Efficient Traducer Tracing System Using Traffic Volume Information
نویسندگان
چکیده
-Many leading Broadband access technologies and their accessing abilities have the capability to meet the future requirements of the Broadband consumer. With the enormous growth in the broadband technologies, there is a need of applying simmering technology in many applications like video conference systems and content transmission systems. Streaming content enables users to get access the files quickly and not have to wait until the file is done downloading. Security remains one of the main challenges for Content Streaming. Digital Rights Management (DRM) system must be implemented to avoid content spreading and un-intentional content usage. Water marking technology can also be used to implement the DRM system but it has its own limitations and attacks. A control method for the steaming content delivery is required to prevent abuse of the content. For this reason, authors have proposed a contended methodology that uses traffic volume information obtained from routers. Traducer tracing is one of the essential technologies that designs DRM systems, and empowers content distributors to notice and control content acquisition. This technology utilizes the main concept of traffic contours that helps to determine who is watching the streaming content and whether or not a secondary content delivery exists i.e., mainly used to determine whether the network is being traced out by the intruder or not. KeywordsContent Streaming; Traffic Contours; Traducer Tracing; Digital Rights Management.
منابع مشابه
Traffic congestion control using Smartphone sensors based on IoT Technology
Traffic congestion in road networks is one of the main issues to be addressed, also vehicle traffic congestion and monitoring has become one of the critical issues in road transport. With the help of Intelligent Transportation System (ITS), current information of traffic can be used by control room to improve the traffic efficiency. The suggested system utilize technologies for real-time collect...
متن کاملModeling of the Relationships Between Spatio-Temporal Changes of Traffic Volume and Particulate Matter-2.5 Pollutant Concentration Based on Geographically Weighted Regression (GWR) and Inverse Distance Weighting (IDW) Model: A Case Study in Tehran M
Background and Aim: High concentrations of particulate matter-25 (PM2.5) have been the cause of the unhealthiest days in Tehran, Iran in recent years. This study was conducted with the aim of the spatio-temporal analysis of traffic volume and its relationship with PM2.5 pollutant concentrations in Tehran metropolis, Tehran during 2015-2018, using the Geographic Information System (GIS). Materi...
متن کاملMOT: Memory Online Tracing of Web Information System
With advances in World-Wide Web applications and technologies, research on measurement and modeling of Internet and Web-based information systems has become increasingly important. This paper focuses on continuously monitoring Web traffic by packet sniffing on high-speed links, which is the foundation of analyzing theoretical models of Web characteristics and evolvement. The author presents MOT...
متن کاملReal Time Environment Representation in Driving Scenarios Based on Object Delimiters Extraction
In this paper we present and evaluate several methods for real-time environment representation by extracting object delimiters from the traffic scenes using a Dense Stereovision System. The delimiters detection is based on processing the information provided by a 3D classified occupancy grid obtained from the raw dense stereo information. One of the problems in representing the environment thro...
متن کاملIP Traceback for Flooding attacks on Internet Threat Monitors (ITM) Using Honeypots
The Internet Threat Monitoring (ITM) is an efficient monitoring system used globally to measure, detect, characterize and track threats such as denial of service (DoS) and distributed Denial of Service (DDoS) attacks and worms. . To block the monitoring system in the internet the attackers are targeted the ITM system. In this paper we address the flooding attack of DDoS against ITM monitors to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011