Video Streaming Forensic - Content Identification with Traffic Snooping

نویسندگان

  • Yali Liu
  • Ahmad-Reza Sadeghi
  • Dipak Ghosal
  • Biswanath Mukherjee
چکیده

Previous research has shown that properties of network traffic (network fingerprints) can be exploited to extract information about the content of streaming multimedia, even when the traffic is encrypted. However, the existing attacks suffer from several limitations: (i) the attack process is time consuming, (ii) the tests are performed under nearly identical network conditions while the practical fingerprints are normally variable in terms of the end-to-end network connections, and (iii) the total possible video streams are limited to a small pre-known set while the performance against possibly larger databases remains unclear. In this paper, we overcome the above limitations by introducing a traffic analysis scheme that is both robust and efficient for variable bit rate (VBR) video streaming. To construct unique and robust video signatures with different compactness, we apply a (wavelet-based) analysis to extract the long and short range dependencies within the video traffic. Statistical significance testing is utilized to construct an efficient matching algorithm. We evaluate the performance of the identification algorithm using a large video database populated with a variety of movies and TV shows. Our experimental results show that, even under different real network conditions, our attacks can achieve high detection rates and low false alarm rates using video clips of only a few minutes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Feedback Based Mechanism for Video Streaming Over Multipath Ad Hoc Networks

Ad hoc networks are multi-hop wireless networks without a pre-installed infrastructure. Such networks are widely used in military applications and in emergency situations as they permit the establishment of a communication network at very short notice with a very low cost. Video is very sensitive for packet loss and wireless ad-hoc networks are error prone due to node mobility and weak links. H...

متن کامل

Mobile Multimedia Traffic Analysis : Clients Can Waste Network

Video is increasingly becoming one of the most pervasive technologies in terms of everyday usage, both for entertainment and in the enterprise environments. Mobile video is responsible for a majority of the growth seen in mobile broadband data volume. Video streaming on mobile devices is on the rise. According to recent reports, mobile video streaming traffic accounted for 52.8% of total mobile...

متن کامل

Content-Based Retransmission for 3-D Wavelet Video Streaming on the Internet

Improving the QoS of video streaming over lossy networks is a challenging topic of research. In this paper, we propose a novel content-based retransmission scheme for streaming 3-D wavelet compressed video. The fundamental idea is to consider the content of the packets and the traffic of the Internet simultaneously to optimize the QoS. In the encoding stage, the content information is generated...

متن کامل

Streaming Video Traffic : Characterization and Network Impact

The emergence of the Internet as a pervasive communication medium, and the widespread availability of digital video technology have led to the rise of several networked streaming media applications such as live video broadcasts, distance education and corporate telecasts. This paper studies the traffic associated with two major categories of streaming content on-demand streaming of pre-recorded...

متن کامل

Real Time Video Quality Representation Classification of Encrypted HTTP Adaptive Video Streaming - the Case of Safari

The increasing popularity of HTTP adaptive video streaming services has dramatically increased bandwidth requirements on operator networks, which attempt to shape their traffic through Deep Packet Inspection (DPI). However, Google and certain content providers have started to encrypt their video services. As a result, operators often encounter difficulties in shaping their encrypted video traff...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010