Beauty and the Burst
|
|
- Tobias Tyler
- 5 years ago
- Views:
Transcription
1 Beauty and the Burst Remote Identification of Encrypted Video Streams Roei Schuster Cornell Tech, Tel Aviv University Vitaly Shmatikov Cornell Tech Eran Tromer Columbia University, Tel Aviv University
2 Video traffic is interesting
3 Video traffic is encrypted
4 Video traffic is encrypted What can still be learned?
5 Traffic analysis for video identification streaming service victim
6 Traffic analysis for video identification streaming service victim
7 Traffic analysis for video identification streaming service Metadata! packet times, sizes, victim
8 Traffic analysis for video identification streaming service Metadata! packet times, sizes, Victim is watching Beauty and the Beast! victim
9 packet size (bytes) Initial buffering, then on / off bursts time (seconds)
10 packet size (bytes) Initial buffering, then on / off bursts time (seconds)
11 packet size (bytes) Initial buffering, then on / off bursts time (seconds) [RLLTBD 11], [ARNL 12], [MFWS 13],
12 packet size (bytes) Initial buffering, then on / off bursts time (seconds) [RLLTBD 11], [ARNL 12], [MFWS 13], Where do bursts come from?
13 Video representation on server streaming service
14 Video representation on server streaming service
15 Video representation on server Pulp Fiction Die Hard Armageddon streaming service 12 Monkeys The Fifth Element Die Hard II
16 Video representation on server MPEG-DASH standard: widely adopted by Netflix, YouTube, others Die Hard Armageddon Pulp Fiction 12 Monkeys The Fifth Element Die Hard II
17 Video representation on server MPEG-DASH standard: widely adopted by Netflix, YouTube, others Die Hard video stored in segment-files segment1.m4s segment2.m4s segment3.m4s segment4.m4s Armageddon Pulp Fiction 12 Monkeys Die Hard II The Fifth Element
18 Video representation on server MPEG-DASH standard: widely adopted by Netflix, YouTube, others Die Hard segment = a few seconds of playback 0-5sec 5-10sec 10-15sec 15-20sec video stored in segment-files segment1.m4s segment2.m4s segment3.m4s segment4.m4s Armageddon Pulp Fiction 12 Monkeys Die Hard II The Fifth Element
19 DASH client-server interaction (simplified) client server server buffer below threshold? no yes request next segment segment1.m4s segment2.m4s segment3.m4s segment4.m4s segment5.m4s segment6.m4s
20 DASH client-server interaction (simplified) client buffer below threshold? no yes request next segment segment fetched every few seconds server server segment1.m4s segment2.m4s segment3.m4s segment4.m4s segment5.m4s segment6.m4s
21 DASH client-server interaction (simplified) client buffer below threshold? no yes request next segment segment fetched every few seconds fetching causes a traffic burst server server segment1.m4s segment2.m4s segment3.m4s segment4.m4s segment5.m4s segment6.m4s
22 Bitrate (bytes) Variable bit rate encoding Time (seconds) Different video seconds require different amount of bytes to encode Iguana vs. Snakes VBR
23 Phases of Iguana vs Snakes in Bitrate Bitrate (bits per second) scenery, movement, tension rising Time (seconds)
24 Phases of Iguana vs Snakes in Bitrate Bitrate (bits per second) tension peaking, iguana is still Time (seconds)
25 Phases of Iguana vs Snakes in Bitrate Bitrate (bits per second) chase Time (seconds)
26 Phases of Iguana vs Snakes in Bitrate Bitrate (bits per second) chase iguana almost captured Time (seconds)
27 Phases of Iguana vs Snakes in Bitrate Bitrate (bits per second) iguana safe, resting
28 Bitrate (bytes) Variable bit rate encoding Time (seconds) Different video seconds require different amount of bytes to encode Iguana vs. Snakes VBR
29 Variable bit rate variable segment size Die Hard 0-5sec 5-10sec 10-15sec 15-20sec 20-25sec Segment1.m4s Segment2.m4s Segment3.m4s Segment4.m4s Segment5.m4s Pulp Fiction Armageddon 12 Monkeys Die Hard II The Fifth Element
30 burst size (bytes) Variable segment size variable burst size Time (seconds) buffering On/off bursts
31 burst size (bytes) Variable segment size variable burst size Time (seconds) buffering On/off bursts
32 MPEG-DASH leak content VBR pattern segments burst sizes stream time
33 From a leak to a fingerprint burst sizes Does the pattern of burst (segment) sizes uniquely characterize a title? Can we learn a title s identifying pattern? stream time
34 From a leak to a fingerprint burst sizes Does the pattern of burst (segment) sizes uniquely characterize a title? Diversity: empirically measure pairwise distances for 3500 downloaded and segmented YouTube titles Can we learn a title s identifying pattern? stream time
35 From a leak to a fingerprint burst sizes Does the pattern of burst (segment) sizes uniquely characterize a title? Diversity: empirically measure pairwise distances for 3500 downloaded and segmented YouTube titles Can we learn a title s identifying pattern? Consistency: empirically evaluate attacker s measurement error bound stream time
