Traffic-Based Side-Channel Attack in Video Streaming

被引:19
|
作者
Gu, Jiaxi [1 ]
Wang, Jiliang [2 ]
Yu, Zhiwen [1 ]
Shen, Kele [3 ]
机构
[1] Northwestern Polytech Univ, Sch Comp Sci, Xian 710129, Shaanxi, Peoples R China
[2] Tsinghua Univ, Sch Software, Beijing 100084, Peoples R China
[3] Alibaba Grp, Hangzhou 311121, Zhejiang, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Video streaming; network traffic; privacy; side-channel attack; PRIVACY;
D O I
10.1109/TNET.2019.2906568
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Video streaming takes up an increasing proportion of network traffic nowadays. Dynamic adaptive streaming over HTTP (DASH) becomes the de facto standard of video streaming and it is adopted by Youtube, Netflix, and so on. Despite of the popularity, network traffic during video streaming shows an identifiable pattern which brings threat to user privacy. In this paper, we propose a video identification method using network traffic while streaming. Though there is bitrate adaptation in DASH streaming, we observe that the video bitrate trend remains relatively stable because of the widely used variable bit-rate (VBR) encoding. Accordingly, we design a robust video feature extraction method for eavesdropped video streaming traffic. Meanwhile, we design a VBR-based video fingerprinting method for candidate video set which can be built using downloaded video files. Finally, we propose an efficient partial matching method for computing similarities between video fingerprints and streaming traces to derive video identities. We evaluate our attack method in different scenarios for various video content, segment lengths, and quality levels. The experimental results show that the identification accuracy can reach up to 90% using only three-minute continuous network traffic eavesdropping.
引用
收藏
页码:972 / 985
页数:14
相关论文
共 50 条
  • [1] Walls Have Ears: Traffic-based Side-channel Attack in Video Streaming
    Gu, Jiaxi
    Wang, Jiliang
    Yu, Zhiwen
    Shen, Kele
    [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 1538 - 1546
  • [2] Real-Time Platform Identification of VPN Video Streaming Based on Side-Channel Attack
    Lu, Anting
    Wu, Hua
    Luo, Hao
    Cheng, Guang
    Hu, Xiaoyan
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP SEC 2023, 2024, 679 : 335 - 349
  • [3] Side-channel attack pitfalls
    Tiri, Kris
    [J]. 2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, : 15 - 20
  • [4] Analysis of Side-Channel Attack Based on Information Theory
    Mizuno, Hiroaki
    Iwai, Keisuke
    Tanaka, Hidema
    Kurokawa, Takakazu
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (07) : 1523 - 1532
  • [5] SIDE-CHANNEL ATTACK ON THE HUMANAUTH CAPTCHA
    Javier Hernandez-Castro, Carlos
    Ribagorda, Arturo
    Saez, Yago
    [J]. SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 59 - 65
  • [6] Side-channel attack on substitution blocks
    Novak, R
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 307 - 318
  • [7] USB side-channel attack on Tor
    Yang, Qing
    Gasti, Paolo
    Balagani, Kiran
    Li, Yantao
    Zhou, Gang
    [J]. COMPUTER NETWORKS, 2018, 141 : 57 - 66
  • [8] Side-channel attack on biometric cryptosystem based on keystroke dynamics
    Zhang Tao
    Fan Ming-Yu
    Fu Bo
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 221 - 223
  • [9] Side-Channel Attack on STTRAM based Cache for Cryptographic Application
    Khan, Mohammad Nasim Imtiaz
    Bhasin, Shivam
    Yuan, Alex
    Chattopadhyay, Anupam
    Ghosh, Swaroop
    [J]. 2017 IEEE 35TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2017, : 33 - 40
  • [10] A Study on Information Security Attack based Side-Channel Attacks
    Kang, Young-Jin
    Bruce, Ndibanje
    Park, SuHyun
    Lee, HoonJae
    [J]. 2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 61 - 65