Beauty and the Burst

Size: px
Start display at page:

Download "Beauty and the Burst"

Transcription

1 Beauty and the Burst Remote Identification of Encrypted Video Streams Roei Schuster Cornell Tech, Tel Aviv University Vitaly Shmatikov Cornell Tech Eran Tromer Columbia University, Tel Aviv University

2 Video traffic is interesting

3 Video traffic is encrypted

4 Video traffic is encrypted What can still be learned?

5 Traffic analysis for video identification streaming service victim

6 Traffic analysis for video identification streaming service victim

7 Traffic analysis for video identification streaming service Metadata! packet times, sizes, victim

8 Traffic analysis for video identification streaming service Metadata! packet times, sizes, Victim is watching Beauty and the Beast! victim

9 packet size (bytes) Initial buffering, then on / off bursts time (seconds)

10 packet size (bytes) Initial buffering, then on / off bursts time (seconds)

11 packet size (bytes) Initial buffering, then on / off bursts time (seconds) [RLLTBD 11], [ARNL 12], [MFWS 13],

12 packet size (bytes) Initial buffering, then on / off bursts time (seconds) [RLLTBD 11], [ARNL 12], [MFWS 13], Where do bursts come from?

13 Video representation on server streaming service

14 Video representation on server streaming service

15 Video representation on server Pulp Fiction Die Hard Armageddon streaming service 12 Monkeys The Fifth Element Die Hard II

16 Video representation on server MPEG-DASH standard: widely adopted by Netflix, YouTube, others Die Hard Armageddon Pulp Fiction 12 Monkeys The Fifth Element Die Hard II

17 Video representation on server MPEG-DASH standard: widely adopted by Netflix, YouTube, others Die Hard video stored in segment-files segment1.m4s segment2.m4s segment3.m4s segment4.m4s Armageddon Pulp Fiction 12 Monkeys Die Hard II The Fifth Element

18 Video representation on server MPEG-DASH standard: widely adopted by Netflix, YouTube, others Die Hard segment = a few seconds of playback 0-5sec 5-10sec 10-15sec 15-20sec video stored in segment-files segment1.m4s segment2.m4s segment3.m4s segment4.m4s Armageddon Pulp Fiction 12 Monkeys Die Hard II The Fifth Element

19 DASH client-server interaction (simplified) client server server buffer below threshold? no yes request next segment segment1.m4s segment2.m4s segment3.m4s segment4.m4s segment5.m4s segment6.m4s

20 DASH client-server interaction (simplified) client buffer below threshold? no yes request next segment segment fetched every few seconds server server segment1.m4s segment2.m4s segment3.m4s segment4.m4s segment5.m4s segment6.m4s

21 DASH client-server interaction (simplified) client buffer below threshold? no yes request next segment segment fetched every few seconds fetching causes a traffic burst server server segment1.m4s segment2.m4s segment3.m4s segment4.m4s segment5.m4s segment6.m4s

22 Bitrate (bytes) Variable bit rate encoding Time (seconds) Different video seconds require different amount of bytes to encode Iguana vs. Snakes VBR

23 Phases of Iguana vs Snakes in Bitrate Bitrate (bits per second) scenery, movement, tension rising Time (seconds)

24 Phases of Iguana vs Snakes in Bitrate Bitrate (bits per second) tension peaking, iguana is still Time (seconds)

25 Phases of Iguana vs Snakes in Bitrate Bitrate (bits per second) chase Time (seconds)

26 Phases of Iguana vs Snakes in Bitrate Bitrate (bits per second) chase iguana almost captured Time (seconds)

27 Phases of Iguana vs Snakes in Bitrate Bitrate (bits per second) iguana safe, resting

28 Bitrate (bytes) Variable bit rate encoding Time (seconds) Different video seconds require different amount of bytes to encode Iguana vs. Snakes VBR

29 Variable bit rate variable segment size Die Hard 0-5sec 5-10sec 10-15sec 15-20sec 20-25sec Segment1.m4s Segment2.m4s Segment3.m4s Segment4.m4s Segment5.m4s Pulp Fiction Armageddon 12 Monkeys Die Hard II The Fifth Element

30 burst size (bytes) Variable segment size variable burst size Time (seconds) buffering On/off bursts

31 burst size (bytes) Variable segment size variable burst size Time (seconds) buffering On/off bursts

32 MPEG-DASH leak content VBR pattern segments burst sizes stream time

33 From a leak to a fingerprint burst sizes Does the pattern of burst (segment) sizes uniquely characterize a title? Can we learn a title s identifying pattern? stream time

34 From a leak to a fingerprint burst sizes Does the pattern of burst (segment) sizes uniquely characterize a title? Diversity: empirically measure pairwise distances for 3500 downloaded and segmented YouTube titles Can we learn a title s identifying pattern? stream time

35 From a leak to a fingerprint burst sizes Does the pattern of burst (segment) sizes uniquely characterize a title? Diversity: empirically measure pairwise distances for 3500 downloaded and segmented YouTube titles Can we learn a title s identifying pattern? Consistency: empirically evaluate attacker s measurement error bound stream time

36 From a leak to a fingerprint burst sizes Does the pattern of burst (segment) sizes uniquely characterize a title? Diversity: empirically measure pairwise distances for 3500 downloaded and segmented YouTube titles Can we learn a title s identifying pattern? Consistency: empirically evaluate attacker s measurement error bound stream time ~20% of YouTube titles have fingerprints

