Abstract
With the increase in the sum of online video viewers on the internet every day, the video service providers are getting interested to know about the nature of the content being viewed through the supplied network in order to accomplish their business associated objectives that may include the user’s internet behavior profile, etc. Due to the widespread use of encoded video streaming techniques, the network video traffic classification has turned out to be a challenging task. As devoid of the authentic decryption key, it is impossible to comprehend the actual content viewed by the user. However, the current advances in machine learning have demonstrated the fact that encryption can also lead to certain information leak which yields promising results in determining the actual transmitted content between the two communicating parties. This research proposes a classifier for determining the encrypted video content over different streaming sites such as YouTube, Netflix and Dailymotion. We demonstrated that an eavesdropper can determine the stream video content even if the traffic is encrypted by identifiable patterns extracted from the captured traffic. We used different machine algorithms for the task and conducted a series of tests, demonstrating that our classification based on Random Forest showed accuracy greater than 98% and has the ability to execute all the network-related business objectives of any enterprise network.











Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Soni M, Rajput BS (2021) Security and Performance Evaluations of QUIC Protocol. In Data Science and Intelligent Applications, Springer, Singapore, pp 457–462
Gärdborn P (2020) Is QUIC a Better Choice than TCP in the 5G Core Network Service Based Architecture?
Nalawade O, Dhanwani A, Prabhu T (2018) Comparison of Present-day Transport Layer network Protocols and Google’s QUIC. In: 2018 International Conference on Smart City and Emerging Technology, (pp. 1-8). IEEE
Akbari I, Salahuddin MA, Ven L, Limam N, Boutaba R, Mathieu B, Tuffin S (2021) A look behind the curtain: traffic classification in an increasingly encrypted web. Proc ACM Meas Anal Comput Syst 5(1):1–26
Shi C, Bhargava B (1998, October) An efficient MPEG video encryption algorithm. In: Proceedings seventeenth IEEE symposium on reliable distributed systems, (pp. 381–386). IEEE
Stockhammer T (2011, February) Dynamic adaptive streaming over HTTP– standards and design principles. In: Proceedings of the second annual ACM conference on Multimedia systems, (pp. 133–144)
Sodagar I (2011) The mpeg-dash standard for multimedia streaming over the internet. IEEE multimedia 18(4):62–67
Gu J, Wang J, Yu Z, Shen K (2018, April) Walls have ears: Traffic-based side-channel attack in video streaming. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications, (pp. 1538–1546). IEEE
Li F, Chung J W, Claypool M (2018, June) Silhouette: Identifying youtube video flows from encrypted traffic. In: Proceedings of the 28th ACM SIGMM Workshop on Network and Operating Systems Support for Digital Audio and Video, (pp. 19–24)
Andersson R (2017) Classification of video traffic: an evaluation of video traffic classification using random forests and gradient boosted trees
Liu Y, Li S, Zhang C, Zheng C, Sun Y, Liu Q (2020, June) Itp-knn: Encrypted video flow identification based on the intermittent traffic pattern of video and k-nearest neighbors classification. In International Conference on Computational Science, (pp. 279–293). Springer, Cham
Rasteh A, Delpech F, Aguilar-Melchor C, Zimmer R, Shouraki S B, Masquelier T (2021) Encrypted Internet traffic classification using a supervised Spiking Neural Network. arXiv preprint arXiv:2101.09818
Wassermann S, Seufert M, Casas P, Gang L, Li K (2019, June) Let me decrypt your beauty: Real-time prediction of video resolution and bitrate for encrypted video streaming. In: 2019 Network Traffic Measurement and Analysis Conference, (TMA) (pp. 199–200). IEEE
Seufert M, Wassermann S, Casas P (2019) Considering user behavior in the quality of experience cycle: towards proactive QoE-aware traffic management. IEEE Commun Lett 23(7):1145–1148
Kumar PA, Chandramathi S (2015) Intelligent video QoE prediction model for error-prone networks. Indian J Sci Technol 8(16):1
Morshedi M, Noll J (2021) Estimating PQoS of video streaming on Wi-Fi networks using machine learning. Sensors 21(2):621
