import static edu.uci.iotproject.analysis.UserAction.Type;
-import edu.uci.iotproject.analysis.TcpConversationUtils;
-import edu.uci.iotproject.analysis.TrafficLabeler;
-import edu.uci.iotproject.analysis.TriggerTrafficExtractor;
-import edu.uci.iotproject.analysis.UserAction;
+import edu.uci.iotproject.analysis.*;
import edu.uci.iotproject.comparison.seqalignment.ExtractedSequence;
import edu.uci.iotproject.comparison.seqalignment.SequenceAlignment;
import edu.uci.iotproject.comparison.seqalignment.SequenceExtraction;
import edu.uci.iotproject.io.TriggerTimesFileReader;
+import edu.uci.iotproject.util.PrintUtils;
+import org.apache.commons.math3.stat.clustering.Cluster;
+import org.apache.commons.math3.stat.clustering.DBSCANClusterer;
import org.pcap4j.core.*;
import org.pcap4j.packet.namednumber.DataLinkType;
import java.time.Instant;
import java.util.*;
import java.util.concurrent.TimeoutException;
+import java.util.stream.Collectors;
+import java.util.stream.Stream;
/**
* This is a system that reads PCAP files to compare
// 2b) TP-Link July 25 experiment TRUNCATED:
// Only contains "true local" events, i.e., before the behavior changes to remote-like behavior.
// Last included event is at July 25 10:38:11; file filtered to only include packets with arrival time <= 10:38:27.
- final String inputPcapFile = path + "/2018-07/tplink/tplink.wlan1.local.truncated.pcap";
- final String outputPcapFile = path + "/2018-07/tplink/tplink-processed.truncated.pcap";
- final String triggerTimesFile = path + "/2018-07/tplink/tplink-july-25-2018.truncated.timestamps";
- final String deviceIp = "192.168.1.159";
+// final String inputPcapFile = path + "/2018-07/tplink/tplink.wlan1.local.truncated.pcap";
+// final String outputPcapFile = path + "/2018-07/tplink/tplink-processed.truncated.pcap";
+// final String triggerTimesFile = path + "/2018-07/tplink/tplink-july-25-2018.truncated.timestamps";
+// final String deviceIp = "192.168.1.159";
// 3) SmartThings Plug July 25 experiment
// final String inputPcapFile = path + "/2018-07/stplug/stplug.wlan1.local.pcap";
// final String inputPcapFile = path + "/2018-08/tplink-bulb/tplinkbulb.wlan1.local.pcap";
// final String outputPcapFile = path + "/2018-08/tplink-bulb/tplinkbulb-processed.pcap";
// final String triggerTimesFile = path + "/2018-08/tplink-bulb/tplink-bulb-aug-3-2018.timestamps";
-// final String deviceIp = "192.168.1.246";
+// final String deviceIp = "192.168.1.140"; // .246 == phone; .140 == TP-Link bulb
// 7) Kwikset Doorlock August 6 experiment
// final String inputPcapFile = path + "/2018-08/kwikset-doorlock/kwikset-doorlock.wlan1.local.pcap";
// final String triggerTimesFile = path + "/2018-08/kwikset-doorlock/kwikset-doorlock-aug-6-2018.timestamps";
// final String deviceIp = "192.168.1.246"; // .246 == phone; .142 == SmartThings Hub (note: use eth0 capture for this!)
+ // September 12, 2018 - includes both wlan1 and eth1 interfaces
+ //final String inputPcapFile = path + "/2018-08/kwikset-doorlock/kwikset3.wlan1.local.pcap";
+// final String inputPcapFile = path + "/2018-08/kwikset-doorlock/kwikset3.eth1.local.pcap";
+// final String outputPcapFile = path + "/2018-08/kwikset-doorlock/kwikset3-processed.pcap";
+// final String triggerTimesFile = path + "/2018-08/kwikset-doorlock/kwikset-doorlock-sept-12-2018.timestamps";
+// final String deviceIp = "192.168.1.142"; // .246 == phone; .142 == SmartThings Hub (note: use eth0 capture for this!)