37 Attack overview attacker network Die Hard Pulp Fiction Armageddon 12 Monkeys victim network

38 Attack overview attacker network Die Hard Pulp Fiction Armageddon 12 Monkeys victim network

39 Attack overview attacker network Die Hard Pulp Fiction Armageddon 12 Monkeys metadata victim network

40 Attack overview attacker network Die Hard Pulp Fiction Armageddon 12 Monkeys metadata training victim network detectors

41 Attack overview attacker network Die Hard Pulp Fiction Armageddon 12 Monkeys metadata training victim network detectors

42 Attack overview attacker network Die Hard Pulp Fiction Armageddon 12 Monkeys metadata training victim network detectors

43 Attack overview attacker network Die Hard Pulp Fiction Armageddon 12 Monkeys metadata training detectors Victim is watching Armageddon! victim network

44 Attack details attacker network Die Hard Pulp Fiction Armageddon 12 Monkeys metadata training vantage point? victim network detectors

45 Scenario I: on-path attack bursts on-path vantage point Wi-Fi access points, proxies, routers, enterprise or national network censors, ISPs

46 Attack details attacker network Die Hard Pulp Fiction Armageddon 12 Monkeys metadata training machine learning victim network detectors

47 Deep neural networks Very good at learning high-level concepts that are hard to express formally (e.g., traffic traces are similar ) Existing NN architectures very accurate on classification and detection problems

48 Advantages of neural networks Robust: can operate on noisy and coarse measurements Agnostic to protocol-specific attributes (e.g., QUIC vs. TLS) Can learn features other than burst patterns, e.g., arrival patterns of individual packets Can use multiple session representations, train on all at once

49 packet size Features Each feature is a time-series, sampled at 0.25-second intervals (example: bytes per second) time (seconds) Features considered: downstream/upstream/total values of bytes per second, packet per second, average packet length, and burst sizes

50 Attack attacker network Die Hard Pulp Fiction Armageddon 12 Monkeys metadata training neural net On-path attacker victim network detectors

51 Datasets and identification experiments 100 titles minute sessions 18 titles minute sessions sessions of different other titles 10 titles minute sessions 10 titles minute sessions

52 Datasets and identification experiments 100 titles minute sessions 100 classes 18 titles minute sessions sessions of different other titles 10 titles minute sessions 10 titles minute sessions

53 Datasets and identification experiments 100 titles minute sessions 100 classes 18 titles minute sessions sessions of different other titles open-world identification 18+1=19 classes 10 titles minute sessions 10 titles minute sessions

54 Datasets and identification experiments 100 titles minute sessions 100 classes 18 titles minute sessions sessions of different other titles open-world identification 18+1=19 classes 10 titles minute sessions 10 classes 10 titles minute sessions 10 classes

55 Datasets and identification experiments 100 titles minute sessions 100 classes 98.5% accuracy 18 titles minute sessions sessions of different other titles open-world identification 18+1=19 classes 99.5% accuracy 10 titles minute sessions 10 classes 92.5% accuracy 10 titles minute sessions 10 classes 98.6% accuracy

56 Empirical results: confusion matrices YouTube (feature: total burst size) Netflix (feature: total burst size) Predicted label unknown class, 3500 samples Predicted label

57 Empirical results: confusion matrices YouTube (feature: total burst size) Netflix (feature: total burst size) Predicted label Exactly 2 false positives unknown class, 3500 samples Predicted label No recurrent confusions (despite many same-series titles)

58 Tuning for precision YouTube (feature: total burst size) Netflix (feature: total burst size) 0 false positives with recall false positive rate with 0.93 recall

59 Attack details attacker network Die Hard Pulp Fiction Armageddon 12 Monkeys metadata training neural net vantage point? victim network detectors

60 Off-path attackers victim network bursts Wi-Fi access points, proxies, routers, enterprise or national network censors, ISPs on-path vantage point

61 Off-path attackers victim network bursts

62 Off-path attackers victim network bursts A visited webpage? A smartphone app?

63 Off-path attackers victim network bursts Example: A visited webpage? checking Facebook feed while streaming A smartphone Armageddon app?

64 Off-path attackers victim network bursts Example: A visited webpage? checking Facebook feed while streaming A smartphone Armageddon app?

65 Off-path attackers victim network bursts Example: A visited webpage? checking Facebook feed while streaming A smartphone Armageddon app?

66 Off-path attackers victim network bursts Example: A visited webpage? checking Facebook feed while streaming A smartphone Armageddon app? Web ad

67 Off-path attackers victim network bursts Example: A visited webpage? checking Facebook feed while streaming A smartphone Armageddon app? Web ad

68 Off-path attackers victim network bursts Three-fold confinement: different device, browser process, sandboxed iframe Example: A visited webpage? checking Facebook feed while streaming A smartphone Armageddon app? Web ad

69 Cross-device attack viewer Browser neighbor

70 Cross-device attack viewer Browser attacker Web site JavaScript attacker client neighbor

71 Cross-device attack viewer attacker Web site messages Browser JavaScript attacker client neighbor

72 Cross-device attack viewer Congestion attacker Web site messages Browser JavaScript attacker client neighbor

73 Cross-device attack viewer bursts Congestion attacker Web site messages Browser JavaScript attacker client neighbor

74 Cross-device attack viewer bursts Congestion Browser delays attacker Web site messages JavaScript attacker client neighbor

75 Cross-device attack viewer bursts Congestion Browser delays attacker Web site messages JavaScript attacker client Noisy, coarse estimate of actual traffic bursts neighbor

