{"title":"Characterization of Traffic Analysis based video stream source identification","authors":"Yan Shi, S. Biswas","doi":"10.1109/ANTS.2015.7413623","DOIUrl":null,"url":null,"abstract":"This paper presents the concept and characterization of Traffic Analysis (TA) for identifying sources of tunneled video streaming traffic. Such identification can be used in enterprise firewalls for blocking unauthorized viewing of tunneled video. We attempt to characterize and evaluate the impacts of the primary TA-influencing factors, namely, streaming protocol, codec, and the actual video content. A test environment is built to study the influence of those factors while Packet Size Distribution is used as the classification feature during Traffic Analysis. Analysis done on data obtained from the test environment has shown that the streaming protocols provide the most dominant source identification distinction. Also, while the codecs provide some weak distinctions, the influence of video content is marginal. In addition to in-laboratory experiments, a real-world verification for corroborating those observations is also made with commercial streaming service providers. Such long-haul experiments indicate that the end-to-end network conditions between the streaming server and video client can act as an additional influencing factor for traffic analysis towards video stream source identification. Overall, the results suggest the feasibility of TA for unknown video stream source identification with sufficiently diverse video examples.","PeriodicalId":347920,"journal":{"name":"2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ANTS.2015.7413623","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
This paper presents the concept and characterization of Traffic Analysis (TA) for identifying sources of tunneled video streaming traffic. Such identification can be used in enterprise firewalls for blocking unauthorized viewing of tunneled video. We attempt to characterize and evaluate the impacts of the primary TA-influencing factors, namely, streaming protocol, codec, and the actual video content. A test environment is built to study the influence of those factors while Packet Size Distribution is used as the classification feature during Traffic Analysis. Analysis done on data obtained from the test environment has shown that the streaming protocols provide the most dominant source identification distinction. Also, while the codecs provide some weak distinctions, the influence of video content is marginal. In addition to in-laboratory experiments, a real-world verification for corroborating those observations is also made with commercial streaming service providers. Such long-haul experiments indicate that the end-to-end network conditions between the streaming server and video client can act as an additional influencing factor for traffic analysis towards video stream source identification. Overall, the results suggest the feasibility of TA for unknown video stream source identification with sufficiently diverse video examples.