DOI QR코드

DOI QR Code

Video Quality Representation Classification of Encrypted HTTP Adaptive Video Streaming

  • Dubin, Ran (Communication Systems Engineering, Ben-Gurion University of the Negev) ;
  • Hadar, Ofer (Communication Systems Engineering, Ben-Gurion University of the Negev) ;
  • Dvir, Amit (Center for Cyber Technologies, Department of Computer Science, Ariel University) ;
  • Pele, Ofir (Center for Cyber Technologies, Department of Computer Science, Ariel University)
  • Received : 2017.01.16
  • Accepted : 2018.03.14
  • Published : 2018.08.31

Abstract

The increasing popularity of HTTP adaptive video streaming services has dramatically increased bandwidth requirements on operator networks, which attempt to shape their traffic through Deep Packet inspection (DPI). However, Google and certain content providers have started to encrypt their video services. As a result, operators often encounter difficulties in shaping their encrypted video traffic via DPI. This highlights the need for new traffic classification methods for encrypted HTTP adaptive video streaming to enable smart traffic shaping. These new methods will have to effectively estimate the quality representation layer and playout buffer. We present a new machine learning method and show for the first time that video quality representation classification for (YouTube) encrypted HTTP adaptive streaming is possible. The crawler codes and the datasets are provided in [43,44,51]. An extensive empirical evaluation shows that our method is able to independently classify every video segment into one of the quality representation layers with 97% accuracy if the browser is Safari with a Flash Player and 77% accuracy if the browser is Chrome, Explorer, Firefox or Safari with an HTML5 player.

