1 package edu.uci.iotproject;
3 import static edu.uci.iotproject.analysis.UserAction.Type;
5 import edu.uci.iotproject.analysis.TcpConversationUtils;
6 import edu.uci.iotproject.analysis.TrafficLabeler;
7 import edu.uci.iotproject.analysis.TriggerTrafficExtractor;
8 import edu.uci.iotproject.analysis.UserAction;
9 import edu.uci.iotproject.io.TriggerTimesFileReader;
10 import org.pcap4j.core.*;
11 import org.pcap4j.packet.namednumber.DataLinkType;
13 import java.io.EOFException;
14 import java.net.UnknownHostException;
15 import java.time.Instant;
17 import java.util.concurrent.TimeoutException;
20 * This is a system that reads PCAP files to compare
21 * patterns of DNS hostnames, packet sequences, and packet
22 * lengths with training data to determine certain events
23 * or actions for smart home devices.
25 * @author Janus Varmarken
26 * @author Rahmadi Trimananda (rtrimana@uci.edu)
32 public static void main(String[] args) throws PcapNativeException, NotOpenException, EOFException, TimeoutException, UnknownHostException {
33 // -------------------------------------------------------------------------------------------------------------
34 // ------------ # Code for extracting traffic generated by a device within x seconds of a trigger # ------------
35 // Paths to input and output files (consider supplying these as arguments instead) and IP of the device for
36 // which traffic is to be extracted:
37 String path = "/scratch/July-2018"; // Rahmadi
38 //String path = "/Users/varmarken/temp/UCI IoT Project/experiments"; // Janus
40 // D-Link July 26 experiment
41 // final String inputPcapFile = path + "/2018-07/dlink/dlink.wlan1.local.pcap";
42 // final String outputPcapFile = path + "/2018-07/dlink/dlink-processed.pcap";
43 // final String triggerTimesFile = path + "/2018-07/dlink/dlink-july-26-2018.timestamps";
44 // final String deviceIp = "192.168.1.199"; // .246 == phone; .199 == dlink plug?
46 // TP-Link July 25 experiment
47 // final String inputPcapFile = path + "/2018-07/tplink/tplink.wlan1.local.pcap";
48 // final String outputPcapFile = path + "/2018-07/tplink/tplink-processed.pcap";
49 // final String triggerTimesFile = path + "/2018-07/tplink/tplink-july-25-2018.timestamps";
50 // final String deviceIp = "192.168.1.159";
52 // SmartThings Plug July 25 experiment
53 // final String inputPcapFile = path + "/2018-07/stplug/stplug.wlan1.local.pcap";
54 // final String outputPcapFile = path + "/2018-07/stplug/stplug-processed.pcap";
55 // final String triggerTimesFile = path + "/2018-07/stplug/smartthings-july-25-2018.timestamps";
56 // final String deviceIp = "192.168.1.246"; // .246 == phone; .142 == SmartThings Hub (note: use eth0 capture for this!)
58 // Wemo July 30 experiment
59 // final String inputPcapFile = path + "/2018-07/wemo/wemo.wlan1.local.pcap";
60 // final String outputPcapFile = path + "/2018-07/wemo/wemo-processed.pcap";
61 // final String triggerTimesFile = path + "/2018-07/wemo/wemo-july-30-2018.timestamps";
62 // final String deviceIp = "192.168.1.145";
64 // Wemo Insight July 31 experiment
65 // final String inputPcapFile = path + "/2018-07/wemoinsight/wemoinsight.wlan1.local.pcap";
66 // final String outputPcapFile = path + "/2018-07/wemoinsight/wemoinsight-processed.pcap";
67 // final String triggerTimesFile = path + "/2018-07/wemoinsight/wemo-insight-july-31-2018.timestamps";
68 // final String deviceIp = "192.168.1.135";
70 // TP-Link BULB August 1 experiment
71 // final String inputPcapFile = path + "/2018-08/tplink-bulb/tplinkbulb.wlan1.local.pcap";
72 // final String outputPcapFile = path + "/2018-08/tplink-bulb/tplinkbulb-processed.pcap";
73 // final String triggerTimesFile = path + "/2018-08/tplink-bulb/tplink-bulb-aug-3-2018.timestamps";
74 // final String deviceIp = "192.168.1.140";
76 // Kwikset Doorlock August 6 experiment
77 // final String inputPcapFile = path + "/2018-08/kwikset-doorlock/kwikset-doorlock.wlan1.local.pcap";
78 // final String outputPcapFile = path + "/2018-08/kwikset-doorlock/kwikset-doorlock-processed.pcap";
79 // final String triggerTimesFile = path + "/2018-08/kwikset-doorlock/kwikset-doorlock-aug-6-2018.timestamps";
80 // final String deviceIp = "192.168.1.246"; // .246 == phone; .142 == SmartThings Hub (note: use eth0 capture for this!)