76 Delay-bursts delay (milliseconds) Message delays traffic burst sizes (scaled down) time (seconds)

77 delay (milliseconds) Delay-bursts Message delays traffic burst sizes (scaled down) For each traffic burst, compute aggregate delay induced. Use resulting time-series as input to neural network time (seconds)

78 Delay-bursts vs. traffic bursts delay-bursts time series: the delays induced by traffic bursts

79 1/10 cross-device attack: precision vs. recall Accuracy: false positive rate: 0.003, recall 0.933

80 Cross-device attack viewer Browser attacker Web site JavaScript detector code neighbor

81 Cross-site attack victim PC browser window Streaming client attacker Web site browser window JavaScript detector code

82 Mitigating the DASH leak Modern streaming traffic characteristics Title bitrate pattern unique when sampled at few-seconds granularity Fetching at segment granularity (= every few seconds) Buffer below threshold? no yes fetch next segment Maximizes quality of experience, server load, and network bandwidth utilization However, information leakage is intrinsic

83 Thank you! Further information and the paper:

Adaptive Video Acceleration. White Paper. 1 P a g e

Adaptive Video Acceleration. White Paper. 1 P a g e Adaptive Video Acceleration White Paper 1 P a g e Version 1.0 Veronique Phan Dir. Technical Sales July 16 th 2014 2 P a g e 1. Preface Giraffic is the enabler of Next Generation Internet TV broadcast technology

More information

Dynamic Adaptive Streaming over HTTP (DASH) Application Protocol : Modeling and Analysis

Dynamic Adaptive Streaming over HTTP (DASH) Application Protocol : Modeling and Analysis Dynamic Adaptive Streaming over HTTP (DASH) Application Protocol : Modeling and Analysis Dr. Jim Martin Associate Professor School of Computing Clemson University jim.martin@cs.clemson.edu http://www.cs.clemson.edu/~jmarty

More information

Network Traffic Characteristics of Data Centers in the Wild. Proceedings of the 10th annual conference on Internet measurement, ACM

Network Traffic Characteristics of Data Centers in the Wild. Proceedings of the 10th annual conference on Internet measurement, ACM Network Traffic Characteristics of Data Centers in the Wild Proceedings of the 10th annual conference on Internet measurement, ACM Outline Introduction Traffic Data Collection Applications in Data Centers

More information

Achieving Low-Latency Streaming At Scale

Achieving Low-Latency Streaming At Scale Achieving Low-Latency Streaming At Scale Founded in 2005, Wowza offers a complete portfolio to power today s video streaming ecosystem from encoding to delivery. Wowza provides both software and managed

More information

Challenges in building learning models when traff is enfrypted

Challenges in building learning models when traff is enfrypted Image source: goo.gl/utysek Challenges in building learning models when traff is enfrypted Vijay K. Gurbani, Ph.D. Network Data Science vijay.gurbani@nokia.com March 16, 2018 London We are never defnitely

More information

SamKnows test methodology

SamKnows test methodology SamKnows test methodology Download and Upload (TCP) Measures the download and upload speed of the broadband connection in bits per second. The transfer is conducted over one or more concurrent HTTP connections

More information

Proxy-based TCP-friendly streaming over mobile networks

Proxy-based TCP-friendly streaming over mobile networks Proxy-based TCP-friendly streaming over mobile networks Frank Hartung Uwe Horn Markus Kampmann Presented by Rob Elkind Proxy-based TCP over mobile nets 1 Outline Introduction TCP Friendly Rate Control

More information

Characterizing Netflix Bandwidth Consumption

Characterizing Netflix Bandwidth Consumption Characterizing Netflix Bandwidth Consumption Dr. Jim Martin Associate Professor School of Computing Clemson University jim.martin@cs.clemson.edu http://www.cs.clemson.edu/~jmarty Terry Shaw Director, Network

More information

Page 1. Outline / Computer Networking : 1 st Generation Commercial PC/Packet Video Technologies

Page 1. Outline / Computer Networking : 1 st Generation Commercial PC/Packet Video Technologies Outline 15-441/15-641 Computer Networking Lecture 18 Internet Video Delivery Peter Steenkiste Slides by Professor Hui Zhang Background Technologies: - HTTP download - Real-time streaming - HTTP streaming

More information

Lecture 12. Application Layer. Application Layer 1

Lecture 12. Application Layer. Application Layer 1 Lecture 12 Application Layer Application Layer 1 Agenda The Application Layer (continue) Web and HTTP HTTP Cookies Web Caches Simple Introduction to Network Security Various actions by network attackers

More information

Measuring KSA Broadband

Measuring KSA Broadband Measuring KSA Broadband Meqyas, Q2 218 Report In 217, the CITC in partnership with SamKnows launched a project to measure internet performance. The project, named Meqyas, gives internet users in Saudi

More information

Automated Website Fingerprinting through Deep Learning

Automated Website Fingerprinting through Deep Learning Automated Website Fingerprinting through Deep Learning Vera Rimmer 1, Davy Preuveneers 1, Marc Juarez 2, Tom Van Goethem 1 and Wouter Joosen 1 NDSS 2018 Feb 19th (San Diego, USA) 1 2 Website Fingerprinting

More information

CONTENTS. System Requirements FAQ Webcast Functionality Webcast Functionality FAQ Appendix Page 2

CONTENTS. System Requirements FAQ Webcast Functionality Webcast Functionality FAQ Appendix Page 2 VIOCAST FAQ CONTENTS System Requirements FAQ... 3 Webcast Functionality... 6 Webcast Functionality FAQ... 7 Appendix... 8 Page 2 SYSTEM REQUIREMENTS FAQ 1) What kind of Internet connection do I need to