36 From a leak to a fingerprint burst sizes Does the pattern of burst (segment) sizes uniquely characterize a title? Diversity: empirically measure pairwise distances for 3500 downloaded and segmented YouTube titles Can we learn a title s identifying pattern? Consistency: empirically evaluate attacker s measurement error bound stream time ~20% of YouTube titles have fingerprints
37 Attack overview attacker network Die Hard Pulp Fiction Armageddon 12 Monkeys victim network
38 Attack overview attacker network Die Hard Pulp Fiction Armageddon 12 Monkeys victim network
39 Attack overview attacker network Die Hard Pulp Fiction Armageddon 12 Monkeys metadata victim network
40 Attack overview attacker network Die Hard Pulp Fiction Armageddon 12 Monkeys metadata training victim network detectors
41 Attack overview attacker network Die Hard Pulp Fiction Armageddon 12 Monkeys metadata training victim network detectors
42 Attack overview attacker network Die Hard Pulp Fiction Armageddon 12 Monkeys metadata training victim network detectors
43 Attack overview attacker network Die Hard Pulp Fiction Armageddon 12 Monkeys metadata training detectors Victim is watching Armageddon! victim network
44 Attack details attacker network Die Hard Pulp Fiction Armageddon 12 Monkeys metadata training vantage point? victim network detectors
45 Scenario I: on-path attack bursts on-path vantage point Wi-Fi access points, proxies, routers, enterprise or national network censors, ISPs
46 Attack details attacker network Die Hard Pulp Fiction Armageddon 12 Monkeys metadata training machine learning victim network detectors
47 Deep neural networks Very good at learning high-level concepts that are hard to express formally (e.g., traffic traces are similar ) Existing NN architectures very accurate on classification and detection problems
48 Advantages of neural networks Robust: can operate on noisy and coarse measurements Agnostic to protocol-specific attributes (e.g., QUIC vs. TLS) Can learn features other than burst patterns, e.g., arrival patterns of individual packets Can use multiple session representations, train on all at once
49 packet size Features Each feature is a time-series, sampled at 0.25-second intervals (example: bytes per second) time (seconds) Features considered: downstream/upstream/total values of bytes per second, packet per second, average packet length, and burst sizes
50 Attack attacker network Die Hard Pulp Fiction Armageddon 12 Monkeys metadata training neural net On-path attacker victim network detectors
51 Datasets and identification experiments 100 titles minute sessions 18 titles minute sessions sessions of different other titles 10 titles minute sessions 10 titles minute sessions
52 Datasets and identification experiments 100 titles minute sessions 100 classes 18 titles minute sessions sessions of different other titles 10 titles minute sessions 10 titles minute sessions
53 Datasets and identification experiments 100 titles minute sessions 100 classes 18 titles minute sessions sessions of different other titles open-world identification 18+1=19 classes 10 titles minute sessions 10 titles minute sessions
54 Datasets and identification experiments 100 titles minute sessions 100 classes 18 titles minute sessions sessions of different other titles open-world identification 18+1=19 classes 10 titles minute sessions 10 classes 10 titles minute sessions 10 classes
55 Datasets and identification experiments 100 titles minute sessions 100 classes 98.5% accuracy 18 titles minute sessions sessions of different other titles open-world identification 18+1=19 classes 99.5% accuracy 10 titles minute sessions 10 classes 92.5% accuracy 10 titles minute sessions 10 classes 98.6% accuracy
56 Empirical results: confusion matrices YouTube (feature: total burst size) Netflix (feature: total burst size) Predicted label unknown class, 3500 samples Predicted label
57 Empirical results: confusion matrices YouTube (feature: total burst size) Netflix (feature: total burst size) Predicted label Exactly 2 false positives unknown class, 3500 samples Predicted label No recurrent confusions (despite many same-series titles)
58 Tuning for precision YouTube (feature: total burst size) Netflix (feature: total burst size) 0 false positives with recall false positive rate with 0.93 recall
59 Attack details attacker network Die Hard Pulp Fiction Armageddon 12 Monkeys metadata training neural net vantage point? victim network detectors
60 Off-path attackers victim network bursts Wi-Fi access points, proxies, routers, enterprise or national network censors, ISPs on-path vantage point
61 Off-path attackers victim network bursts
62 Off-path attackers victim network bursts A visited webpage? A smartphone app?
63 Off-path attackers victim network bursts Example: A visited webpage? checking Facebook feed while streaming A smartphone Armageddon app?
64 Off-path attackers victim network bursts Example: A visited webpage? checking Facebook feed while streaming A smartphone Armageddon app?
65 Off-path attackers victim network bursts Example: A visited webpage? checking Facebook feed while streaming A smartphone Armageddon app?
