2019
DOI: 10.1109/tnet.2019.2906568
|View full text |Cite
|
Sign up to set email alerts
|

Traffic-Based Side-Channel Attack in Video Streaming

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 28 publications
(12 citation statements)
references
References 35 publications
0
12
0
Order By: Relevance
“…Aceto proposed a novel heuristic to reconstruct application-layer messages from encrypted traffic [18]. Gu et al further utilized DTW to match video fingerprints and traffic patterns, with a classifier to identify encrypted video streams from multiple websites [19]. As the prevalence of deep learning, neural network has an advantage of feature extraction in sophisticated environment.…”
Section: B Privacy Leakage From Video Bitrate Streammentioning
confidence: 99%
See 1 more Smart Citation
“…Aceto proposed a novel heuristic to reconstruct application-layer messages from encrypted traffic [18]. Gu et al further utilized DTW to match video fingerprints and traffic patterns, with a classifier to identify encrypted video streams from multiple websites [19]. As the prevalence of deep learning, neural network has an advantage of feature extraction in sophisticated environment.…”
Section: B Privacy Leakage From Video Bitrate Streammentioning
confidence: 99%
“…Distance or similarity measures are essential in solving many pattern recognition problems such as classification and clustering, which are prevalent in signal analysis, speech recognition and other applications [24]. Traditional methods mainly include point based solutions (e.g., Edit Distance on Real Sequence(EDR) [25],Dynamic Time Warping(DTW) Schuster et al [3] a CNN-based model to identify the traffic pattern fingerprints Gu et al [19] a method using DTW to match video fingerprints and traffic patterns Zhang et al [22] a method to identify the zero-day traffic from the tagged traffic using k-means and random forest Hu et al [23] an improved SVM method,which can eliminate the influence of weak correlation and outlier samples…”
Section: Similarity Measurementioning
confidence: 99%
“…Multiple approaches, both algorithmic and machine learning based, have been taken to use this data for malicious purposes. e algorithmic approaches [3,4] seek to measure similarity between the user's bit-rate data and the adversary's prerecorded bitrate data for a specific video. e machine learning approaches [2,5] seek to predict whether or not a user is watching the video selected by the adversary.…”
Section: Traffic Analysis Attackmentioning
confidence: 99%
“…Implementing algorithmic approaches has also been effective in video fingerprinting for identification. Gu et al [3] achieved up to 90% accuracy using a variant of dynamic time warping. Dynamic time warping is an algorithm for comparing time series data.…”
Section: Mpeg-dash Leakmentioning
confidence: 99%
See 1 more Smart Citation