More information

Basic Concepts in Intrusion Detection

Basic Concepts in Intrusion Detection Technology Technical Information Services Security Engineering Roma, L Università Roma Tor Vergata, 23 Aprile 2007 Basic Concepts in Intrusion Detection JOVAN GOLIĆ Outline 2 Introduction Classification

More information

Confused, Timid, and Unstable: Picking a Video Streaming Rate is Hard

Confused, Timid, and Unstable: Picking a Video Streaming Rate is Hard Confused, Timid, and Unstable: Picking a Video Streaming Rate is Hard Araz Jangiaghdam Seminar Networks and Distributed Systems School of Engineering and Sciences Jacobs University Bremen Campus Ring 1,

More information

Internet Video Delivery. Professor Hui Zhang

Internet Video Delivery. Professor Hui Zhang 18-345 Internet Video Delivery Professor Hui Zhang 1 1990 2004: 1 st Generation Commercial PC/Packet Video Technologies Simple video playback, no support for rich app Not well integrated with Web browser

More information

Configure Video and Audio Settings

Configure Video and Audio Settings 14 CHAPTER Revised: November 24, 2010 Concepts, page 14-1 s, page 14-3 Reference, page 14-6 Concepts Performance Factors, page 14-1 Guidelines, page 14-2 Workflows, page 14-3 Performance Factors Understand

More information

DRAFT. Measuring KSA Broadband. Meqyas, Q Report

DRAFT. Measuring KSA Broadband. Meqyas, Q Report DRAFT Measuring KSA Broadband Meqyas, Q3 218 Report In 217, the CITC in partnership with SamKnows launched a project to measure internet performance. The project, named Meqyas, gives internet users in

More information

Adaptive Bit Rate (ABR) Video Detection and Control

Adaptive Bit Rate (ABR) Video Detection and Control OVERVIEW Adaptive Bit Rate (ABR) Video Detection and Control In recent years, Internet traffic has changed dramatically and this has impacted service providers and their ability to manage network traffic.

More information

irtc: Live Broadcasting

irtc: Live Broadcasting 1 irtc: Live Broadcasting Delivering ultra-low-latency media at massive scale with LiveSwitch and WebRTC Introduction In the early days of the Internet and personal computing, it wasn t uncommon to wait

More information

Real-Time Protocol (RTP)

Real-Time Protocol (RTP) Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of

More information

It s Not the Cost, It s the Quality! Ion Stoica Conviva Networks and UC Berkeley

It s Not the Cost, It s the Quality! Ion Stoica Conviva Networks and UC Berkeley It s Not the Cost, It s the Quality! Ion Stoica Conviva Networks and UC Berkeley 1 A Brief History! Fall, 2006: Started Conviva with Hui Zhang (CMU)! Initial goal: use p2p technologies to reduce distribution

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

Video Quality Management Guidebook

Video Quality Management Guidebook Video Quality Management Guidebook Strategies for traffic optimization CASE STUDY GUIDE BOOK Video trends Both mobile and fixed data networks are experiencing a rise in video traffic which already represents

More information

IVMS 4500 User Guide

IVMS 4500 User Guide http://www.vadtel.co.uk/ Table of Contents - Installing IVMS 4500 - Getting To Know The Software - Adding Devices - Camera Views - Playback Footage Installing IVMS 4500 1. Log onto the Google Play or App

More information

Week 7: Traffic Models and QoS

Week 7: Traffic Models and QoS Week 7: Traffic Models and QoS Acknowledgement: Some slides are adapted from Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition, J.F Kurose and K.W. Ross All Rights Reserved,

More information

CSCD 433/533 Advanced Networks

CSCD 433/533 Advanced Networks CSCD 433/533 Advanced Networks Lecture 2 Network Review Winter 2017 Reading: Chapter 1 1 Topics Network Topics Some Review from CSCD330 Applications Common Services Architecture OSI Model AS and Routing

More information

Scaling Internet TV Content Delivery ALEX GUTARIN DIRECTOR OF ENGINEERING, NETFLIX

Scaling Internet TV Content Delivery ALEX GUTARIN DIRECTOR OF ENGINEERING, NETFLIX Scaling Internet TV Content Delivery ALEX GUTARIN DIRECTOR OF ENGINEERING, NETFLIX Inventing Internet TV Available in more than 190 countries 104+ million subscribers Lots of Streaming == Lots of Traffic

More information

The Frozen Mountain irtc White Paper Series

The Frozen Mountain irtc White Paper Series The Frozen Mountain irtc White Paper Series This white paper is the fourth in a series on Internet Based Real Time Communications (irtc) written by Frozen Mountain Software s CTO Anton Venema. The complete

More information

Correlating Network Congestion with Video QoE Degradation - a Last-Mile Perspective

Correlating Network Congestion with Video QoE Degradation - a Last-Mile Perspective Correlating Congestion with Video QoE Degradation - a Last-Mile Perspective Francesco Bronzino, Paul Schmitt, Renata Teixeira, Nick Feamster, Srikanth Sundaresan AIMS 13 March 2018 Last-Mile Measurement:

More information

From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley?