66 Off-path attackers victim network bursts Example: A visited webpage? checking Facebook feed while streaming A smartphone Armageddon app? Web ad
67 Off-path attackers victim network bursts Example: A visited webpage? checking Facebook feed while streaming A smartphone Armageddon app? Web ad
68 Off-path attackers victim network bursts Three-fold confinement: different device, browser process, sandboxed iframe Example: A visited webpage? checking Facebook feed while streaming A smartphone Armageddon app? Web ad
69 Cross-device attack viewer Browser neighbor
70 Cross-device attack viewer Browser attacker Web site JavaScript attacker client neighbor
71 Cross-device attack viewer attacker Web site messages Browser JavaScript attacker client neighbor
72 Cross-device attack viewer Congestion attacker Web site messages Browser JavaScript attacker client neighbor
73 Cross-device attack viewer bursts Congestion attacker Web site messages Browser JavaScript attacker client neighbor
74 Cross-device attack viewer bursts Congestion Browser delays attacker Web site messages JavaScript attacker client neighbor
75 Cross-device attack viewer bursts Congestion Browser delays attacker Web site messages JavaScript attacker client Noisy, coarse estimate of actual traffic bursts neighbor
76 Delay-bursts delay (milliseconds) Message delays traffic burst sizes (scaled down) time (seconds)
77 delay (milliseconds) Delay-bursts Message delays traffic burst sizes (scaled down) For each traffic burst, compute aggregate delay induced. Use resulting time-series as input to neural network time (seconds)
78 Delay-bursts vs. traffic bursts delay-bursts time series: the delays induced by traffic bursts
79 1/10 cross-device attack: precision vs. recall Accuracy: false positive rate: 0.003, recall 0.933
80 Cross-device attack viewer Browser attacker Web site JavaScript detector code neighbor
81 Cross-site attack victim PC browser window Streaming client attacker Web site browser window JavaScript detector code
82 Mitigating the DASH leak Modern streaming traffic characteristics Title bitrate pattern unique when sampled at few-seconds granularity Fetching at segment granularity (= every few seconds) Buffer below threshold? no yes fetch next segment Maximizes quality of experience, server load, and network bandwidth utilization However, information leakage is intrinsic
83 Thank you! Further information and the paper:
Adaptive Video Acceleration. White Paper. 1 P a g e
Adaptive Video Acceleration White Paper 1 P a g e Version 1.0 Veronique Phan Dir. Technical Sales July 16 th 2014 2 P a g e 1. Preface Giraffic is the enabler of Next Generation Internet TV broadcast technology
More informationDynamic Adaptive Streaming over HTTP (DASH) Application Protocol : Modeling and Analysis
Dynamic Adaptive Streaming over HTTP (DASH) Application Protocol : Modeling and Analysis Dr. Jim Martin Associate Professor School of Computing Clemson University jim.martin@cs.clemson.edu http://www.cs.clemson.edu/~jmarty
More informationNetwork Traffic Characteristics of Data Centers in the Wild. Proceedings of the 10th annual conference on Internet measurement, ACM
Network Traffic Characteristics of Data Centers in the Wild Proceedings of the 10th annual conference on Internet measurement, ACM Outline Introduction Traffic Data Collection Applications in Data Centers
More informationAchieving Low-Latency Streaming At Scale
Achieving Low-Latency Streaming At Scale Founded in 2005, Wowza offers a complete portfolio to power today s video streaming ecosystem from encoding to delivery. Wowza provides both software and managed
More informationChallenges in building learning models when traff is enfrypted
Image source: goo.gl/utysek Challenges in building learning models when traff is enfrypted Vijay K. Gurbani, Ph.D. Network Data Science vijay.gurbani@nokia.com March 16, 2018 London We are never defnitely
More informationSamKnows test methodology
SamKnows test methodology Download and Upload (TCP) Measures the download and upload speed of the broadband connection in bits per second. The transfer is conducted over one or more concurrent HTTP connections
More informationProxy-based TCP-friendly streaming over mobile networks
Proxy-based TCP-friendly streaming over mobile networks Frank Hartung Uwe Horn Markus Kampmann Presented by Rob Elkind Proxy-based TCP over mobile nets 1 Outline Introduction TCP Friendly Rate Control
More informationCharacterizing Netflix Bandwidth Consumption
Characterizing Netflix Bandwidth Consumption Dr. Jim Martin Associate Professor School of Computing Clemson University jim.martin@cs.clemson.edu http://www.cs.clemson.edu/~jmarty Terry Shaw Director, Network
More informationPage 1. Outline / Computer Networking : 1 st Generation Commercial PC/Packet Video Technologies
Outline 15-441/15-641 Computer Networking Lecture 18 Internet Video Delivery Peter Steenkiste Slides by Professor Hui Zhang Background Technologies: - HTTP download - Real-time streaming - HTTP streaming
More informationLecture 12. Application Layer. Application Layer 1
Lecture 12 Application Layer Application Layer 1 Agenda The Application Layer (continue) Web and HTTP HTTP Cookies Web Caches Simple Introduction to Network Security Various actions by network attackers