Shi Y, Ross A, Biswas S (2018) Source identification of encrypted video traffic in the presence of heterogeneous network traffic. Comput Commun 129:101–110
Shi Y, Feng D, Cheng Y, Biswas S (2021) A natural language-inspired multilabel video streaming source identification method based on deep neural networks. Signal, Image and Video Processing, pp 1–8
Michie D, Spiegelhalter DJ, Taylor C C (1994) Machine learning, neural and statistical classification
Burkart N, Huber MF (2021) A survey on the explainability of supervised machine learning. J Artif Intell Res 70:245–317
Kotsiantis SB, Zaharakis I, Pintelas P (2007) Supervised machine learning: a review of classification techniques. Emerg Artif Intell Appl Comput Eng 160(1):3–24
Osisanwo FY, Akinsola JET, Awodele O, Hinmikaiye JO, Olakanmi O, Akinjobi J (2017) Supervised machine learning algorithms: classification and comparison. Int J Comput Trends Technol (IJCTT) 48(3):128–138
Papadamou K, Papasavva A, Zannettou S, Blackburn J, Kourtellis N, Leontiadis I, Sirivianos M (2020, May) Disturbed YouTube for kids: Characterizing and detecting inappropriate videos targeting young children. In: Proceedings of the international AAAI conference on web and social media, (Vol. 14, pp. 522–533)
Vishwakarma G, Thakur GS (2019) Comparative performance analysis of combined SVM-PCA for content-based video classification by utilizing inception V3. Int J Emerg Technol 10(3):397–403
Kandakatla R (2016) Identifying offensive videos on YouTube
Dubin R, Dvir A, Hadar O, Pele O (2016) I know what you saw last minute-the chrome browser case. Black Hat Europe
Dubin R, Dvir A, Pele O, Hadar O (2017) I know what you saw last minute-encrypted http adaptive video streaming title classification. IEEE Trans Inf Forensics Secur 12(12):3039–3049
Schuster R, Shmatikov V, Tromer E (2017) Beauty and the burst: Remote identification of encrypted video streams. In: 26th USENIX Security Symposium, (pp. 1357–1374)
O’Shea K, Nash R (2015) An introduction to convolutional neural networks. arXiv preprint arXiv:1511.08458
Reed A, Kranch M (2017, March) Identifying https-protected netflix videos in real-time. In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, (pp. 361–368)
Li Y, Huang Y, Xu R, Seneviratne S, Thilakarathna K, Cheng A, ... Jourjon G (2018, November) Deep content: unveiling video streaming content from encrypted WiFi traffic. In: 2018 IEEE 17th International Symposium on Network Computing and Applications, (pp. 1–8). IEEE
Dvir A, Marnerides A K, Dubin R, Golan N (2019, February) Clustering the Unknown-The Youtube Case. In: 2019 International Conference on Computing, Networking and Communications, (pp. 402–407). IEEE
Ding C, He X (2004, July) K-means clustering via principal component analysis. In: Proceedings of the twenty-first international conference on Machine learning, (p. 29)
Nadkarni PM, Ohno-Machado L, Chapman WW (2011) Natural language processing: an introduction. J Am Med Inf Assoc 18(5):544–551
Cincotta Pablo M, Giordano Claudia M, Silva Raphael Alves, Beaugé Cristián (2021) The Shannon entropy: an efficient indicator of dynamical stability. Phys D: Nonlinear Phenom 417:132816
Catt E, Norrish M (2021, January) On the formalisation of Kolmogorov complexity. In: Proceedings of the 10th ACM SIGPLAN International Conference on Certified Programs and Proofs, (pp. 291–299)
Blum AL, Langley P (1997) Selection of relevant features and examples in machine learning. Artif Intell 97(1–2):245–271
Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Duchesnay E (2011) Scikit-learn: machine learning in python. J mach Learn Res 12:2825–2830
Tebaa M, El Hajji S, El Ghazi A (2012, April) Homomorphic encryption method applied to Cloud Computing. In: 2012 National Days of Network Security and Systems, (pp. 86–89). IEEE
Xin D, Ji J, Jing F, Gao M. Xue B (2021) Efficient Fully homomorphic encryption scheme using Ring-LWE. In: Journal of Physics: Conference Series, (Vol. 1738, No. 1, p. 012105). IOP Publishing
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Amjad, F., Khan, F., Tahir, S. et al. ENCVIDC: an innovative approach for encoded video content classification. Neural Comput & Applic 34, 18685–18702 (2022). https://doi.org/10.1007/s00521-022-07480-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-022-07480-2