From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley? Networking 2004 Athens 11 May 2004 From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley? Jim Roberts France Telecom R&D The story of QoS: how to get

More information

SFMap: Inferring Services over Encrypted Web Flows using Dynamical Domain Name Graphs TMA 2015

SFMap: Inferring Services over Encrypted Web Flows using Dynamical Domain Name Graphs TMA 2015 SFMap: Inferring Services over Encrypted Web Flows using Dynamical Domain Name Graphs TMA 2015 Tatsuya Mori 1, Takeru Inoue 2, Akihiro Shimoda 3, Kazumichi Sato 3, Keisuke Ishibashi 3, and Shigeki Goto

More information

Trisul Network Analytics - Traffic Analyzer

Trisul Network Analytics - Traffic Analyzer Trisul Network Analytics - Traffic Analyzer Using this information the Trisul Network Analytics Netfllow for ISP solution provides information to assist the following operation groups: Network Operations

More information

TANGO: Enabling New Services through Cooperation between Cellular Network and Mobile Devices. Motivation

TANGO: Enabling New Services through Cooperation between Cellular Network and Mobile Devices. Motivation TANGO: Enabling New Services through Cooperation between Cellular and Mobile Devices Nawanol Theera-Ampornpunt, Sambit Mishra, Saurabh Bagchi, Kaustubh Joshi (AT&T), Rajesh Panta (AT&T) Motivation Cellular

More information

CS 557 Congestion and Complexity

CS 557 Congestion and Complexity CS 557 Congestion and Complexity Observations on the Dynamics of a Congestion Control Algorithm: The Effects of Two-Way Traffic Zhang, Shenker, and Clark, 1991 Spring 2013 The Story So Far. Transport layer:

More information

P3 Insights Separate T-Mobile Binge On Fact from Fiction

P3 Insights Separate T-Mobile Binge On Fact from Fiction P3 Insights Separate T-Mobile Binge On Fact from Fiction P3 Group s Analysis of Crowdsourced Data Reveals Unlimited Mobile Video Plans Can Result in Win-Win-Win for Carriers, Consumers and Content Providers

More information

NMLRG #4 meeting in Berlin. Mobile network state characterization and prediction. P.Demestichas (1), S. Vassaki (2,3), A.Georgakopoulos (2,3)

NMLRG #4 meeting in Berlin. Mobile network state characterization and prediction. P.Demestichas (1), S. Vassaki (2,3), A.Georgakopoulos (2,3) NMLRG #4 meeting in Berlin Mobile network state characterization and prediction P.Demestichas (1), S. Vassaki (2,3), A.Georgakopoulos (2,3) (1)University of Piraeus (2)WINGS ICT Solutions, www.wings-ict-solutions.eu/

More information

Computer Science 461 Final Exam May 22, :30-3:30pm

Computer Science 461 Final Exam May 22, :30-3:30pm NAME: Login name: Computer Science 461 Final Exam May 22, 2012 1:30-3:30pm This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor Code pledge

More information

Requet: Real-Time QoE Detection for Encrypted YouTube Traffic

Requet: Real-Time QoE Detection for Encrypted YouTube Traffic Craig Gutterman, Katherine Guo, Sarthak Arora, Xiaoyang Wang, Les Wu, Ethan Katz-Bassett, Gil Zussman Electrical Engineering, Columbia University, Nokia Bell Labs ABSTRACT As video traffic dominates the

More information

Anonymity C S A D VA N C E D S E C U R I T Y TO P I C S P R E S E N TAT I O N BY: PA N AY I OTO U M A R KO S 4 T H O F A P R I L

Anonymity C S A D VA N C E D S E C U R I T Y TO P I C S P R E S E N TAT I O N BY: PA N AY I OTO U M A R KO S 4 T H O F A P R I L Anonymity C S 6 8 2 A D VA N C E D S E C U R I T Y TO P I C S P R E S E N TAT I O N BY: PA N AY I OTO U M A R KO S 4 T H O F A P R I L 2 0 1 9 Tor: The Second- Generation Onion Router R. DINGLEDINE N.

More information

Application-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks

Application-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks COMP 431 Internet Services & Protocols Application-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks Jasleen Kaur February 14, 2019 Application-Layer Protocols Outline Example

More information

CE Advanced Network Security Anonymity II

CE Advanced Network Security Anonymity II CE 817 - Advanced Network Security Anonymity II Lecture 19 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained

More information

NDN-RTC. Peter Gusev UCLA REMAP 9/5/2014

NDN-RTC. Peter Gusev UCLA REMAP 9/5/2014 NDN-RTC Peter Gusev UCLA REMAP 9/5/2014 NDNComm 2014 Demo Producer 1: Live NDNComm HD streaming (1080p 30fps, 1.5Mbps) Producer 2: REMAP office webcam producer (SD, 30fps, 500Kbps) Demo 1: Consumer for

More information

QUALITY of SERVICE. Introduction

QUALITY of SERVICE. Introduction QUALITY of SERVICE Introduction There are applications (and customers) that demand stronger performance guarantees from the network than the best that could be done under the circumstances. Multimedia

More information

A Robust Classifier for Passive TCP/IP Fingerprinting

A Robust Classifier for Passive TCP/IP Fingerprinting A Robust Classifier for Passive TCP/IP Fingerprinting Rob Beverly MIT CSAIL rbeverly@csail.mit.edu April 20, 2004 PAM 2004 Typeset by FoilTEX Outline A Robust Classifier for Passive TCP/IP Fingerprinting

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 multimedia applications:

More information

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services Overview 15-441 15-441 Computer Networking 15-641 Lecture 19 Queue Management and Quality of Service Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 What is QoS? Queuing discipline and scheduling

