Skip to content
Datasets and code for IMC'19 paper on information exposure from IoT devices
Python Shell Jupyter Notebook
Branch: master
Clone or download
Latest commit 27cda5f Sep 18, 2019
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
destination IMC 2019 Paper Sep 18, 2019
encryption IMC 2019 Paper Sep 18, 2019
model update link; minor fixes Sep 18, 2019
moniotr IMC 2019 Paper Sep 18, 2019
.gitignore IMC 2019 Paper Sep 18, 2019
README.md IMC 2019 Paper Sep 18, 2019
lab.png IMC 2019 Paper Sep 18, 2019

README.md

Information Exposure From Consumer IoT Devices

This site contains analysis code accompanying the paper "Information Exposure From Consumer IoT Devices: A Multidimensional, Network-Informed Measurement Approach", in proceedings of the ACM Internet Measurement Conference 2019 (IMC 2019), October, 2019, Amsterdam, Netherlands.

The testbed code and documentation can be found at https://moniotrlab.ccis.neu.edu/tools/. Currently it is deployed in both Northeastern University and Imperial College London.

GitHub Logo

Datasets

We release the traffic (packet headers) from 34,586 controlled experiments via Google Drive > iot-data.tgz, size=~5.7GB.

The naming convention for the data is {country}{-vpn|}/{device_name}/{activity_name}/{datetime}.{length}.pcap. For example, us/amcrest-cam-wired/power/2019-04-10_21:32:18.256s.pcap is the traffic collected from device amcrest-cam-wired when power on at the time of 2019-04-10_21:32:18, which lasts 256 seconds in the us lab without VPN.

If you need access to the full dataset (i.e., with payload of all the packets), please contact the Mon(IoT)r research group at moniotr@ccs.neu.edu. We require that you agree to terms similar to the CAIDA Acceptable Use Agreement (https://www.caida.org/home/legal/aua/). This is out of an abundance of caution to protect any private or security-sensitive information that we were unable to remove from the traces.

File Structure

Each subfolder shows samples of processing each PCAP file for destination, encryption and content analysis.

  • README.md # This file
  • moniotr/ # Code to automate experiments
  • destinations/ # Code for Section 4. Destination Analysis
  • encryption/ # Code for Section 5. Encryption Analysis
  • model/ # Code for Section 6. Content Analysis
You can’t perform that action at this time.