Keywords

References

  1. Cisco, "The zettabyte era: Trends and analysis," 2015.
  2. ISO, "Information technology -- Dynamic adaptive streaming over HTTP (DASH) -- Part 1: Media presentation description and segment formats," ISO/IEC 23009-1:2014, May 2014.
  3. M. Seufert, S. Egger, M. Slanina, T. Zinner, T. Hofeld, and P. Tran-Gia. "A survey on quality of experience of http adaptive streaming," IEEE Communication Surveys & Tutorials, Vol. 17, No. 1, pp. 469-492, 2015. https://doi.org/10.1109/COMST.2014.2360940
  4. C. Muller, S. Lederer, and C. Timmerer. "An evaluation of dynamic adaptive streaming over http in vehicular environments," in Proc. of the 4th Workshop on Mobile Video, pp. 37-42, NC, USA, Feb, 2012.
  5. T. HoBfeld, T. Zinner, P. Tran-Gia, and C. Timmerer, "Implementation and user-centric comparison of a novel adaptation logic for dash with SVC," in Proc. of IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 1318-1323, Ghent, Belgium, May, 2013.
  6. C. Muller and C. Timmerer, "A VLC media player plugin enabling dynamic adaptive streaming over HTTP," in Proc. of the 19th ACM international conference on Multimedia, pp. 723--726, AZ, USA, Nov. 2011.
  7. How-To Geek, Why YouTube in Chrome (and Firefox) is Draining Your Laptop's Battery and How to Fix It, 2016,
  8. I. Ben Mustafa and T. Nadeem, "Dynamic traffic shaping technique for http adaptive video streaming using software defined networks", in Proc. of Sensing, Communication, and Networking (SECON), pp. 178-180, Seattle, USA, June, 2015.
  9. Google, "Google webmaster central blog: HTTPS as a ranking signal," 2014.
  10. M. Belshe and R. Peon, "SPDY protocol," Internet-Draft draft-mbelshe-httpbis-spdy-00, IETF, Aug. 2012.
  11. M. Belshe, R. Peon and M. Thomson, "Hypertext Transfer Protocol Version 2," RFC 7540, IETF, 2015.
  12. V.K. Adhikari, S. Jain, and Z.L. Zhang, "YouTube traffic dynamics and its interplay with a Tier-1 ISP: An ISP perspective," in Proc of the 10th ACM SIGCOMM conference on Internet measurement, pp. 431-443, NEW Delhi, India, Aug. 2010.
  13. R. Torres, A. Finamore, J.R. Kim, M. Mellia, M.M. Munafo, and S. Rao, "Dissecting video server selection strategies in the YouTube CDN," in Proc. of Distributed Computing Systems (ICDCS), 2011, pp. 248--257, Minnesota, USA, June, 2011.
  14. A. Finamore, M. Mellia, M.M. Munafo, R. Torres, and S. Rao, "YouTube everywhere: Impact of device and infrastructure synergies on user experience," in Proc. of the ACM SIGCOMM conference on Internet measurement conference, pp. 345-360, ON, Canada, Aug. 2011.
  15. T HoBfeld, M Seufert, C Sieber, T Zinner, P Tran-Gia, "Identifying QoE optimal adaptation of HTTP adaptive streaming based on subjective studies," Computer Networks 81, 320-332.
  16. J. Anorga, S. Arrizabalaga, B. Sedano, M. Alonso-Arce, and Jaizki Mendizabal, "Youtubes dash implementation analysis," in Proc. of 19th International Conference on Circuits, Systems, Communications and Computers (CSCC), pp.61-66, Crete Island, Greece, July, 2015.
  17. G. Dimopoulos, "YouTube traffic monitoring and analysis," thesis, University of Catalonia
  18. M. Zink, K. Suh, Y. Gu, and J. Kurose, "Characteristics of YouTube network traffic at a campus network - measurements, models, and implications," Computer networks, vol. 53, no. 4, pp. 501-514, 2009. https://doi.org/10.1016/j.comnet.2008.09.022
  19. M. Cha, H. Kwak, P. Rodriguez, YY. Ahn, and S. Moon, "I tube, you tube, everybody tubes: Analyzing the worlds largest user generated content video system," in Proc. of the 7th ACM SIGCOMM conference on Internet measurement, pp. 1-14, Kyoto, Japans, Aug., 2007.
  20. X. Che, B. Ip, and L. Lin, "A survey of current YouTube video characteristics," IEEE MultiMedia, vol. 22, no. 2, pp.56-63, 2015. https://doi.org/10.1109/MMUL.2015.34
  21. S. Alcock and R. Nelson, "Application flow control in YouTube video streams," ACM SIGCOMM Computer Communication Review, vol. 41, no. 2, pp. 24-30, 2011. https://doi.org/10.1145/1971162.1971166
  22. A. Dainotti, A. Pescape, and K.C. Claffy, "Issues and future directions in traffic classification," IEEE Network, vol. 26, no. 1, pp. 35-40, 2012. https://doi.org/10.1109/MNET.2012.6135854
  23. S. Valenti, D. Rossi, A. Dainotti, A. Pescape, A. Finamore, and M. Mellia, "Reviewing traffic classification," Data Traffic Monitoring and Analysis, pp. 123-147, Editors: Biersack, Ernst, Callegari, Christian, Matijasevic, Maja 2013.
  24. Z. Cao, G. Xiong, Y. Zhao, Z. Li, and L. Guo, "A survey on encrypted traffic classification," in Proc. of Int. Conf. on Applications and Techniques in Information Security, pp. 73-81, Melbourne, Australia, Nov., 2014.
  25. V. Paxson, "Empirically derived analytic models of wide-area TCP connections," IEEE/ACM Transactions on Networking (TON), vol. 2, no. 4, pp. 316- 336, 1994. https://doi.org/10.1109/90.330413
  26. R. Alshammari and A.N. Zincir-Heywood, "Unveiling Skype encrypted tunnels using gp," in Proc. of IEEE Congress on Evolutionary Computation, pp. 1-8, Barcelona, Spain, July, 2010.
  27. S. Zander, T. Nguyen, and G. Armitage, "Self-learning IP traffic classification based on statistical flow characteristics," in Proc. of International Workshop on Passive and Active Network Measurement, pp. 325- 328, MA, USA, Mar., 2005.
