MPEG Frame Types intrapicture predicted picture bidirectional predicted picture. I frames reference frames

Similar documents
3.5 SECURITY. How can you reduce the risk of getting a virus?

SIP and VoIP What is SIP? What s a Control Channel? History of Signaling Channels

Security and Privacy. Xin Liu Computer Science University of California, Davis. Introduction 1-1

Handout 20 - Quiz 2 Solutions

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks

CSE 565 Computer Security Fall 2018

Accounting Information Systems

Your message is sent from your computer to a server (like the post office) where the

KULLEĠĠ SAN BENEDITTU Boys Secondary, Kirkop

NETWORK SECURITY. Ch. 3: Network Attacks

CS 161 Computer Security

Handling unwanted . What are the main sources of junk ?

Problem Set 10 Due: Start of class December 11

When does it work? Packet Sniffers. INFO Lecture 8. Content 24/03/2009

Homework 2 assignment for ECE374 Posted: 02/20/15 Due: 02/27/15

INTERNET SAFETY IS IMPORTANT

The Dilemma: Junk, Spam, or Phishing? How to Classify Unwanted s and Respond Accordingly

Image Spam. Introduction. Project description:

15 Data Compression 2014/9/21. Objectives After studying this chapter, the student should be able to: 15-1 LOSSLESS COMPRESSION

From Spam to Hash Chains in three easy steps! p.1/29

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

CSC 574 Computer and Network Security. DNS Security

General Certificate of Education Ordinary Level Computer Security System/ Social Effects of Information System

Spam Protection Guide

SPOOFING. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

CUSTOMER TIPS: HOW TO GUARD AGAINST FRAUD WHEN USING ONLINE BANKING OR ATM s

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing.

CS164 Final Exam Winter 2013

PLEASE READ CAREFULLY BEFORE YOU START

ITEC310 Computer Networks II

THE SET AND FORGET SYSTEM

System Models. 2.1 Introduction 2.2 Architectural Models 2.3 Fundamental Models. Nicola Dragoni Embedded Systems Engineering DTU Informatics

Final Exam COS 116 Spring 2012: The Computational Universe

If you re a Facebook marketer, you re likely always looking for ways to

to Stay Out of the Spam Folder

Fighting Phishing I: Get phish or die tryin.

CMPE150 Midterm Solutions

Security and Privacy

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Chapter 6 Network and Internet Security and Privacy

Malware, , Database Security

SECURING INFORMATION SYSTEMS

Franzes Francisco Manila IBM Domino Server Crash and Messaging

Internet Basics. Basic Terms and Concepts. Connecting to the Internet

INSTRUCTIONS TO CANDIDATES

CompTIA E2C Security+ (2008 Edition) Exam Exam.

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

CS Paul Krzyzanowski

Distributed Systems. 29. Firewalls. Paul Krzyzanowski. Rutgers University. Fall 2015

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

CS244a: An Introduction to Computer Networks

Endpoint Security - what-if analysis 1

Network Applications Principles of Network Applications

interface Question 1. a) Applications nslookup/dig Web Application DNS SMTP HTTP layer SIP Transport layer OSPF ICMP IP Network layer

RouterCheck Installation and Usage

Home/Network Computing

Qualifying exam: operating systems, 1/6/2014

Public-Key Infrastructure NETS E2008

Cyber Security Guide for NHSmail

Best Practice - Protect Against TCP SYN Flooding Attacks with TCP Accept Policies

Chapter 3. The Basics of Networking

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

CSC 4900 Computer Networks:

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

Netiquette. IT Engineering II. IT Engineering II Instructor: Ali B. Hashemi

Word Found Meaning Innovation

ATTACHMENTS, INSERTS, AND LINKS...

Gestion et sécurité des réseaux informatiques. Guy Leduc. Chapter 3: Securing applications. Chapter goals: security in practice:

SPAM UNDERSTANDING & AVOIDING

Creating and Using an Account

McAfee S DO s AnD DOn ts Of Online Shopping

Networking interview questions

Lab Assignment 3 for ECE374

Outline More Security Protocols CS 239 Computer Security February 6, 2006

XP: Backup Your Important Files for Safety

Introduction to

Chapter 3: Securing applications

NETWORK INTRUSION. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

CYBER ATTACKS EXPLAINED: PACKET SPOOFING

Man in the middle. Bởi: Hung Tran

Configuration Section

Homework 2 CS161 Computer Security, Spring 2008 Assigned 2/13/08 Due 2/25/08

TMG Clerk. User Guide

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.

shortcut Tap into learning NOW! Visit for a complete list of Short Cuts. Your Short Cut to Knowledge

COMPREHENSIVE LIST OF CASHLESS FAQs (GUESTS)

Computer Networks - Midterm

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney.

