物联网网关网络通信分析

Jan Zbořil, Ondřej Hujňák, K. Malinka
{"title":"物联网网关网络通信分析","authors":"Jan Zbořil, Ondřej Hujňák, K. Malinka","doi":"10.1109/ICOIN56518.2023.10049047","DOIUrl":null,"url":null,"abstract":"Modern IoT gateways are mainly developed by corporates. This results in closed systems, where a small amount of information about gateways is available to the public. Thus, we find it important to analyse network traffic of such gateways.This paper’s primary goal is to gain information from network traffic data of commercially available gateways intended for home use. This information can be used, for example, for device profiling. We deploy four gateways in a controlled environment and capture their traffic in two modes. We analyse communication behaviours, point out interesting and unusual patterns in traffic, compare results to other studies, and discuss possible attacks on used gateways based on our data. We also published the gathered dataset.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"IoT Gateways Network Communication Analysis\",\"authors\":\"Jan Zbořil, Ondřej Hujňák, K. Malinka\",\"doi\":\"10.1109/ICOIN56518.2023.10049047\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Modern IoT gateways are mainly developed by corporates. This results in closed systems, where a small amount of information about gateways is available to the public. Thus, we find it important to analyse network traffic of such gateways.This paper’s primary goal is to gain information from network traffic data of commercially available gateways intended for home use. This information can be used, for example, for device profiling. We deploy four gateways in a controlled environment and capture their traffic in two modes. We analyse communication behaviours, point out interesting and unusual patterns in traffic, compare results to other studies, and discuss possible attacks on used gateways based on our data. We also published the gathered dataset.\",\"PeriodicalId\":285763,\"journal\":{\"name\":\"2023 International Conference on Information Networking (ICOIN)\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Information Networking (ICOIN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOIN56518.2023.10049047\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Information Networking (ICOIN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOIN56518.2023.10049047","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

现代物联网网关主要由企业开发。这导致了封闭的系统,其中有关网关的少量信息可供公众使用。因此,我们发现分析这些网关的网络流量非常重要。本文的主要目标是从商用网关的网络流量数据中获取信息,用于家庭使用。例如,这些信息可用于设备分析。我们在受控环境中部署了四个网关,并以两种模式捕获它们的流量。我们分析通信行为,指出流量中有趣和不寻常的模式,将结果与其他研究进行比较,并根据我们的数据讨论对使用网关的可能攻击。我们还发布了收集到的数据集。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
IoT Gateways Network Communication Analysis
Modern IoT gateways are mainly developed by corporates. This results in closed systems, where a small amount of information about gateways is available to the public. Thus, we find it important to analyse network traffic of such gateways.This paper’s primary goal is to gain information from network traffic data of commercially available gateways intended for home use. This information can be used, for example, for device profiling. We deploy four gateways in a controlled environment and capture their traffic in two modes. We analyse communication behaviours, point out interesting and unusual patterns in traffic, compare results to other studies, and discuss possible attacks on used gateways based on our data. We also published the gathered dataset.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信