More information

arxiv: v1 [cs.cr] 14 Jan 2019

arxiv: v1 [cs.cr] 14 Jan 2019 Peel the onion: Recognition of Android apps behind the Tor Network arxiv:9.4434v [cs.cr] 4 Jan 29 Emanuele Petagna petagna.79537@studenti.uniroma.it Department of Computer, Control, and Management Engineering,

More information

ECEN Final Exam Fall Instructor: Srinivas Shakkottai

ECEN Final Exam Fall Instructor: Srinivas Shakkottai ECEN 424 - Final Exam Fall 2013 Instructor: Srinivas Shakkottai NAME: Problem maximum points your points Problem 1 10 Problem 2 10 Problem 3 20 Problem 4 20 Problem 5 20 Problem 6 20 total 100 1 2 Midterm

More information

The Internet today. Measuring the Internet: challenges and applications. Politecnico di Torino 7/12/2011. Speaker: Marco Mellia

The Internet today. Measuring the Internet: challenges and applications. Politecnico di Torino 7/12/2011. Speaker: Marco Mellia Measuring the Internet: challenges and applications Telecommunication Group presentation Speaker: Marco Mellia Politecnico di Torino 7/12/2011 The Internet today 2 A very complex scenario many eterogeneous

More information

QOE: A MICRO AND MACRO PERSPECTIVE

QOE: A MICRO AND MACRO PERSPECTIVE QOE: A MICRO AND MACRO PERSPECTIVE Henning Schulzrinne (with Kyung-Hwa Kim, Hyunwoo Nam, Vishal Singh, Daniel Song) Columbia University Micro vs. Macro Time & space local (user, HH) Internet-wide short-term

More information

DASH trial Olympic Games. First live MPEG-DASH large scale demonstration.

DASH trial Olympic Games. First live MPEG-DASH large scale demonstration. DASH trial Olympic Games. First live MPEG-DASH large scale demonstration. During the Olympic Games 2012 the VRT offered their audience to experience their Olympic Games broadcast in MPEG-DASH. The public

More information

Resource Sharing or Designing Access Network For Low Cost.

Resource Sharing or Designing Access Network For Low Cost. Resource Sharing or Designing Access Network For Low Cost www.broadcom.com Traffic Percentile What Drives Demand for Bandwidth? Usage In North America, the median usage is 4 GB per month, while the mean

More information

Network Management & Monitoring

Network Management & Monitoring Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end

More information

Confused, Timid, and Unstable: Picking a Video Streaming Rate is Hard

Confused, Timid, and Unstable: Picking a Video Streaming Rate is Hard Confused, Timid, and Unstable: Picking a Video Streaming Rate is Hard Five students from Stanford Published in 2012 ACM s Internet Measurement Conference (IMC) 23 citations Ahmad Tahir 1/26 o Problem o

More information

Self Programming Networks

Self Programming Networks Self Programming Networks Is it possible for to Learn the control planes of networks and applications? Operators specify what they want, and the system learns how to deliver CAN WE LEARN THE CONTROL PLANE

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks QoS in IP networks Prof. Andrzej Duda duda@imag.fr Contents QoS principles Traffic shaping leaky bucket token bucket Scheduling FIFO Fair queueing RED IntServ DiffServ http://duda.imag.fr

More information

Port-Scanning Resistance in Tor Anonymity Network. Presented By: Shane Pope Dec 04, 2009

Port-Scanning Resistance in Tor Anonymity Network. Presented By: Shane Pope Dec 04, 2009 Port-Scanning Resistance in Tor Anonymity Network Presented By: Shane Pope (Shane.M.Pope@gmail.com) Dec 04, 2009 In partial fulfillment of the requirements for graduation with the Dean's Scholars Honors

More information

Guaranteeing Video Quality

Guaranteeing Video Quality Guaranteeing Video Quality in IP Delivery Systems By Göran Appelquist, Ph.D., Chief Technology Officer, Edgeware AB This article explores some of the challenges and solutions for operators to guarantee

More information

The Diffie-Hellman Key Exchange

The Diffie-Hellman Key Exchange ISC: SECURITY AND QOS The Diffie-Hellman Key Exchange A mechanism to establish secret keys without the need for CAs Based on the difficulty of computing discrete logarithms of large numbers Public (or

More information

Anatomy of a DASH Client. Ali C. Begen, Ph.D.

Anatomy of a DASH Client. Ali C. Begen, Ph.D. Anatomy of a DASH Client Ali C. Begen, Ph.D. http://ali.begen.net Video Delivery over HTTP Enables playback while still downloading Server sends the file as fast as possible Pseudo Streaming Enables seeking

More information

ADAPTIVE STREAMING. Improve Retention for Live Content. Copyright (415)

ADAPTIVE STREAMING. Improve Retention for Live Content. Copyright (415) ADAPTIVE STREAMING Improve Retention for Live Content A daptive streaming technologies make multiple video streams available to the end viewer. True adaptive bitrate dynamically switches between qualities

More information

Can t you hear me knocking

Can t you hear me knocking Can t you hear me knocking Identification of user actions on Android apps via traffic analysis Candidate: Supervisor: Prof. Mauro Conti Riccardo Spolaor Co-Supervisor: Dr. Nino V. Verde April 17, 2014

More information

Deploying IPTV and OTT

Deploying IPTV and OTT Deploying IPTV and OTT Using New OSS Tools to Improve Video QoE and Reduce Operational Costs Patricio S. Latini Senior Vice President Engineering Title Table of Contents Page Number INTRODUCTION 3 CURRENT

More information

Contents. About Objective Quality Benchmarks 15 Overview of Objective Benchmarks and Tools 16

