IEEE INFOCOM 2018 - IEEE Conference on Computer Communications 2018
DOI: 10.1109/infocom.2018.8486211
|View full text |Cite
|
Sign up to set email alerts
|

Walls Have Ears: Traffic-based Side-channel Attack in Video Streaming

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
22
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 38 publications
(24 citation statements)
references
References 24 publications
0
22
1
Order By: Relevance
“…In particular [18] focused on identifying video streaming using a Variable Bit Rate algorithm within encrypted WiFi traffic using similarity metrics and statistical machine learning. In a similar manner, but with the addition of DASH streaming, [19] identified video streaming within WiFi traffic. In their latest work [19], the authors adopted an approach similar to [18] by modelling various video streaming traffic.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In particular [18] focused on identifying video streaming using a Variable Bit Rate algorithm within encrypted WiFi traffic using similarity metrics and statistical machine learning. In a similar manner, but with the addition of DASH streaming, [19] identified video streaming within WiFi traffic. In their latest work [19], the authors adopted an approach similar to [18] by modelling various video streaming traffic.…”
Section: Related Workmentioning
confidence: 99%
“…Recent research has successfully identified video streaming content in encrypted traffic without using deep learning techniques [18], [19]. In particular [18] focused on identifying video streaming using a Variable Bit Rate algorithm within encrypted WiFi traffic using similarity metrics and statistical machine learning.…”
Section: Related Workmentioning
confidence: 99%
“…A number of studies [9]- [13] have been conducted to identify video titles watched by clients and they use mainly machine learning methods to distinguish video traffic features that change over time. In another study, a technique called dynamic time warping was used to measure the similarity between video fingerprints or signatures calculated using video packet length [17]. However, these studies are inadequate in real-world applications because they assume that the network condition is stable such that the same traffic pattern is always reproduced for the streaming of one video.…”
Section: Introductionmentioning
confidence: 99%
“…Several prior works [5,7,12,15] have examined the fingerprintability of video streams under typical browsing conditions (HTTPS).…”
Section: Introductionmentioning
confidence: 99%