Cryptography and Network Security

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

poetry.com Web Safety Ratings from McAfee SiteAdvisor What our inbox looked like after we signed up here:

NCMail: Microsoft Outlook User s Guide

Unit 9 Tech savvy? Tech support. 1 I have no idea why... Lesson A. A Unscramble the questions. Do you know which battery I should buy?

IPv6 Traffic Hijack Test System and Defense Tools Using DNSSEC

Network Defenses 21 JANUARY KAMI VANIEA 1

Computer Networks - Midterm

Introduction to SSL. Copyright 2005 by Sericon Technology Inc.

Computer Security. 15. Tor & Anonymous Connectivity. Paul Krzyzanowski. Rutgers University. Spring 2017

Webomania Solutions Pvt. Ltd. 2017

Phishing Read Behind The Lines

Transcription:

MPEG o We now turn our attention to the MPEG format, named after the Moving Picture Experts Group that defined it. To a first approximation, a moving picture (i.e., video) is simply a succession of still images also called frames or pictures displayed at some video rate. Each of these frames can be compressed using the same DCT (Discrete Cosine Transform)-based technique used in JPEG. o Stopping at this point would be a mistake, however, because it fails to remove the interframe redundancy present in a video sequence. For example, two successive frames of video will contain almost identical information if there is not much motion in the scene, so it would be unnecessary to send the same information twice. Even when there is motion, there may be plenty of redundancy since a moving object may not change from one frame to the next; in some cases, only its position changes. o MPEG takes this interframe redundancy into consideration. MPEG also defines a mechanism for encoding an audio signal with the video, but we consider only the video aspect of MPEG in this section. Frame Types o MPEG takes a sequence of video frames as input and compresses them into three types of frames, called: 1. I frames (intrapicture), 2. P frames (predicted picture), and 3. B frames (bidirectional predicted picture). o Each frame of input is compressed into one of these three frame types. I frames can be thought of as reference frames; they are self-contained, depending on neither earlier frames nor later frames. To a first approximation, an I frame is simply the JPEG compressed version of the corresponding frame in the video source. o P and B frames are not self-contained; they specify relative differences from some reference frame. More specifically, a P frame specifies the differences from the previous I frame, while a B frame gives an interpolation between the previous and subsequent I or P frames. o Figure (1) illustrates a sequence of seven video frames that, after being compressed by MPEG, result in a sequence of I, P, and B frames. The two I frames stand alone; each can be decompressed at the receiver independently of any other frames. The P frame depends on the preceding I frame; it can be decompressed at the receiver only if the preceding I frame also arrives. Each of the B frames depends on both the preceding I or P frame and the subsequent I or P frame. Both of these reference frames must arrive at the receiver before MPEG can decompress the B frame to reproduce the original video frame. 1

Fig (1) Sequence of I, P, and B frames generated by MPEG o Note that, because each B frame depends on a later frame in the sequence, the compressed frames are not transmitted in sequential order. Instead, the sequence I B B P B B I shown in Figure () is transmitted as I P B B I B B. o Also, MPEG does not define the ratio of I frames to P and B frames; this ratio may vary depending on the required compression and picture quality. For example, it is permissible to transmit only I frames. This would be similar to using JPEG to compress the video. o MPEG coding is so expensive that it is frequently done offline (i.e., not in real time). For example, in a video-on-demand system, the video would be encoded and stored on disk ahead of time. When a viewer wanted to watch the video, the MPEG stream would then be transmitted to the viewer s machine, which would decode and display the stream in real time. The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, & Spyware The internet is just too accessible, and it s too easy for people to make anything they want out of it. Here let us touch on a few of immediate concern that you should be aware of: snooping, spam, spoofing, phishing, pharming, cookies, and spyware. Snooping Snooping, in a security context, is unauthorized access to another person's or company's data. The practice is similar to eavesdropping but is not necessarily limited to gaining access to data during its transmission. Snooping can include casual observance of an e-mail that appears on another's computer screen or watching what someone else is typing. More sophisticated snooping uses software programs to remotely monitor activity on a computer or network device. 2