+
// 8) Hue Bulb August 7 experiment
// final String inputPcapFile = path + "/2018-08/hue-bulb/hue-bulb.wlan1.local.pcap";
// final String outputPcapFile = path + "/2018-08/hue-bulb/hue-bulb-processed.pcap";
// final String inputPcapFile = path + "/2018-08/lifx-bulb/lifx-bulb.wlan1.local.pcap";
// final String outputPcapFile = path + "/2018-08/lifx-bulb/lifx-bulb-processed.pcap";
// final String triggerTimesFile = path + "/2018-08/lifx-bulb/lifx-bulb-aug-8-2018.timestamps";
-// final String deviceIp = "192.168.1.231"; // .246 == phone; .231 == Lifx
+// final String deviceIp = "192.168.1.246"; // .246 == phone; .231 == Lifx
// 10) Amcrest Camera August 9 experiment
// final String inputPcapFile = path + "/2018-08/amcrest-camera/amcrest-camera.wlan1.local.pcap";
// final String triggerTimesFile = path + "/2018-08/blossom/blossom-aug-13-2018.timestamps";
// final String deviceIp = "192.168.1.246"; // .246 == phone; .229 == sprinkler
- // 13) DLink siren August 14 experiment
-// final String inputPcapFile = path + "/2018-08/dlink-siren/dlink-siren.wlan1.local.pcap";
-// final String outputPcapFile = path + "/2018-08/dlink-siren/dlink-siren-processed.pcap";
-// final String triggerTimesFile = path + "/2018-08/dlink-siren/dlink-siren-aug-14-2018.timestamps";
-// final String deviceIp = "192.168.1.246"; // .246 == phone; .183 == siren
+// // 13) DLink siren August 14 experiment
+ final String inputPcapFile = path + "/2018-08/dlink-siren/dlink-siren.wlan1.local.pcap";
+ final String outputPcapFile = path + "/2018-08/dlink-siren/dlink-siren-processed.pcap";
+ final String triggerTimesFile = path + "/2018-08/dlink-siren/dlink-siren-aug-14-2018.timestamps";
+ final String deviceIp = "192.168.1.183"; // .246 == phone; .183 == siren
// 14) Nest thermostat August 15 experiment
// final String inputPcapFile = path + "/2018-08/nest/nest.wlan1.local.pcap";
// final String triggerTimesFile = path + "/2018-08/alexa/alexa-aug-17-2018.timestamps";
// final String deviceIp = "192.168.1.225"; // .246 == phone; .225 == Alexa
+ // September 17
+// final String inputPcapFile = path + "/2018-08/noise/noise.eth1.pcap";
+// final String outputPcapFile = path + "/2018-08/noise/noise-processed.pcap";
+// final String triggerTimesFile = path + "/2018-08/noise/noise-sept-17-2018.timestamps";
+// final String deviceIp = "192.168.1.142"; // .142 == SmartThings Hub; .199 == dlink plug; .183 == siren
+
TriggerTimesFileReader ttfr = new TriggerTimesFileReader();
List<Instant> triggerTimes = ttfr.readTriggerTimes(triggerTimesFile, false);
// Tag each trigger with "ON" or "OFF", assuming that the first trigger is an "ON" and that they alternate.
+ /*
+ * NOTE: no need to generate these more complex on/off maps that also contain mappings from hostname and
+ * sequence identifiers as we do not care about hostnames and sequences during clustering.
+ * We can simply use the UserAction->List<Conversation> map to generate ON/OFF groupings of conversations.
+ */
+ /*
// Contains all ON events: hostname -> sequence identifier -> list of conversations with that sequence
Map<String, Map<String, List<Conversation>>> ons = new HashMap<>();
// Contains all OFF events: hostname -> sequence identifier -> list of conversations with that sequence
});
});
});
+ */
+
+ // ================================================ CLUSTERING ================================================
+ // Note: no need to use the more convoluted on/off maps; can simply use the UserAction->List<Conversation> map
+ // when don't care about hostnames and sequences (see comment earlier).
+ List<Conversation> onConversations = userActionToConversations.entrySet().stream().
