2019 International Conference on Computing, Networking and Communications (ICNC) 2019
DOI: 10.1109/iccnc.2019.8685364
|View full text |Cite
|
Sign up to set email alerts
|

Clustering the Unknown - The Youtube Case

Abstract: Recent stringent end-user security and privacy requirements caused the dramatic rise of encrypted video streams in which YouTube encrypted traffic is one of the most prevalent. Regardless of their encrypted nature, metadata derived from such traffic flows can be utilized to identify the title of a video, thus enabling the classification of video streams into a single video title using a given video title set. Nonetheless, scenarios where no video title set is present and a supervised approach is not feasible, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…1 exhibits a high-level view of the methodology as conducted in this study. As depicted, firstly a sanitisation module is triggered where re-transmissions and audio packets are eliminated from the video stream in a similar fashion as in the previous work in [7]. Moreover, Bits per Peak (BPPs) are computed for each encrypted video stream via re-assembling network flows by using the 5tuple packet-level information 4 between two Off periods within the observed peaks [7].…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…1 exhibits a high-level view of the methodology as conducted in this study. As depicted, firstly a sanitisation module is triggered where re-transmissions and audio packets are eliminated from the video stream in a similar fashion as in the previous work in [7]. Moreover, Bits per Peak (BPPs) are computed for each encrypted video stream via re-assembling network flows by using the 5tuple packet-level information 4 between two Off periods within the observed peaks [7].…”
Section: Methodsmentioning
confidence: 99%
“…In order to confront the challenging task of clustering encrypted video with no a priori knowledge of video titles, the preliminary work in [7] exploited the usefulness of Natural Language Processing (NLP). The proposed solution was composed of a single clustering method relying on a language derived by meta-statistics of network traffic features per encrypted video stream.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, numerous studies [3], [6] show that the combination of DASH and VBR is prone to leak information about video content. Patterns about particular videos that help in identifying those videos are learned by deep learning algorithms demonstrated in [6], [7], [8], and [9]. However, explaining the judgement of these models -models' rationale -for human understanding has remained a challenge for researchers.…”
Section: Introductionmentioning
confidence: 99%
“…However, these segments are delivered to the client's device in a specific method, leaving a delivery pattern in the network traffic. This pattern can be used to identify the video in the network traffic [16], [17]. Many studies have exploited the DASH streaming pattern to identify the videos in the network traffic [18]- [21].…”
mentioning
confidence: 99%