Contents. About Objective Quality Benchmarks 15 Overview of Objective Benchmarks and Tools 16 Contents Acknowledgments 4 Introduction 14 About Objective Quality Benchmarks 15 Overview of Objective Benchmarks and Tools 16 Our Test Case 18 Peak Signal-to-Noise Ratio (PSNR) 18 Video Quality Metric

More information

How the web works - 1

How the web works - 1 How the web works - 1 Transmission Control Protocol / Internet protocol Domain Name System An understanding of these two is required to understand the limitations of Web based systems TCP/IP Provides an

More information

TCP Protocol Optimization for HTTP Adaptive Streaming

TCP Protocol Optimization for HTTP Adaptive Streaming TCP Protocol Optimization for HTTP Adaptive Streaming Soutenance de thèse Chiheb Ben Ameur Salle Aurigny, IRISA, Rennes 17 décembre 2015 Institut de Recherche en Informatique et Systèmes Aléatoires HTTP

More information

Video at the Edge passive delay measurements. Kathleen Nichols Pollere, Inc November 17, 2016

Video at the Edge passive delay measurements. Kathleen Nichols Pollere, Inc November 17, 2016 Video at the Edge passive delay measurements Kathleen Nichols Pollere, Inc nichols@pollere.net November 17, 2016 Talk Roadmap Netflix and YouTube network characterization delay profiles delay localization

More information

Sky Italia - Operation Evolution. London March 20th, 2018

Sky Italia - Operation Evolution. London March 20th, 2018 1 Sky Italia - Operation Evolution London March 20th, 2018 Sky Italy to IP-based distribution Content Transmission Contribution Network Core Network Access Network (FTTx) Home Network Content Display Public

More information

Distributed Systems. 21. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2018

Distributed Systems. 21. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2018 Distributed Systems 21. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2018 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance

More information

CS November 2018

CS November 2018 Distributed Systems 21. Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2018 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance

More information

Introduction Challenges with using ML Guidelines for using ML Conclusions

Introduction Challenges with using ML Guidelines for using ML Conclusions Introduction Challenges with using ML Guidelines for using ML Conclusions Misuse detection Exact descriptions of known bad behavior Anomaly detection Deviations from profiles of normal behavior First proposed

More information

Lecture 27 DASH (Dynamic Adaptive Streaming over HTTP)

Lecture 27 DASH (Dynamic Adaptive Streaming over HTTP) CS 414 Multimedia Systems Design Lecture 27 DASH (Dynamic Adaptive Streaming over HTTP) Klara Nahrstedt Spring 2012 Administrative MP2 posted MP2 Deadline April 7, Saturday, 5pm. APPLICATION Internet Multimedia

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks Ibrahim Matta What to expect? Increase understanding of fundamentals and design tradeoffs Discuss latest developments and research issues Naming & addressing, routing, connection

More information

Can we overcome. FEARLESS engineering

Can we overcome.   FEARLESS engineering Can we overcome this http://hightechforum.org/tag/privacy/ With this? Actually Tor The real question is: Can we overcome this using fingerprinting? UT DALLAS Erik Jonsson School of Engineering & Computer

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

Mobile Network Congestion Management

Mobile Network Congestion Management SOLUTIONS BRIEF SOLUTIONS CASE STUDY BRIEF Mobile Network Congestion Management INTRODUCTION This document summarises the Procera strategy towards congestion management methods for mobile networks. The

More information

Characterizing Netflix Bandwidth Consumption

Characterizing Netflix Bandwidth Consumption Characterizing Netflix Bandwidth Consumption Jim Martin, Yunhui Fu, Nicholas Wourms School of Computing, Clemson University, Clemson, SC 93 {jmarty,yfu,nwourms}@clemson.edu Terry Shaw Cable Television

More information

Emulation of Dynamic Adaptive Streaming over HTTP with Mininet

Emulation of Dynamic Adaptive Streaming over HTTP with Mininet Emulation of Dynamic Adaptive Streaming over HTTP with Mininet Anatoliy Zabrovskiy Evgeny Kuzmin Petrozavodsk State University Video streaming Video streaming is becoming more and more popular technology

More information

Comparing the bandwidth and priority Commands of a QoS Service Policy

Comparing the bandwidth and priority Commands of a QoS Service Policy Comparing the and priority s of a QoS Service Policy Contents Introduction Prerequisites Requirements Components Used Conventions Summary of Differences Configuring the Configuring the priority Which Traffic

More information

Performance Characterization of a Commercial Video Streaming Service

Performance Characterization of a Commercial Video Streaming Service Performance Characterization of a Commercial Video Streaming Service Mojgan Ghasemi, Princeton University P. Kanuparthy, 1 A. Mansy, 1 T. Benson, 2 J. Rexford 3 1 Yahoo, 2 Duke University, 3 Princeton

More information

A SIMPLE INTRODUCTION TO TOR

A SIMPLE INTRODUCTION TO TOR A SIMPLE INTRODUCTION TO TOR The Onion Router Fabrizio d'amore May 2015 Tor 2 Privacy on Public Networks Internet is designed as a public network Wi-Fi access points, network routers see all traffic that

More information

Tema 0: Transmisión de Datos Multimedia

Tema 0: Transmisión de Datos Multimedia Tema 0: Transmisión de Datos Multimedia Clases de aplicaciones multimedia Redes basadas en IP y QoS Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross

More information

Integrated and Differentiated Services. Christos Papadopoulos. CSU CS557, Fall 2017