More informationMeasuring KSA Broadband
Measuring KSA Broadband Meqyas, Q2 218 Report In 217, the CITC in partnership with SamKnows launched a project to measure internet performance. The project, named Meqyas, gives internet users in Saudi
More informationAutomated Website Fingerprinting through Deep Learning
Automated Website Fingerprinting through Deep Learning Vera Rimmer 1, Davy Preuveneers 1, Marc Juarez 2, Tom Van Goethem 1 and Wouter Joosen 1 NDSS 2018 Feb 19th (San Diego, USA) 1 2 Website Fingerprinting
More informationCONTENTS. System Requirements FAQ Webcast Functionality Webcast Functionality FAQ Appendix Page 2
VIOCAST FAQ CONTENTS System Requirements FAQ... 3 Webcast Functionality... 6 Webcast Functionality FAQ... 7 Appendix... 8 Page 2 SYSTEM REQUIREMENTS FAQ 1) What kind of Internet connection do I need to
More informationBasic Concepts in Intrusion Detection
Technology Technical Information Services Security Engineering Roma, L Università Roma Tor Vergata, 23 Aprile 2007 Basic Concepts in Intrusion Detection JOVAN GOLIĆ Outline 2 Introduction Classification
More informationConfused, Timid, and Unstable: Picking a Video Streaming Rate is Hard
Confused, Timid, and Unstable: Picking a Video Streaming Rate is Hard Araz Jangiaghdam Seminar Networks and Distributed Systems School of Engineering and Sciences Jacobs University Bremen Campus Ring 1,
More informationInternet Video Delivery. Professor Hui Zhang
18-345 Internet Video Delivery Professor Hui Zhang 1 1990 2004: 1 st Generation Commercial PC/Packet Video Technologies Simple video playback, no support for rich app Not well integrated with Web browser
More informationConfigure Video and Audio Settings
14 CHAPTER Revised: November 24, 2010 Concepts, page 14-1 s, page 14-3 Reference, page 14-6 Concepts Performance Factors, page 14-1 Guidelines, page 14-2 Workflows, page 14-3 Performance Factors Understand
More informationDRAFT. Measuring KSA Broadband. Meqyas, Q Report
DRAFT Measuring KSA Broadband Meqyas, Q3 218 Report In 217, the CITC in partnership with SamKnows launched a project to measure internet performance. The project, named Meqyas, gives internet users in
More informationAdaptive Bit Rate (ABR) Video Detection and Control
OVERVIEW Adaptive Bit Rate (ABR) Video Detection and Control In recent years, Internet traffic has changed dramatically and this has impacted service providers and their ability to manage network traffic.
More informationirtc: Live Broadcasting
1 irtc: Live Broadcasting Delivering ultra-low-latency media at massive scale with LiveSwitch and WebRTC Introduction In the early days of the Internet and personal computing, it wasn t uncommon to wait
More informationReal-Time Protocol (RTP)
Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of
More informationIt s Not the Cost, It s the Quality! Ion Stoica Conviva Networks and UC Berkeley
It s Not the Cost, It s the Quality! Ion Stoica Conviva Networks and UC Berkeley 1 A Brief History! Fall, 2006: Started Conviva with Hui Zhang (CMU)! Initial goal: use p2p technologies to reduce distribution
More informationChapter 2 Application Layer
Chapter 2 Application Layer A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationVideo Quality Management Guidebook
Video Quality Management Guidebook Strategies for traffic optimization CASE STUDY GUIDE BOOK Video trends Both mobile and fixed data networks are experiencing a rise in video traffic which already represents
More informationIVMS 4500 User Guide
http://www.vadtel.co.uk/ Table of Contents - Installing IVMS 4500 - Getting To Know The Software - Adding Devices - Camera Views - Playback Footage Installing IVMS 4500 1. Log onto the Google Play or App
More informationWeek 7: Traffic Models and QoS
Week 7: Traffic Models and QoS Acknowledgement: Some slides are adapted from Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition, J.F Kurose and K.W. Ross All Rights Reserved,
More informationCSCD 433/533 Advanced Networks
CSCD 433/533 Advanced Networks Lecture 2 Network Review Winter 2017 Reading: Chapter 1 1 Topics Network Topics Some Review from CSCD330 Applications Common Services Architecture OSI Model AS and Routing
More informationScaling Internet TV Content Delivery ALEX GUTARIN DIRECTOR OF ENGINEERING, NETFLIX
Scaling Internet TV Content Delivery ALEX GUTARIN DIRECTOR OF ENGINEERING, NETFLIX Inventing Internet TV Available in more than 190 countries 104+ million subscribers Lots of Streaming == Lots of Traffic
More informationThe Frozen Mountain irtc White Paper Series
The Frozen Mountain irtc White Paper Series This white paper is the fourth in a series on Internet Based Real Time Communications (irtc) written by Frozen Mountain Software s CTO Anton Venema. The complete
More informationCorrelating Network Congestion with Video QoE Degradation - a Last-Mile Perspective
Correlating Congestion with Video QoE Degradation - a Last-Mile Perspective Francesco Bronzino, Paul Schmitt, Renata Teixeira, Nick Feamster, Srikanth Sundaresan AIMS 13 March 2018 Last-Mile Measurement:
More informationFrom ATM to IP and back again: the label switched path to the converged Internet, or another blind alley?
