Called function identification of IoT devices by network traffic analysis

Daichi Koike, Shigemi Ishida, Yutaka Arakawa

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

IoT devices are currently used in various situations, with the number of applications steadily increasing over the past few years. These IoT devices are connected to outside networks, and as such are often targets of hacking attempts and associated with private user information leaks. The end user is often unaware of how these devices operate, and as a result is unable to notice any unauthorized communication. In response, we aim to create a system to visualize the activity of an IoT device (IoT activity monitor). To create this system, we analyze the network traffic of an IoT device and propose a way to estimate which function it uses. Using Wire-Shark, a packet capture software, we evaluate the data transmitted from the Amazon Echo Spot, Amazon Echo Dot and Amazon Echo Flex, which are smart speakers. We confirmed that we can estimate 8~10 kinds of called functions with 76.1%, 89.8% and 85.2% accuracy for each smart speaker respectively.

Original languageEnglish
Title of host publicationProceedings of the 36th Annual ACM Symposium on Applied Computing, SAC 2021
PublisherAssociation for Computing Machinery
Pages737-743
Number of pages7
ISBN (Electronic)9781450381048
DOIs
Publication statusPublished - Mar 22 2021
Event36th Annual ACM Symposium on Applied Computing, SAC 2021 - Virtual, Online, Korea, Republic of
Duration: Mar 22 2021Mar 26 2021

Publication series

NameProceedings of the ACM Symposium on Applied Computing

Conference

Conference36th Annual ACM Symposium on Applied Computing, SAC 2021
Country/TerritoryKorea, Republic of
CityVirtual, Online
Period3/22/213/26/21

All Science Journal Classification (ASJC) codes

  • Software

Fingerprint

Dive into the research topics of 'Called function identification of IoT devices by network traffic analysis'. Together they form a unique fingerprint.

Cite this