Encrypted video traffic clustering demystified

被引:10
|
作者
Dvir, Amit [1 ]
Marnerides, Angelos K. [2 ]
Dubin, Ran [1 ]
Golan, Nehor [1 ]
Hajaj, Chen [3 ,4 ]
机构
[1] Ariel Univ, Cyber Innovat Ctr, Dept Comp Sci, Ariel, Israel
[2] Univ Lancaster, Sch Comp & Commun, InfoLab21, Lancaster, England
[3] Ariel Univ, Data Sci & Artificial Intelligence Res Ctr, Ariel, Israel
[4] Ariel Univ, Dept Ind Engn & Management, Ariel, Israel
基金
欧盟地平线“2020”;
关键词
Encrypted traffic; Video title; Clustering; Youtube; NLP;
D O I
10.1016/j.cose.2020.101917
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber threat intelligence officers and forensics investigators often require the behavioural profiling of groups based on their online video viewing activity. It has been demonstrated that encrypted video traffic can be classified under the assumption of using a known subset of video titles based on temporal video viewing trends of particular groups. Nonetheless, composing such a subset is extremely challenging in real situations. Therefore, this work exhibits a novel profiling scheme for encrypted video traffic with no a priori assumption of a known subset of titles. It introduces a seminal synergy of Natural Language Processing (NLP) and Deep Encoder-based feature embedding algorithms with refined clustering schemes from off-the-shelf solutions, in order to group viewing profiles with unknown video streams. This study is the first to highlight the most computationally effective, accurate combinations of feature embedding and clustering using real datasets, thereby, paving the way to future forensics tools for automated behavioural profiling of malicious actors. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] Key Independent Encrypted Face Clustering
    Karthik, Kannan
    Balaraman, Harshit
    2017 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS (ICIIS), 2017, : 379 - 384
  • [42] Protocol identification of encrypted network traffic
    Gebski, Matthew
    Penev, Alex
    Wong, Raymond K.
    2006 IEEE/WIC/ACM International Conference on Web Intelligence, (WI 2006 Main Conference Proceedings), 2006, : 957 - 960
  • [43] Is Encrypted ClientHello a Challenge for Traffic Classification?
    Shamsimukhametov, Danil
    Kurapov, Anton
    Liubogoshchev, Mikhail
    Khorov, Evgeny
    IEEE ACCESS, 2022, 10 : 77883 - 77897
  • [44] The seven myths of encrypted traffic scanning
    Lueck M.
    Network Security, 2021, 2021 (07) : 9 - 12
  • [45] Detecting Ransomware in Encrypted Web Traffic
    Modi, Jaimin
    Traore, Issa
    Ghaleb, Asem
    Ganame, Karim
    Ahmed, Sherif
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2019, 2020, 12056 : 345 - 353
  • [46] Network Intrusion Detection in Encrypted Traffic
    Papadogiannaki, Eva
    Tsirantonakis, Giorgos
    Ioannidis, Sotiris
    2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,
  • [47] A Survey on Tor Encrypted Traffic Monitoring
    Aminuddin, Mohamad Amar Irsyad Mohd
    Zaaba, Zarul Fitri
    Singh, Manmeet Kaur Mahinderjit
    Singh, Darshan Singh Mahinder
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (08) : 113 - 120
  • [48] Feature analysis of encrypted malicious traffic
    Shekhawat, Anish Singh
    Di Troia, Fabio
    Stamp, Mark
    EXPERT SYSTEMS WITH APPLICATIONS, 2019, 125 : 130 - 141
  • [49] ITP-KNN: Encrypted Video Flow Identification Based on the Intermittent Traffic Pattern of Video and K-Nearest Neighbors Classification
    Liu, Youting
    Li, Shu
    Zhang, Chengwei
    Zheng, Chao
    Sun, Yong
    Liu, Qingyun
    COMPUTATIONAL SCIENCE - ICCS 2020, PT II, 2020, 12138 : 279 - 293
  • [50] Traffic Classification in an Increasingly Encrypted Web
    Akbari, Iman
    Salahuddin, Mohammad A.
    Ven, Leni
    Limam, Noura
    Boutaba, Raouf
    Mathieu, Bertrand
    Moteau, Stephanie
    Tuffin, Stephane
    COMMUNICATIONS OF THE ACM, 2022, 65 (10) : 75 - 83