Networking 2004 Athens 11 May 2004 From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley? Jim Roberts France Telecom R&D The story of QoS: how to get
More informationSFMap: Inferring Services over Encrypted Web Flows using Dynamical Domain Name Graphs TMA 2015
SFMap: Inferring Services over Encrypted Web Flows using Dynamical Domain Name Graphs TMA 2015 Tatsuya Mori 1, Takeru Inoue 2, Akihiro Shimoda 3, Kazumichi Sato 3, Keisuke Ishibashi 3, and Shigeki Goto
More informationTrisul Network Analytics - Traffic Analyzer
Trisul Network Analytics - Traffic Analyzer Using this information the Trisul Network Analytics Netfllow for ISP solution provides information to assist the following operation groups: Network Operations
More informationTANGO: Enabling New Services through Cooperation between Cellular Network and Mobile Devices. Motivation
TANGO: Enabling New Services through Cooperation between Cellular and Mobile Devices Nawanol Theera-Ampornpunt, Sambit Mishra, Saurabh Bagchi, Kaustubh Joshi (AT&T), Rajesh Panta (AT&T) Motivation Cellular
More informationCS 557 Congestion and Complexity
CS 557 Congestion and Complexity Observations on the Dynamics of a Congestion Control Algorithm: The Effects of Two-Way Traffic Zhang, Shenker, and Clark, 1991 Spring 2013 The Story So Far. Transport layer:
More informationP3 Insights Separate T-Mobile Binge On Fact from Fiction
P3 Insights Separate T-Mobile Binge On Fact from Fiction P3 Group s Analysis of Crowdsourced Data Reveals Unlimited Mobile Video Plans Can Result in Win-Win-Win for Carriers, Consumers and Content Providers
More informationNMLRG #4 meeting in Berlin. Mobile network state characterization and prediction. P.Demestichas (1), S. Vassaki (2,3), A.Georgakopoulos (2,3)
NMLRG #4 meeting in Berlin Mobile network state characterization and prediction P.Demestichas (1), S. Vassaki (2,3), A.Georgakopoulos (2,3) (1)University of Piraeus (2)WINGS ICT Solutions, www.wings-ict-solutions.eu/
More informationComputer Science 461 Final Exam May 22, :30-3:30pm
NAME: Login name: Computer Science 461 Final Exam May 22, 2012 1:30-3:30pm This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor Code pledge
More informationRequet: Real-Time QoE Detection for Encrypted YouTube Traffic
Craig Gutterman, Katherine Guo, Sarthak Arora, Xiaoyang Wang, Les Wu, Ethan Katz-Bassett, Gil Zussman Electrical Engineering, Columbia University, Nokia Bell Labs ABSTRACT As video traffic dominates the
More informationAnonymity C S A D VA N C E D S E C U R I T Y TO P I C S P R E S E N TAT I O N BY: PA N AY I OTO U M A R KO S 4 T H O F A P R I L
Anonymity C S 6 8 2 A D VA N C E D S E C U R I T Y TO P I C S P R E S E N TAT I O N BY: PA N AY I OTO U M A R KO S 4 T H O F A P R I L 2 0 1 9 Tor: The Second- Generation Onion Router R. DINGLEDINE N.
