Markov Probability Fingerprints: A Method for Identifying Encrypted Video Traffic

作者: Yuchuan Luo , Luming Yang , Jiangyong Shi , Shaojing Fu

DOI: 10.1109/MSN50589.2020.00055

关键词:

摘要: Detecting illegal video plays an important role in preventing and countering crime in daily life. It is effective for supervisors to monitor the network by analyzing traffic from devices. In …

参考文章(23)
Alan Welsh, David G. Steel, Suojin Wang, Raymond L. Chambers, Maximum Likelihood Estimation for Sample Surveys ,(2012)
Yali Liu, Ahmad-Reza Sadeghi, Dipak Ghosal, Biswanath Mukherjee, Video streaming forensic - content identification with traffic snooping international conference on information security. pp. 129- 135 ,(2010) , 10.1007/978-3-642-18178-8_11
Maciej Korczynski, Andrzej Duda, Markov chain fingerprinting to classify encrypted traffic international conference on computer communications. pp. 781- 789 ,(2014) , 10.1109/INFOCOM.2014.6848005
Tomasz Bujlow, Valentín Carela-Español, Pere Barlet-Ros, Independent comparison of popular DPI tools for traffic classification Computer Networks. ,vol. 76, pp. 75- 89 ,(2015) , 10.1016/J.COMNET.2014.11.001
Yali Liu, Canhui Ou, Zhi Li, Cherita Corbett, Biswanath Mukherjee, Dipak Ghosal, Wavelet-Based Traffic Analysis for Identifying Video Streams over Broadband Networks global communications conference. pp. 1- 6 ,(2008) , 10.1109/GLOCOM.2008.ECP.338
Pablo Ameigeiras, Juan J. Ramos-Munoz, Jorge Navarro-Ortiz, J.M. Lopez-Soler, Analysis and modelling of YouTube traffic transactions on emerging telecommunications technologies. ,vol. 23, pp. 360- 377 ,(2012) , 10.1002/ETT.2546
Ofer Hadar, Ran Dubin, Amit Dvir, Itay Richman, Ofir Trabelsi, Ofir Pele, Real Time Video Quality Representation Classification of Encrypted HTTP Adaptive Video Streaming - the Case of Safari arXiv: Multimedia. ,(2016)
Eric Rescorla, The Transport Layer Security (TLS) Protocol Version 1.2 RFC 5246 (Proposed Standard). ,vol. 5246, pp. 1- 104 ,(2008)
Yanjie Fu, Hui Xiong, Xinjiang Lu, Jin Yang, Can Chen, Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps IEEE Transactions on Mobile Computing. ,vol. 15, pp. 2851- 2864 ,(2016) , 10.1109/TMC.2016.2516020
Blake Anderson, David McGrew, Identifying Encrypted Malware Traffic with Contextual Flow Data Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security. pp. 35- 46 ,(2016) , 10.1145/2996758.2996768