Traffic spills the beans: A robust video identification attack against YouTube

COMPUTERS & SECURITY(2024)

引用 0|浏览10
暂无评分
摘要
Traffic-based video identification attack is a side-channel attack that allows an attacker to identify transmitted online videos from encrypted network traffic. Existing attacks face two types of challenges: 1) YouTube's improved streaming technology renders them invalid or impacted; 2) real-world diverse traffic makes them underperform. In this paper, we provide the first study of YouTube's technical improvements and reveal its three key features: i) the mechanism that replaces the MPD file, ii) variable combined segments, and iii) various buffering processes. Based on the above analysis, we propose a Robust and easily scalable Video Identification Attack against YouTube called RoVIA. RoVIA extracts video fingerprints from video file headers and reference sequences from video traffic. RoVIA uses the reference sequence to generate candidate sequences in the pre-built video fingerprint library and achieves video identification by measuring sequence similarity. Experimental results show that RoVIA achieves open-world accuracy of 0.967, 0.924, and 0.863 in open-world, fixed-quality, and poor network experiments. Furthermore, RoVIA's scalability allows the target classes to be adjusted by updating the fingerprint library without collecting new samples and retraining parameters. This study aims to demonstrate the vulnerabilities of YouTube streaming technology and the potential consequences of its malicious use. We also propose two YouTube-friendly countermeasures to help developers build effective defenses.
更多
查看译文
关键词
Video identification attack,Video streaming traffic,Privacy protection,DASH analysis,YouTube
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要