82 // Hue BULB August 7 experiment
83 // final String inputPcapFile = path + "/2018-08/hue-bulb/hue-bulb.wlan1.local.pcap";
84 // final String outputPcapFile = path + "/2018-08/hue-bulb/hue-bulb-processed.pcap";
85 // final String triggerTimesFile = path + "/2018-08/hue-bulb/hue-bulb-aug-7-2018.timestamps";
86 // final String deviceIp = "192.168.1.246";
88 // Lifx BULB August 8 experiment
89 final String inputPcapFile = path + "/2018-08/lifx-bulb/lifx-bulb.wlan1.local.pcap";
90 final String outputPcapFile = path + "/2018-08/lifx-bulb/lifx-bulb-processed.pcap";
91 final String triggerTimesFile = path + "/2018-08/lifx-bulb/lifx-bulb-aug-8-2018.timestamps";
92 final String deviceIp = "192.168.1.246"; // .246 == phone; .231 == Lifx
94 TriggerTimesFileReader ttfr = new TriggerTimesFileReader();
95 List<Instant> triggerTimes = ttfr.readTriggerTimes(triggerTimesFile, false);
96 // Tag each trigger with "ON" or "OFF", assuming that the first trigger is an "ON" and that they alternate.
97 List<UserAction> userActions = new ArrayList<>();
98 for (int i = 0; i < triggerTimes.size(); i++) {
99 userActions.add(new UserAction(i % 2 == 0 ? Type.TOGGLE_ON : Type.TOGGLE_OFF, triggerTimes.get(i)));
101 TriggerTrafficExtractor tte = new TriggerTrafficExtractor(inputPcapFile, triggerTimes, deviceIp);
102 final PcapDumper outputter = Pcaps.openDead(DataLinkType.EN10MB, 65536).dumpOpen(outputPcapFile);
103 DnsMap dnsMap = new DnsMap();
104 TcpReassembler tcpReassembler = new TcpReassembler();
105 TrafficLabeler trafficLabeler = new TrafficLabeler(userActions);
106 tte.performExtraction(pkt -> {
109 } catch (NotOpenException e) {
112 }, dnsMap, tcpReassembler, trafficLabeler);
116 if (tte.getPacketsIncludedCount() != trafficLabeler.getTotalPacketCount()) {
117 // Sanity/debug check
118 throw new AssertionError(String.format("mismatch between packet count in %s and %s",
119 TriggerTrafficExtractor.class.getSimpleName(), TrafficLabeler.class.getSimpleName()));
122 // Extract all conversations present in the filtered trace.
123 List<Conversation> allConversations = tcpReassembler.getTcpConversations();
124 // Group conversations by hostname.
125 Map<String, List<Conversation>> convsByHostname = TcpConversationUtils.groupConversationsByHostname(allConversations, dnsMap);
126 System.out.println("Grouped conversations by hostname.");
127 // For each hostname, count the frequencies of packet lengths exchanged with that hostname.
128 final Map<String, Map<Integer, Integer>> pktLenFreqsByHostname = new HashMap<>();
129 convsByHostname.forEach((host, convs) -> pktLenFreqsByHostname.put(host, TcpConversationUtils.countPacketLengthFrequencies(convs)));
130 System.out.println("Counted frequencies of packet lengths exchanged with each hostname.");
131 // For each hostname, count the frequencies of packet sequences (i.e., count how many conversations exchange a
132 // sequence of packets of some specific lengths).
133 final Map<String, Map<String, Integer>> pktSeqFreqsByHostname = new HashMap<>();
134 convsByHostname.forEach((host, convs) -> pktSeqFreqsByHostname.put(host, TcpConversationUtils.countPacketSequenceFrequencies(convs)));
135 System.out.println("Counted frequencies of packet sequences exchanged with each hostname.");
136 // For each hostname, count frequencies of packet pairs exchanged with that hostname across all conversations
137 final Map<String, Map<String, Integer>> pktPairFreqsByHostname =
138 TcpConversationUtils.countPacketPairFrequenciesByHostname(allConversations, dnsMap);
139 System.out.println("Counted frequencies of packet pairs per hostname");
140 // For each user action, reassemble the set of TCP connections occurring shortly after
141 final Map<UserAction, List<Conversation>> userActionToConversations = trafficLabeler.getLabeledReassembledTcpTraffic();
142 final Map<UserAction, Map<String, List<Conversation>>> userActionsToConvsByHostname = trafficLabeler.getLabeledReassembledTcpTraffic(dnsMap);
143 System.out.println("Reassembled TCP conversations occurring shortly after each user event");
147 // Contains all ON events: hostname -> sequence identifier -> list of conversations with that sequence
148 Map<String, Map<String, List<Conversation>>> ons = new HashMap<>();
149 // Contains all OFF events: hostname -> sequence identifier -> list of conversations with that sequence
150 Map<String, Map<String, List<Conversation>>> offs = new HashMap<>();
151 userActionsToConvsByHostname.forEach((ua, hostnameToConvs) -> {
152 Map<String, Map<String, List<Conversation>>> outer = ua.getType() == Type.TOGGLE_ON ? ons : offs;
153 hostnameToConvs.forEach((host, convs) -> {
154 Map<String, List<Conversation>> seqsToConvs = TcpConversationUtils.
155 groupConversationsByPacketSequence(convs);
156 outer.merge(host, seqsToConvs, (oldMap, newMap) -> {
157 newMap.forEach((sequence, cs) -> oldMap.merge(sequence, cs, (list1, list2) -> {
166 System.out.println("");
168 // -------------------------------------------------------------------------------------------------------------
169 // -------------------------------------------------------------------------------------------------------------
175 // TP-Link MAC 50:c7:bf:33:1f:09 and usually IP 192.168.1.159 (remember to verify per file)
176 // frame.len >= 556 && frame.len <= 558 && ip.addr == 192.168.1.159