Encrypted Video Recognition in Large-scale Fingerprint Database

被引:0
|
作者
Wu H. [1 ,2 ,3 ]
Yu Z.-H. [1 ]
Cheng G. [1 ,2 ,3 ]
Hu X.-Y. [1 ,2 ,3 ]
机构
[1] School of Cyber Science and Engineering, Southeast University, Nanjing
[2] Key Laboratory of Computer Network and Information Integration of Ministry of Education, Southeast University, Nanjing
[3] Key Laboratory of Computer Network Technology of Jiangsu Province, Southeast University, Nanjing
来源
Ruan Jian Xue Bao/Journal of Software | 2021年 / 32卷 / 10期
基金
中国国家自然科学基金;
关键词
Application data unit (ADU); Encrypted video identification; Large-scale video fingerprint database; Transmission fingerprint; Transport layer security protocol;
D O I
10.13328/j.cnki.jos.006025
中图分类号
学科分类号
摘要
Encrypted video identification is an urgent problem in the field of network security and network management. The existing methods are to match the video transmission fingerprint of encrypted video with the video fingerprint in the video fingerprint database. The existing research mainly focuses on the study of matching recognition algorithm, but there is neither particular research on matching data sources nor the analysis of precision and false positive rate in large-scale video fingerprint library. The resulting practicality of existing methods cannot be guaranteed. In order to address this problem, this study firstly analyses the reason why the length of the cipher text of the application data unit (ADU) encrypted by TLS drifts relative to the length of the plaintext. For the first time, HTTP head feature and TLS fragment features are used as fitting features for ADU length restoration, and then this study proposes an accurate fingerprint restoration method HHTF for the encrypted ADU, and applies HHTF to the encrypted video recognition. A large fingerprint database of 200 000 videos was built based on the simulation of real Facebook videos. Theoretical derivation and calculation demonstrate that the accuracy, precision, and recall rate can reach 100%, and the false positive rate is 0 requiring only one-tenth the numbers of ADUs of the existing method. The experimental results in simulating large-scale video fingerprint database are consistent with the theoretical calculations. The application of the HHTF method makes it possible to recognize encrypted transmitted video in large-scale video fingerprint library scenarios, which is of great practicality and application value. © Copyright 2021, Institute of Software, the Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:3310 / 3330
页数:20
相关论文
共 29 条
  • [11] Orsolic I, Skorin-Kapov L, Suznjevic M., Towards a framework for classifying YouTube QoE based on monitoring of encrypted traffic, Proc. of the Int'l Young Researcher Summit on Quality of Experience in Emerging Multimedia Services (QEEMS 2017), (2019)
  • [12] Orsolic I, Pevec D, Suznjevic M, Skorin-Kapov L., A machine learning approach to classifying YouTube QoE based on encrypted network traffic, Multimedia Tools and Applications, 76, 21, pp. 22267-22301, (2017)
  • [13] Dimopoulos G, Leontiadis I, Barlet-Ros P, Papagiannaki K., Measuring video QoE from encrypted traffic, Proc. of the 2016 Internet Measurement Conf, pp. 513-526, (2016)
  • [14] Pan W, Cheng G, Wu H, Tang Y., Towards QoE assessment of encrypted YouTube adaptive video streaming in mobile networks, Proc. of the 24th IEEE/ACM Int'l Symp. on Quality of Service (IWQoS), pp. 1-6, (2016)
  • [15] (2019)
  • [16] Gu XD, Yang M, Luo JZ, Jiang P., Website fingerprinting attack based on hyperlink relations, Chinese Journal of Computers, 38, 4, pp. 833-845, (2015)
  • [17] Panchenko A, Niessen L, Zinnen A, Engel T., Website fingerprinting in onion routing based anonymization networks, Proc. of the 10th Annual ACM Workshop on Privacy in the Electronic Society, pp. 103-114, (2011)
  • [18] Cai X, Zhang XC, Joshi B, Johnson R., Touching from a distance: Website fingerprinting attacks and defenses, Proc. of the 2012 ACM Conf. on Computer and Communications Security, pp. 605-616, (2012)
  • [19] Terrell J, Jeffay K, Smith FD, Gogan J, Keller J., Passive, streaming inference of TCP connection structure for network server management, Proc. of the Int'l Workshop on Traffic Monitoring and Analysis, pp. 42-53, (2009)
  • [20] Reed A, Kranch M., Identifying https-protected netflix videos in real-time, Proc. of the 7th ACM on Conf. on Data and Application Security and Privacy, pp. 361-368, (2017)