Preventing the Video Leakages from The Traffic Streaming
DOI:
https://doi.org/10.32628/CSEIT206492Keywords:
DASH streaming, Video dataset with fingerprints, segment-based data transmission and VBRencoding, Adaptation Algorithm.Abstract
Video streaming takes up an increasing proportion of network traffic nowadays. Dynamic Adaptive Streaming over HTTP (DASH) becomes the defacto standard of video streaming and it is adopted by YouTube, Netflix, etc.Despite of the popularity, network traffic during video streaming shows identifiable pattern which brings threat to user privacy.In this paper, to proposea video identification method using network traffic while streaming. Though there is bitrate adaptation in DASH streaming, we observe that the video bit rate trend remains relatively stable because of the widely used Variable Bit-Rate(VBR) encoding. Accordingly, we design a robust video feature extraction method for eavesdropped video streaming traffic. Meanwhile, we design a VBR based video fingerprinting method for candidate video set which can be built using downloaded video files. Finally, to propose an efficient partial matching method for computing similarities between video fingerprints and streaming traces to derive video identities. To evaluate our attack method in different scenarios for various video content, segment lengths and quality levels. The experimental results show that the identification accuracy can reach up to 90%using only three minute continuous network traffic eavesdropping.
References
- C. V. networking Index, “Forecast and methodology, 2016-2021, white paper,” San Jose, CA, USA, vol. 1, 2016.
- T. Wang, X. Cai, R. Nithyanand, R. Johnson, and I. Goldberg, “Effective attacks and provable defenses for website fingerprinting,” in Proceedings of the 123rd USENIX Conference on Security Symposium, ser. SEC’14. Berkeley, CA,USA: USENIX Association, 2014, pp. 143–157.
- W. Wang and D. N. Cheng, “Skype traffic identification based on trendsaware protocol fingerprints,” in Vehicle, Mechatronics and Information Technologies II, ser. Applied Mechanics and Materials, vol. 543. Trans Tech Publications, Jun. 2014, pp. 2249–2254.
- A. K. Das, P. H. Pathak, C. N. Chuah, and P. Mohapatra, “Contextual localization through network traffic analysis,” in IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, Apr. 2014, pp. 925– 933.
- H. Li, Z. Xu, H. Zhu, D. Ma, S. Li, and K. Xing, “Demographics inference through wi-fi network traffic analysis,” in IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, Apr. 2016, pp. 1–9.
- A. Reed and B. Klimkowski, “Leaky streams: Identifying variable bitrate dash videos streamed over encrypted 802.11n connections,” in 2016 13th IEEE Annual Consumer Communications Networking Conference (CCNC), Jan.2016, pp. 1107–1112.
- A. Reed and M. Kranch, “Identifying https-protected netflix videos in realtime,” in Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, ser. CODASPY ’17. New York, NY, USA:ACM, 2017, pp. 361–368.
- R. Schuster, V. Shmatikov, and E. Tromer, “Beauty and the burst: Remote identification of encrypted video streams,” in 26th USENIX Security Symposium (USENIX Security 17). Vancouver, BC: USENIX Association, 2017, pp. 1357–1374.
- P. Tormene, T. Giorgino, S. Quaglini, and M. Stefanelli, “Matching incomplete time series with dynamic time warping: an algorithm and an application to post-stroke rehabilitation,” Artificial intelligence in medicine, vol.45, no. 1, pp. 11–34, 2009.
- L. J. Latecki, V. Megalooikonomou, Q. Wang, and D. Yu, “An elastic partial shape matching technique,” Pattern Recogn., vol. 40, no. 11, pp. 3069–3080,Nov. 2007.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.