+ filter(e -> e.getKey().getType() == Type.TOGGLE_ON). // drop all OFF events from stream
+ map(e -> e.getValue()). // no longer interested in the UserActions
+ flatMap(List::stream). // flatten List<List<T>> to a List<T>
+ collect(Collectors.toList());
+ List<Conversation> offConversations = userActionToConversations.entrySet().stream().
+ filter(e -> e.getKey().getType() == Type.TOGGLE_OFF).
+ map(e -> e.getValue()).
+ flatMap(List::stream).
+ collect(Collectors.toList());
+ List<PcapPacketPair> onPairs = onConversations.stream().
+ map(c -> c.isTls() ? TcpConversationUtils.extractTlsAppDataPacketPairs(c) :
+ TcpConversationUtils.extractPacketPairs(c)).
+ flatMap(List::stream). // flatten List<List<>> to List<>
+ collect(Collectors.toList());
+ List<PcapPacketPair> offPairs = offConversations.stream().
+ map(c -> c.isTls() ? TcpConversationUtils.extractTlsAppDataPacketPairs(c) :
+ TcpConversationUtils.extractPacketPairs(c)).
+ flatMap(List::stream). // flatten List<List<>> to List<>
+ collect(Collectors.toList());
+ // Note: need to update the DnsMap of all PcapPacketPairs if we want to use the IP/hostname-sensitive distance.
+ Stream.concat(Stream.of(onPairs), Stream.of(offPairs)).flatMap(List::stream).forEach(p -> p.setDnsMap(dnsMap));
+ // Perform clustering on conversation logged as part of all ON events.
+ DBSCANClusterer<PcapPacketPair> onClusterer = new DBSCANClusterer<>(10.0, 5);
+ List<Cluster<PcapPacketPair>> onClusters = onClusterer.cluster(onPairs);
+ // Perform clustering on conversation logged as part of all OFF events.
+ DBSCANClusterer<PcapPacketPair> offClusterer = new DBSCANClusterer<>(10.0, 5);
+ List<Cluster<PcapPacketPair>> offClusters = offClusterer.cluster(offPairs);
+ // Output clusters
+ System.out.println("========================================");
+ System.out.println(" Clustering results for ON ");
+ System.out.println(" Number of clusters: " + onClusters.size());
+ int count = 0;
+ for (Cluster<PcapPacketPair> c : onClusters) {
+ System.out.println(String.format("<<< Cluster #%02d (%03d points) >>>", ++count, c.getPoints().size()));
+ System.out.print(PrintUtils.toSummaryString(c));
+ }
+ System.out.println("========================================");
+ System.out.println(" Clustering results for OFF ");
+ System.out.println(" Number of clusters: " + offClusters.size());
+ count = 0;
+ for (Cluster<PcapPacketPair> c : offClusters) {
+ System.out.println(String.format("<<< Cluster #%03d (%06d points) >>>", ++count, c.getPoints().size()));
+ System.out.print(PrintUtils.toSummaryString(c));
+ }
+ System.out.println("========================================");
+ // ============================================================================================================
/*
+ System.out.println("==== ON ====");
// Print out all the pairs into a file for ON events
File fileOnEvents = new File(onPairsPath);
PrintWriter pwOn = null;
for(Conversation conv : listConv) {
// Process only if it is a TLS packet
if (conv.isTls()) {
- List<PcapPacket> tlsAppDataList = conv.getTlsApplicationDataPackets();
- // Loop and print out packets
- int count = 0;
- for (PcapPacket pcap : tlsAppDataList) {
- boolean isPair = false;
- if (count % 2 == 0) {
- pwOn.print(pcap.length() + ", ");
- //System.out.print(pcap.length() + ", ");
- } else {// count%2 == 1
- isPair = true;
- pwOn.println(pcap.length());
- //System.out.println(pcap.length());
- }
- count++;
- // If we can't create a pair then just pad it with 0
- if (count == tlsAppDataList.size() && !isPair) {
- pwOn.println("0");
- //System.out.println("0");