More informationApplication-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks
COMP 431 Internet Services & Protocols Application-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks Jasleen Kaur February 14, 2019 Application-Layer Protocols Outline Example
More informationCE Advanced Network Security Anonymity II
CE 817 - Advanced Network Security Anonymity II Lecture 19 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained
More informationNDN-RTC. Peter Gusev UCLA REMAP 9/5/2014
NDN-RTC Peter Gusev UCLA REMAP 9/5/2014 NDNComm 2014 Demo Producer 1: Live NDNComm HD streaming (1080p 30fps, 1.5Mbps) Producer 2: REMAP office webcam producer (SD, 30fps, 500Kbps) Demo 1: Consumer for
More informationQUALITY of SERVICE. Introduction
QUALITY of SERVICE Introduction There are applications (and customers) that demand stronger performance guarantees from the network than the best that could be done under the circumstances. Multimedia
More informationA Robust Classifier for Passive TCP/IP Fingerprinting
A Robust Classifier for Passive TCP/IP Fingerprinting Rob Beverly MIT CSAIL rbeverly@csail.mit.edu April 20, 2004 PAM 2004 Typeset by FoilTEX Outline A Robust Classifier for Passive TCP/IP Fingerprinting
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 multimedia applications:
More informationOverview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services
Overview 15-441 15-441 Computer Networking 15-641 Lecture 19 Queue Management and Quality of Service Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 What is QoS? Queuing discipline and scheduling
More informationarxiv: v1 [cs.cr] 14 Jan 2019
Peel the onion: Recognition of Android apps behind the Tor Network arxiv:9.4434v [cs.cr] 4 Jan 29 Emanuele Petagna petagna.79537@studenti.uniroma.it Department of Computer, Control, and Management Engineering,
More informationECEN Final Exam Fall Instructor: Srinivas Shakkottai
ECEN 424 - Final Exam Fall 2013 Instructor: Srinivas Shakkottai NAME: Problem maximum points your points Problem 1 10 Problem 2 10 Problem 3 20 Problem 4 20 Problem 5 20 Problem 6 20 total 100 1 2 Midterm
More informationThe Internet today. Measuring the Internet: challenges and applications. Politecnico di Torino 7/12/2011. Speaker: Marco Mellia
Measuring the Internet: challenges and applications Telecommunication Group presentation Speaker: Marco Mellia Politecnico di Torino 7/12/2011 The Internet today 2 A very complex scenario many eterogeneous
More informationQOE: A MICRO AND MACRO PERSPECTIVE
QOE: A MICRO AND MACRO PERSPECTIVE Henning Schulzrinne (with Kyung-Hwa Kim, Hyunwoo Nam, Vishal Singh, Daniel Song) Columbia University Micro vs. Macro Time & space local (user, HH) Internet-wide short-term
More informationDASH trial Olympic Games. First live MPEG-DASH large scale demonstration.
DASH trial Olympic Games. First live MPEG-DASH large scale demonstration. During the Olympic Games 2012 the VRT offered their audience to experience their Olympic Games broadcast in MPEG-DASH. The public
More informationResource Sharing or Designing Access Network For Low Cost.
Resource Sharing or Designing Access Network For Low Cost www.broadcom.com Traffic Percentile What Drives Demand for Bandwidth? Usage In North America, the median usage is 4 GB per month, while the mean
More informationNetwork Management & Monitoring
Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end
More informationConfused, Timid, and Unstable: Picking a Video Streaming Rate is Hard
Confused, Timid, and Unstable: Picking a Video Streaming Rate is Hard Five students from Stanford Published in 2012 ACM s Internet Measurement Conference (IMC) 23 citations Ahmad Tahir 1/26 o Problem o
More informationSelf Programming Networks
Self Programming Networks Is it possible for to Learn the control planes of networks and applications? Operators specify what they want, and the system learns how to deliver CAN WE LEARN THE CONTROL PLANE
More informationAdvanced Computer Networks
Advanced Computer Networks QoS in IP networks Prof. Andrzej Duda duda@imag.fr Contents QoS principles Traffic shaping leaky bucket token bucket Scheduling FIFO Fair queueing RED IntServ DiffServ http://duda.imag.fr
More informationPort-Scanning Resistance in Tor Anonymity Network. Presented By: Shane Pope Dec 04, 2009
Port-Scanning Resistance in Tor Anonymity Network Presented By: Shane Pope (Shane.M.Pope@gmail.com) Dec 04, 2009 In partial fulfillment of the requirements for graduation with the Dean's Scholars Honors
More informationGuaranteeing Video Quality
Guaranteeing Video Quality in IP Delivery Systems By Göran Appelquist, Ph.D., Chief Technology Officer, Edgeware AB This article explores some of the challenges and solutions for operators to guarantee
More informationThe Diffie-Hellman Key Exchange
ISC: SECURITY AND QOS The Diffie-Hellman Key Exchange A mechanism to establish secret keys without the need for CAs Based on the difficulty of computing discrete logarithms of large numbers Public (or
More informationAnatomy of a DASH Client. Ali C. Begen, Ph.D.
