Traffic Pattern Plot: Video Identification in Encrypted Network Traffic

被引:0
|
作者
Kamal, Ali S. [1 ]
Bukhari, Syed M. A. H. [1 ]
Khan, Muhammad U. S. [1 ]
Maqsood, Tahir [1 ]
Fayyaz, Muhammad A. B. [2 ]
机构
[1] COMSATS Univ Islamabad, Dept Comp Sci, Abbottabad, Pakistan
[2] Manchester Metropolitan Univ Manchester, OTEHM, Manchester, Lancs, England
关键词
Traffic pattern; VPN traffic classification; YouTube video identification; Image classification; NEURAL-NETWORKS; CLASSIFICATION; INTERNET;
D O I
10.1007/978-981-19-7663-6_8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of the Internet traffic is encrypted, and the challenge is its ability to recognize the streaming videos from the Internet traffic. In this paper, we present a methodology named traffic pattern plot (TPP) to identify video streams in encrypted network traffic. The proposed methodology plots the video traffic flows and uses a convolutional neural network (CNN) to detect the videos. The results show that the traffic pattern plot generated from 120 s of sniffing network traffic is enough to identify the video even in the encrypted network traffic with 94% accuracy.
引用
收藏
页码:77 / 84
页数:8
相关论文
共 50 条
  • [1] Source identification of encrypted video traffic in the presence of heterogeneous network traffic
    Shi, Yan
    Ross, Arun
    Biswas, Subir
    [J]. COMPUTER COMMUNICATIONS, 2018, 129 : 101 - 110
  • [2] PPS: A Packets Pattern-based Video Identification in Encrypted Network Traffic
    Bukhari, Syed M. A. H.
    Afaq, Muhammad
    Song, Wang-Cheol
    [J]. 16TH IEEE/ACM INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING, UCC 2023, 2023,
  • [3] Protocol identification of encrypted network traffic
    Gebski, Matthew
    Penev, Alex
    Wong, Raymond K.
    [J]. 2006 IEEE/WIC/ACM International Conference on Web Intelligence, (WI 2006 Main Conference Proceedings), 2006, : 957 - 960
  • [4] Accurate Encrypted Malicious Traffic Identification via Traffic Interaction Pattern Using Graph Convolutional Network
    Ren, Guoqiang
    Cheng, Guang
    Fu, Nan
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (03):
  • [5] Protocol-independent Identification of Encrypted Video Traffic Sources Using Traffic Analysis
    Shi, Yan
    Biswas, Subir
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [6] Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes
    Lai, Shangqi
    Yuan, Xingliang
    Sun, Shi-Feng
    Liu, Joseph K.
    Steinfeld, Ron
    Sakzad, Amin
    Liu, Dongxi
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2609 - 2621
  • [7] Research on malicious traffic identification technology in encrypted traffic
    Zeng, Yong
    Wu, Zhengyuan
    Dong, Lihua
    Liu, Zhihong
    Ma, Jianfeng
    Li, Zan
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (03): : 170 - 187
  • [8] Encrypted video traffic clustering demystified
    Dvir, Amit
    Marnerides, Angelos K.
    Dubin, Ran
    Golan, Nehor
    Hajaj, Chen
    [J]. COMPUTERS & SECURITY, 2020, 96
  • [9] Mobile app identification for encrypted network flows by traffic correlation
    He, Gaofeng
    Xu, Bingfeng
    Zhang, Lu
    Zhu, Haiting
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (12):
  • [10] Is the Uplink Enough? Estimating Video Stalls from Encrypted Network Traffic
    Loh, Frank
    Wamser, Florian
    Moldovan, Christian
    Zeidler, Bernd
    Tsilimantos, Dimitrios
    Valentin, Stefan
    Hossfeld, Tobias
    [J]. NOMS 2020 - PROCEEDINGS OF THE 2020 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2020: MANAGEMENT IN THE AGE OF SOFTWARIZATION AND ARTIFICIAL INTELLIGENCE, 2020,