If you re really concerned about preserving your privacy, you can try certain technical solutions for instance, installing software that encodes and decodes messages. But the simplest solution is the easiest: Don t put any sensitive information in your email. Even deleted email removed from trash can still be traced on your hard disk. To guard against this, you can use software to completely eliminate deleted files. Spam: Electronic Junk Mail The term spam was picked up by the computer world to describe a kind of noise that interferes with communication. Now spam refers to unsolicited email, or junk mail, in the form of advertising or chain letters. But the problem of spam has metastasized well beyond the stage of annoyance. Spam plagues social networks, such as Facebook. It is even migrating from computers to cellphones, messages that the recipients have to pay for. Usually, of course, you don t recognize the spam sender on your list of incoming mail, and often the subject line will give no hint, stating something such as The status of your application. To better manage spam, some users get two email boxes. One is used for online shopping, business, research, and the like which will continue to attract spam. The other is used only for personal friends and family and will probably not receive much spam. Spoofing, Phishing, & Pharming: Phony Email Senders & Websites Spoofing, Using Fake Email Sender Names: Spoofing is the forgery of an email sender name so that the message appears to have originated from someone or somewhere other than the actual source. Spoofing is one of the main tactics used by spammers (and virus writers) to induce or trick recipients into opening and perhaps responding to their solicitations. DNS Spoofing Let us start with something very basic: Alice wants to visit Bob's Web site. She types Bob's URL into her browser and a few seconds later, a Web page appears. But is it Bob's web site? May be yes and may be no. Trudy might be up to her old tricks again. For example, she might be intercepting all of Alice's outgoing packets and examining them. When she captures an HTTP GET request headed to Bob's Web site, she could go to Bob's Web site herself to get the page, modify it as she wishes, and return the fake page to Alice. Alice would be none the wiser. Worse yet, Trudy could slash the prices at Bob's e-store to make his goods look very attractive, thereby tricking Alice into sending her credit card number to ''Bob'' to buy some merchandise. One disadvantage to this classic man-in-the-middle attack is that Trudy has to be in a position to intercept Alice's outgoing traffic and forge her incoming traffic. In practice, she has to tap either Alice's phone line or Bob's, since tapping the fiber backbone is fairly difficult. While active wiretapping is certainly possible, it is a certain amount of 3

work, and while Trudy is clever, she is also lazy. Besides, there are easier ways to trick Alice. Fig (2) A hierarchy of DNS servers contains the resource records that match names with addresses For example, suppose Trudy is able to crack the DNS system, maybe just the DNS cache at Alice's ISP, and replaces Bob's IP address (say, 36.1.2.3) with her (Trudy's) IP address (say, 42.9.9.9). That leads to the following attack. The way it is supposed to work is illustrated in Fig (3) (a). Here (1) Alice asks DNS for Bob's IP address, (2) gets it, (3) asks Bob for his home page, and (4) gets that, too. After Trudy has modified Bob's DNS record to contain her own IP address instead of Bob's, we get the situation of Fig (3) (b). Here, when Alice looks up Bob's IP address, she gets Trudy's, so all her traffic intended for Bob goes to Trudy. Trudy can now mount a man-in-the-middle attack without having to go to the trouble of tapping any phone lines. Instead, she has to break into a DNS server and change one record, a much easier proposition. 4

Fig (3) (a) Normal situation. (b) An attack based on breaking into DNS and modifying Bob's record. How might Trudy fool DNS? It turns out to be relatively easy. Briefly summarized, Trudy can trick the DNS server at Alice's ISP into sending out a query to look up Bob's address. Unfortunately, since DNS uses UDP, the DNS server has no real way of checking who supplied the answer. Trudy can exploit this property by forging the expected reply and thus injecting a false IP address into the DNS server's cache. For simplicity, we will assume that Alice's ISP does not initially have an entry for Bob's Web site, bob.com. If it does, Trudy can wait until it times out and try later (or use other tricks). Trudy starts the attack by sending a lookup request to Alice's ISP asking for the IP address of bob.com. Since there is no entry for this DNS name, the cache server queries the top-level server for the com domain to get one. However, Trudy beats the com server and sends back a false reply saying: ''bob.com is 42.9.9.9,'' where that IP address is hers. If her false reply gets back to Alice's ISP first, that one will be cached and the real reply will be rejected as an unsolicited reply to a query no longer outstanding. Tricking a DNS server into installing a false IP address is called DNS spoofing. A cache that holds an intentionally false IP address like this is called a poisoned cache. References: 1. Computer Networks, 4 th edition, Andrew S. Tanenbaum. 2. Data Communications and Networking, 4 th edition, Behrouz A. Forouzan. 3. Using Information Technology, 9 th edition, Brian K. Williams and Stacey C. Sawyer. 5