Anatomy of a DASH Client Ali C. Begen, Ph.D. http://ali.begen.net Video Delivery over HTTP Enables playback while still downloading Server sends the file as fast as possible Pseudo Streaming Enables seeking
More informationADAPTIVE STREAMING. Improve Retention for Live Content. Copyright (415)
ADAPTIVE STREAMING Improve Retention for Live Content A daptive streaming technologies make multiple video streams available to the end viewer. True adaptive bitrate dynamically switches between qualities
More informationCan t you hear me knocking
Can t you hear me knocking Identification of user actions on Android apps via traffic analysis Candidate: Supervisor: Prof. Mauro Conti Riccardo Spolaor Co-Supervisor: Dr. Nino V. Verde April 17, 2014
More informationDeploying IPTV and OTT
Deploying IPTV and OTT Using New OSS Tools to Improve Video QoE and Reduce Operational Costs Patricio S. Latini Senior Vice President Engineering Title Table of Contents Page Number INTRODUCTION 3 CURRENT
More informationContents. About Objective Quality Benchmarks 15 Overview of Objective Benchmarks and Tools 16
Contents Acknowledgments 4 Introduction 14 About Objective Quality Benchmarks 15 Overview of Objective Benchmarks and Tools 16 Our Test Case 18 Peak Signal-to-Noise Ratio (PSNR) 18 Video Quality Metric
More informationHow the web works - 1
How the web works - 1 Transmission Control Protocol / Internet protocol Domain Name System An understanding of these two is required to understand the limitations of Web based systems TCP/IP Provides an
More informationTCP Protocol Optimization for HTTP Adaptive Streaming
TCP Protocol Optimization for HTTP Adaptive Streaming Soutenance de thèse Chiheb Ben Ameur Salle Aurigny, IRISA, Rennes 17 décembre 2015 Institut de Recherche en Informatique et Systèmes Aléatoires HTTP
More informationVideo at the Edge passive delay measurements. Kathleen Nichols Pollere, Inc November 17, 2016
Video at the Edge passive delay measurements Kathleen Nichols Pollere, Inc nichols@pollere.net November 17, 2016 Talk Roadmap Netflix and YouTube network characterization delay profiles delay localization
More informationSky Italia - Operation Evolution. London March 20th, 2018
1 Sky Italia - Operation Evolution London March 20th, 2018 Sky Italy to IP-based distribution Content Transmission Contribution Network Core Network Access Network (FTTx) Home Network Content Display Public
More informationDistributed Systems. 21. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2018
Distributed Systems 21. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2018 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance
More informationCS November 2018
Distributed Systems 21. Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2018 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance
More informationIntroduction Challenges with using ML Guidelines for using ML Conclusions
Introduction Challenges with using ML Guidelines for using ML Conclusions Misuse detection Exact descriptions of known bad behavior Anomaly detection Deviations from profiles of normal behavior First proposed
More informationLecture 27 DASH (Dynamic Adaptive Streaming over HTTP)
CS 414 Multimedia Systems Design Lecture 27 DASH (Dynamic Adaptive Streaming over HTTP) Klara Nahrstedt Spring 2012 Administrative MP2 posted MP2 Deadline April 7, Saturday, 5pm. APPLICATION Internet Multimedia
More informationAdvanced Computer Networks
Advanced Computer Networks Ibrahim Matta What to expect? Increase understanding of fundamentals and design tradeoffs Discuss latest developments and research issues Naming & addressing, routing, connection
More informationCan we overcome. FEARLESS engineering
Can we overcome this http://hightechforum.org/tag/privacy/ With this? Actually Tor The real question is: Can we overcome this using fingerprinting? UT DALLAS Erik Jonsson School of Engineering & Computer
More informationQuality of Service (QoS)
Quality of Service (QoS) A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationMobile Network Congestion Management
SOLUTIONS BRIEF SOLUTIONS CASE STUDY BRIEF Mobile Network Congestion Management INTRODUCTION This document summarises the Procera strategy towards congestion management methods for mobile networks. The
More informationCharacterizing Netflix Bandwidth Consumption
Characterizing Netflix Bandwidth Consumption Jim Martin, Yunhui Fu, Nicholas Wourms School of Computing, Clemson University, Clemson, SC 93 {jmarty,yfu,nwourms}@clemson.edu Terry Shaw Cable Television
More informationEmulation of Dynamic Adaptive Streaming over HTTP with Mininet
Emulation of Dynamic Adaptive Streaming over HTTP with Mininet Anatoliy Zabrovskiy Evgeny Kuzmin Petrozavodsk State University Video streaming Video streaming is becoming more and more popular technology
More informationComparing the bandwidth and priority Commands of a QoS Service Policy
Comparing the and priority s of a QoS Service Policy Contents Introduction Prerequisites Requirements Components Used Conventions Summary of Differences Configuring the Configuring the priority Which Traffic
More informationPerformance Characterization of a Commercial Video Streaming Service
Performance Characterization of a Commercial Video Streaming Service Mojgan Ghasemi, Princeton University P. Kanuparthy, 1 A. Mansy, 1 T. Benson, 2 J. Rexford 3 1 Yahoo, 2 Duke University, 3 Princeton
