electronic Resources Relying on Sniffer,” dalam Proceedings of the 2017 International Conference on E-commerce, E-Business and E-Government, Turku Finland: ACM, Jun 2017, hlm. 35–40. doi: 10.1145/3108421.3108439.
Published
2024-12-21
How to Cite
Hariyadi, D., Rosid , I. A., & Dewi , G. S. (2024). Development of Mobile Sandbox Based On Cyberdeck for Security Testing on Android Phones Using DNS Proxy and Port Mirroring. Jurnal CoSciTech (Computer Science and Information Technology), 5(3), 602-608. https://doi.org/10.37859/coscitech.v5i3.7763
Abstract views: 64 , PDF downloads: 65