- }
+ List<PcapPacketPair> tlsAppDataList = TcpConversationUtils.extractTlsAppDataPacketPairs(conv);
+ for(PcapPacketPair pair: tlsAppDataList) {
+ System.out.println(PrintUtils.toCsv(pair, dnsMap));
+ pwOn.println(PrintUtils.toCsv(pair, dnsMap));
+ }
+ } else { // Non-TLS conversations
+ List<PcapPacketPair> packetList = TcpConversationUtils.extractPacketPairs(conv);
+ for(PcapPacketPair pair: packetList) {
+ System.out.println(PrintUtils.toCsv(pair, dnsMap));
+ pwOn.println(PrintUtils.toCsv(pair, dnsMap));
}
}
}
}
pwOn.close();
+ System.out.println("==== OFF ====");
// Print out all the pairs into a file for ON events
File fileOffEvents = new File(offPairsPath);
PrintWriter pwOff = null;
for(Conversation conv : listConv) {
// Process only if it is a TLS packet
if (conv.isTls()) {
- List<PcapPacket> tlsAppDataList = conv.getTlsApplicationDataPackets();
- // Loop and print out packets
- int count = 0;
- for (PcapPacket pcap : tlsAppDataList) {
- boolean isPair = false;
- if (count % 2 == 0) {
- pwOff.print(pcap.length() + ", ");
- //System.out.print(pcap.length() + ", ");
- } else {// count%2 == 1
- isPair = true;
- pwOff.println(pcap.length());
- //System.out.println(pcap.length());
- }
- count++;
- // If we can't create a pair then just pad it with 0
- if (count == tlsAppDataList.size() && !isPair) {
- pwOff.println("0");
- //System.out.println("0");
- }
+ List<PcapPacketPair> tlsAppDataList = TcpConversationUtils.extractTlsAppDataPacketPairs(conv);
+ for(PcapPacketPair pair: tlsAppDataList) {
+ System.out.println(PrintUtils.toCsv(pair, dnsMap));
+ pwOff.println(PrintUtils.toCsv(pair, dnsMap));
+ }
+ } else { // Non-TLS conversations
+ List<PcapPacketPair> packetList = TcpConversationUtils.extractPacketPairs(conv);
+ for (PcapPacketPair pair : packetList) {
+ System.out.println(PrintUtils.toCsv(pair, dnsMap));
+ pwOff.println(PrintUtils.toCsv(pair, dnsMap));
}
}
}
pwOff.close();
*/
- // ================================================================================================
- // <<< Some work-in-progress/explorative code that extracts a "representative" sequence >>>
- //
- // Currently need to know relevant hostname in advance :(
- String hostname = "events.tplinkra.com";
-// String hostname = "rfe-us-west-1.dch.dlink.com";
- // Conversations with 'hostname' for ON events.
- List<Conversation> onsForHostname = new ArrayList<>();
- // Conversations with 'hostname' for OFF events.
- List<Conversation> offsForHostname = new ArrayList<>();
- // "Unwrap" sequence groupings in ons/offs maps.
- ons.get(hostname).forEach((k,v) -> onsForHostname.addAll(v));
- offs.get(hostname).forEach((k,v) -> offsForHostname.addAll(v));
-
-
- Map<String, List<Conversation>> onsForHostnameGroupedByTlsAppDataSequence = TcpConversationUtils.groupConversationsByTlsApplicationDataPacketSequence(onsForHostname);
-
-
- // Extract representative sequence for ON and OFF by providing the list of conversations with
- // 'hostname' observed for each event type (the training data).
- SequenceExtraction seqExtraction = new SequenceExtraction();
-// ExtractedSequence extractedSequenceForOn = seqExtraction.extract(onsForHostname);
-// ExtractedSequence extractedSequenceForOff = seqExtraction.extract(offsForHostname);
-
- ExtractedSequence extractedSequenceForOn = seqExtraction.extractByTlsAppData(onsForHostname);
- ExtractedSequence extractedSequenceForOff = seqExtraction.extractByTlsAppData(offsForHostname);
-
- // Let's check how many ONs align with OFFs and vice versa (that is, how many times an event is incorrectly
- // labeled).