More informationA SIMPLE INTRODUCTION TO TOR
A SIMPLE INTRODUCTION TO TOR The Onion Router Fabrizio d'amore May 2015 Tor 2 Privacy on Public Networks Internet is designed as a public network Wi-Fi access points, network routers see all traffic that
More informationTema 0: Transmisión de Datos Multimedia
Tema 0: Transmisión de Datos Multimedia Clases de aplicaciones multimedia Redes basadas en IP y QoS Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross
More informationIntegrated and Differentiated Services. Christos Papadopoulos. CSU CS557, Fall 2017
Integrated and Differentiated Services Christos Papadopoulos (Remixed by Lorenzo De Carli) CSU CS557, Fall 2017 1 Preliminary concepts: token buffer 2 Characterizing Traffic: Token Bucket Filter Parsimonious
More informationCloak of Visibility. -Detecting When Machines Browse A Different Web. Zhe Zhao
Cloak of Visibility -Detecting When Machines Browse A Different Web Zhe Zhao Title: Cloak of Visibility -Detecting When Machines Browse A Different Web About Author: Google Researchers Publisher: IEEE
More informationSession 1: Physical and Web Infrastructure
INFM 603: Information Technology and Organizational Context Session 1: Physical and Web Infrastructure Jimmy Lin The ischool University of Maryland Thursday, September 6, 2012 A brief history (How computing
More informationThe FootFall Project Tracing Attacks Through Non-Cooperative Networks and Stepping Stones with Timing-Based Watermarking
Computer Science The FootFall Project Tracing Attacks Through Non-Cooperative Networks and Stepping Stones with Timing-Based Watermarking Douglas Reeves Peng Ning N.C. State University Xinyuan Wang The
More informationQoS Guarantees. Motivation. . link-level level scheduling. Certain applications require minimum level of network performance: Ch 6 in Ross/Kurose
QoS Guarantees. introduction. call admission. traffic specification. link-level level scheduling. call setup protocol. reading: Tannenbaum,, 393-395, 395, 458-471 471 Ch 6 in Ross/Kurose Motivation Certain
More informationQoS MIB Implementation
APPENDIXB This appendix provides information about QoS-based features that are implemented on the Cisco Carrier Routing System line cards and what tables and objects in the QoS MIB support these QoS features.
More informationAdvanced Networking Technologies
Advanced Networking Technologies Chapter 13 Caching Techniques for Streaming Media (Acknowledgement: These slides have been prepared by Dr.-Ing. Markus Hofmann) 1 What is Streaming? Streaming media refers
More informationTelex Anticensorship in the
Telex Anticensorship in the Network Infrastructure Eric Wustrow Ian Goldberg * Scott Wolchok J. Alex Halderman University of Michigan University of Michigan * University of Waterloo Background Internet
More informationImproving Internet Performance through Traffic Managers
Improving Internet Performance through Traffic Managers Ibrahim Matta Computer Science Department Boston University Computer Science A Glimpse of Current Internet b b b b Alice c TCP b (Transmission Control
More informationConfiguring Application Visibility and Control for Cisco Flexible Netflow
Configuring Application Visibility and Control for Cisco Flexible Netflow First published: July 22, 2011 This guide contains information about the Cisco Application Visibility and Control feature. It also
More informationLECTURE NOTES Professor Anita Wasilewska NEURAL NETWORKS
LECTURE NOTES Professor Anita Wasilewska NEURAL NETWORKS Neural Networks Classifier Introduction INPUT: classification data, i.e. it contains an classification (class) attribute. WE also say that the class
More informationPractical Keystroke Timing Attacks in Sandboxed JavaScript
Practical Keystroke Timing Attacks in Sandboxed JavaScript M. Lipp, D. Gruss, M. Schwarz, D. Bidner, C. Maurice, S. Mangard Sep 11, 2017 ESORICS 17 Graz University of Technology Motivation Keystroke timing
More informationModule 6 STILL IMAGE COMPRESSION STANDARDS
Module 6 STILL IMAGE COMPRESSION STANDARDS Lesson 19 JPEG-2000 Error Resiliency Instructional Objectives At the end of this lesson, the students should be able to: 1. Name two different types of lossy
More informationApplication Detection
The following topics describe Firepower System application detection : Overview:, on page 1 Custom Application Detectors, on page 6 Viewing or Downloading Detector Details, on page 14 Sorting the Detector
More informationTraffic Characteristics of Bulk Data Transfer using TCP/IP over Gigabit Ethernet
Traffic Characteristics of Bulk Data Transfer using TCP/IP over Gigabit Ethernet Aamir Shaikh and Kenneth J. Christensen Department of Computer Science and Engineering University of South Florida Tampa,
More informationSARA: Segment Aware Rate Adaptation for DASH Video Services
SARA: Segment Aware Rate Adaptation for DASH Video Services, Venkatesh Tamarapalli*, Deep Medhi University of Missouri Kansas City * Indian Institute of Technology-Guwahati, India Overview Introduction
More informationEarly detection of Crossfire attacks using deep learning
Early detection of Crossfire attacks using deep learning Saurabh Misra, Mengxuan Tan, Mostafa Rezazad, Ngai-Man Cheung Singapore University of Technology and Design Content The Crossfire Attack A brief
More information