  28. D. Zhang, C. Zheng, H. Zhang, and H. Yu, "Identification and analysis of skype peer-to-peer traffic," in Proc. Of Internet and Web Applications and Services (ICIW), pp. 200-206, Barcelona, Spain, May, 2010.
  29. I. Paredes-Oliva, I. Castell-Uroz, P. Barlet-Ros, X. Dimitropoulos, and J. Sole-Pareta, "Practical anomaly detection based on classifying frequent traffic patterns," INFOCOM WKSHPS, pp. 54-59, Orlando, FL, Mar., 2012.
  30. D. Bonfiglio, M. Mellia, M. Meo, and D. Rossi, "Detailed analysis of Skype traffic," IEEE Transactions on Multimedia, vol. 11, no. 1, pp.117-127, 2009. https://doi.org/10.1109/TMM.2008.2008927
  31. K.T. Chen, C.Y. Huang, P. Huang, and C.L. Lei, "Quantifying skype user satisfaction," ACM SIGCOMM Computer Communication Review, vol. 36, no. 4, pp. 399-410, 2006. https://doi.org/10.1145/1151659.1159959
  32. E. Hjelmvik and W. John, "Statistical protocol identification with SPID: Preliminary results," in Proc. of Swedish National Computer Networking Workshop, pp.399-410, Uppsala, Swedish, May, 2009.
  33. R. Bar-Yanai, M. Langberg, D. Peleg, and L. Roditty, "Realtime classification for encrypted traffic," in Proc. of International Symposium on Experimental Algorithms, pp. 373-385, Napoli, Italy, May, 2010.
  34. A.M. White, A.R. Matthews, K.Z. Snow, and F. Monrose," Phonotactic reconstruction of encrypted VoIP conversations: Hookt on fon-iks," in Proc. of IEEE Symposium on Security and Privacy, pp. 3-18, California, USA, May, 2011.
  35. C.V. Wright, L. Ballard, F. Monrose, and G.M. Masson, "Language identification of encrypted VOIP traffic: Alejandra y roberto or alice and bob?" USENIX Security, pp. 43-54, MA, USA, Aug., 2007.
  36. R. Dubin, O. Hadar, I. Richman, O. Trabelsi, A. Dvir, and O. Pele, "Video quality representation classification of Safari encrypted DASH streams," in Proc. of Digital Media Industry \& Academic Forum (DMIAF), pp. 213-216, Santorini, Greece, June, 2016.
  37. P. Fu, L. Guo, G. Xiong, and J. Meng, "Classification research on SSL encrypted application," in Proc. of International Conference on Trustworthy Computing and Services, pp. 404-411, Beijing, China, Nov., 2013.
  38. G. Lu Sun, Y. Xue, Y. Dong, D. Wang, and C. Li, "An novel hybrid method for effectively classifying encrypted traffic," in Proc. of Global Telecommunications Conference (GLOBECOM), pp. 1-5, Florida, USA, Dec.,
  39. R. Dubin, O. Hadar, A. Noam, and R. Ohayon, "Progressive download video rate traffic shaping using TCP window and deep packet inspection," WORLDCOMP, pp. 10-17, Nevada, USA, July, 2012.
  40. P. Ameigeiras, J.J. Ramos-Muoz, J. Navarro-Ortiz, and J.M. Lpez-Soler, "Analysis and modelling of YouTube traffic," Transactions on Emerging Telecommunications Technologies, vol. 23, no. 4, pp. 360-370, 2012. https://doi.org/10.1002/ett.2546
  41. A. Rao, A. Legout, Y.S. Lim, D. Towsley, C. Barakat, and W. Dabbous, "Network characteristics of video streaming traffic," in Proc. of the Seventh Conference on emerging Networking EXperiments and Technologies (CONEXT), pp. 1-12, Tokyo, Japan, Dec., 2011.
  42. R. Dubin, A. Dvir, O. Pele, and O. Hadar, "I know what you saw last minute - the chrome browser case," BlackHat, London, Nov., 2016.
  43. The Crawler Code of the Codebook Algorithm and the Safari Dataset.
  44. HTML5 Browsers Dataset and Video Information.
  45. D. Arthur and S. Vassilvitskii, "k-means++: The advantages of careful seeding," in Proc. of Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms, pp. 1027-1035, Louisiana, USA, Jan., 2007.
  46. A. Shimoni and S. Barhom. "Malicious traffic detection using traffic fingerprint,"
  47. Selenium, Accessed: 2016-02-28.
  48. J. Muehlstein, Y. Zion, M. Bahumi, I. Kirshenboim, R. Dubin, A. Dvir, O. Pele. "Analyzing HTTPS Encrypted Traffic to Identify User Operating System, Browser and Application," CCNC 2016.
  49. Wireshark,
  50. Clumsy network controller, version 0.2,
  51. The HTML5 Crawler Code, =0
  52. D. Rodriguez, Z. Wang, R. Rosa, and G. Bressan, "The impact of video-quality-level switching on user quality of experience in dynamic adaptive streaming over HTTP," EURASIP Journal on Wireless Communications and Networking, vol. 216, no. 1, pp. 1-15, Dec. 2014.
  53. C. Chen, L. Choi, G. de Veciana, C. Caramanis, R. Heath, and A. Bovik, "Modeling the time-varying subjective quality of HTTP video streams with rate adaptations," IEEE Transactions on Image Processing, vol. 23, no.5, pp. 2206-2221, May 2014. https://doi.org/10.1109/TIP.2014.2312613
  54. R. Dubin, A. Dvir, O. Pele, O. Hadar, I. Katz, O. Mashiach, "Adaptation Logic for HTTP Dynamic Adaptive Streaming using Geo-Predictive Crowdsourcing," Multimedia Systems, pp. 1-13, Feb, 2016.
  55. R. Kohavi, "A study of cross-validation and bootstrap for accuracy estimation and model selection," in Proc. of Proceedings of the 14th international joint conference on Artificial intelligence (IJCAI), pp. 1137-1143, Quebec, Canada, Aug., 1995.
  56. J. Friedman, T. Hastie, and R. Tibshirani, "The elements of statistical learning," Springer Series in Statistics, Springer, 2001.
  57. D. C. Robinson, Y. Jutras, and V. Craciun, "Subjective video quality assessment of HTTP adaptive streaming technologies," Bell Lab. Tech. J., vol 16, Num 4, pp. 5-23, March 2012. https://doi.org/10.1002/bltj.20531