- int onsLabeledAsOff = 0;
- Integer[] representativeOnSeq = TcpConversationUtils.getPacketLengthSequence(extractedSequenceForOn.getRepresentativeSequence());
- Integer[] representativeOffSeq = TcpConversationUtils.getPacketLengthSequence(extractedSequenceForOff.getRepresentativeSequence());
- SequenceAlignment<Integer> seqAlg = seqExtraction.getAlignmentAlgorithm();
- for (Conversation c : onsForHostname) {
- Integer[] onSeq = TcpConversationUtils.getPacketLengthSequence(c);
- if (seqAlg.calculateAlignment(representativeOffSeq, onSeq) <= extractedSequenceForOff.getMaxAlignmentCost()) {
- onsLabeledAsOff++;
- }
- }
- int offsLabeledAsOn = 0;
- for (Conversation c : offsForHostname) {
- Integer[] offSeq = TcpConversationUtils.getPacketLengthSequence(c);
- if (seqAlg.calculateAlignment(representativeOnSeq, offSeq) <= extractedSequenceForOn.getMaxAlignmentCost()) {
- offsLabeledAsOn++;
- }
- }
- System.out.println("");
- // ================================================================================================
-
-
- // -------------------------------------------------------------------------------------------------------------
- // -------------------------------------------------------------------------------------------------------------
+// // ================================================================================================
+// // <<< Some work-in-progress/explorative code that extracts a "representative" sequence >>>
+// //
+// // Currently need to know relevant hostname in advance :(
+// String hostname = "events.tplinkra.com";
+//// String hostname = "rfe-us-west-1.dch.dlink.com";
+// // Conversations with 'hostname' for ON events.
+// List<Conversation> onsForHostname = new ArrayList<>();
+// // Conversations with 'hostname' for OFF events.
+// List<Conversation> offsForHostname = new ArrayList<>();
+// // "Unwrap" sequence groupings in ons/offs maps.
+// ons.get(hostname).forEach((k,v) -> onsForHostname.addAll(v));
+// offs.get(hostname).forEach((k,v) -> offsForHostname.addAll(v));
+//
+//
+// Map<String, List<Conversation>> onsForHostnameGroupedByTlsAppDataSequence = TcpConversationUtils.groupConversationsByTlsApplicationDataPacketSequence(onsForHostname);
+//
+//
+// // Extract representative sequence for ON and OFF by providing the list of conversations with
+// // 'hostname' observed for each event type (the training data).
+// SequenceExtraction seqExtraction = new SequenceExtraction();
+//// ExtractedSequence extractedSequenceForOn = seqExtraction.extract(onsForHostname);
+//// ExtractedSequence extractedSequenceForOff = seqExtraction.extract(offsForHostname);
+//
+// ExtractedSequence extractedSequenceForOn = seqExtraction.extractByTlsAppData(onsForHostname);
+// ExtractedSequence extractedSequenceForOff = seqExtraction.extractByTlsAppData(offsForHostname);
+//
+// // Let's check how many ONs align with OFFs and vice versa (that is, how many times an event is incorrectly
+// // labeled).
+// int onsLabeledAsOff = 0;
+// Integer[] representativeOnSeq = TcpConversationUtils.getPacketLengthSequence(extractedSequenceForOn.getRepresentativeSequence());
+// Integer[] representativeOffSeq = TcpConversationUtils.getPacketLengthSequence(extractedSequenceForOff.getRepresentativeSequence());
+// SequenceAlignment<Integer> seqAlg = seqExtraction.getAlignmentAlgorithm();
+// for (Conversation c : onsForHostname) {
+// Integer[] onSeq = TcpConversationUtils.getPacketLengthSequence(c);
+// if (seqAlg.calculateAlignment(representativeOffSeq, onSeq) <= extractedSequenceForOff.getMaxAlignmentCost()) {
+// onsLabeledAsOff++;
+// }
+// }
+// int offsLabeledAsOn = 0;
+// for (Conversation c : offsForHostname) {
+// Integer[] offSeq = TcpConversationUtils.getPacketLengthSequence(c);
+// if (seqAlg.calculateAlignment(representativeOnSeq, offSeq) <= extractedSequenceForOn.getMaxAlignmentCost()) {
+// offsLabeledAsOn++;
+// }
+// }
+// System.out.println("");
+// // ================================================================================================
+//
+//
+// // -------------------------------------------------------------------------------------------------------------
+// // -------------------------------------------------------------------------------------------------------------
}
}