Integrated and Differentiated Services. Christos Papadopoulos. CSU CS557, Fall 2017 Integrated and Differentiated Services Christos Papadopoulos (Remixed by Lorenzo De Carli) CSU CS557, Fall 2017 1 Preliminary concepts: token buffer 2 Characterizing Traffic: Token Bucket Filter Parsimonious

More information

Cloak of Visibility. -Detecting When Machines Browse A Different Web. Zhe Zhao

Cloak of Visibility. -Detecting When Machines Browse A Different Web. Zhe Zhao Cloak of Visibility -Detecting When Machines Browse A Different Web Zhe Zhao Title: Cloak of Visibility -Detecting When Machines Browse A Different Web About Author: Google Researchers Publisher: IEEE

More information

Session 1: Physical and Web Infrastructure

Session 1: Physical and Web Infrastructure INFM 603: Information Technology and Organizational Context Session 1: Physical and Web Infrastructure Jimmy Lin The ischool University of Maryland Thursday, September 6, 2012 A brief history (How computing

More information

The FootFall Project Tracing Attacks Through Non-Cooperative Networks and Stepping Stones with Timing-Based Watermarking

The FootFall Project Tracing Attacks Through Non-Cooperative Networks and Stepping Stones with Timing-Based Watermarking Computer Science The FootFall Project Tracing Attacks Through Non-Cooperative Networks and Stepping Stones with Timing-Based Watermarking Douglas Reeves Peng Ning N.C. State University Xinyuan Wang The

More information

QoS Guarantees. Motivation. . link-level level scheduling. Certain applications require minimum level of network performance: Ch 6 in Ross/Kurose

QoS Guarantees. Motivation. . link-level level scheduling. Certain applications require minimum level of network performance: Ch 6 in Ross/Kurose QoS Guarantees. introduction. call admission. traffic specification. link-level level scheduling. call setup protocol. reading: Tannenbaum,, 393-395, 395, 458-471 471 Ch 6 in Ross/Kurose Motivation Certain

More information

QoS MIB Implementation

QoS MIB Implementation APPENDIXB This appendix provides information about QoS-based features that are implemented on the Cisco Carrier Routing System line cards and what tables and objects in the QoS MIB support these QoS features.

More information

Advanced Networking Technologies

Advanced Networking Technologies Advanced Networking Technologies Chapter 13 Caching Techniques for Streaming Media (Acknowledgement: These slides have been prepared by Dr.-Ing. Markus Hofmann) 1 What is Streaming? Streaming media refers

More information

Telex Anticensorship in the

Telex Anticensorship in the Telex Anticensorship in the Network Infrastructure Eric Wustrow Ian Goldberg * Scott Wolchok J. Alex Halderman University of Michigan University of Michigan * University of Waterloo Background Internet

More information

Improving Internet Performance through Traffic Managers

Improving Internet Performance through Traffic Managers Improving Internet Performance through Traffic Managers Ibrahim Matta Computer Science Department Boston University Computer Science A Glimpse of Current Internet b b b b Alice c TCP b (Transmission Control

More information

Configuring Application Visibility and Control for Cisco Flexible Netflow

Configuring Application Visibility and Control for Cisco Flexible Netflow Configuring Application Visibility and Control for Cisco Flexible Netflow First published: July 22, 2011 This guide contains information about the Cisco Application Visibility and Control feature. It also

More information

LECTURE NOTES Professor Anita Wasilewska NEURAL NETWORKS

LECTURE NOTES Professor Anita Wasilewska NEURAL NETWORKS LECTURE NOTES Professor Anita Wasilewska NEURAL NETWORKS Neural Networks Classifier Introduction INPUT: classification data, i.e. it contains an classification (class) attribute. WE also say that the class

More information

Practical Keystroke Timing Attacks in Sandboxed JavaScript

Practical Keystroke Timing Attacks in Sandboxed JavaScript Practical Keystroke Timing Attacks in Sandboxed JavaScript M. Lipp, D. Gruss, M. Schwarz, D. Bidner, C. Maurice, S. Mangard Sep 11, 2017 ESORICS 17 Graz University of Technology Motivation Keystroke timing

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAGE COMPRESSION STANDARDS Lesson 19 JPEG-2000 Error Resiliency Instructional Objectives At the end of this lesson, the students should be able to: 1. Name two different types of lossy

More information

Application Detection

Application Detection The following topics describe Firepower System application detection : Overview:, on page 1 Custom Application Detectors, on page 6 Viewing or Downloading Detector Details, on page 14 Sorting the Detector

More information

Traffic Characteristics of Bulk Data Transfer using TCP/IP over Gigabit Ethernet

Traffic Characteristics of Bulk Data Transfer using TCP/IP over Gigabit Ethernet Traffic Characteristics of Bulk Data Transfer using TCP/IP over Gigabit Ethernet Aamir Shaikh and Kenneth J. Christensen Department of Computer Science and Engineering University of South Florida Tampa,

More information

SARA: Segment Aware Rate Adaptation for DASH Video Services

SARA: Segment Aware Rate Adaptation for DASH Video Services SARA: Segment Aware Rate Adaptation for DASH Video Services, Venkatesh Tamarapalli*, Deep Medhi University of Missouri Kansas City * Indian Institute of Technology-Guwahati, India Overview Introduction

More information

Early detection of Crossfire attacks using deep learning

Early detection of Crossfire attacks using deep learning Early detection of Crossfire attacks using deep learning Saurabh Misra, Mengxuan Tan, Mostafa Rezazad, Ngai-Man Cheung Singapore University of Technology and Design Content The Crossfire Attack A brief

More information