Carnegie Mellon University
Browse
TaskerFernandes_cmu_0041O_11172.pdf (768.58 kB)

Side Channel Analysis of Encrypted Video Streaming Traffic

Download (768.58 kB)
thesis
posted on 2024-05-24, 18:55 authored by Madeline E. Tasker-Fernandes

 Network encryption can protect its user’s privacy and identity, but encrypted traffic is still vulnerable to side-channel attacks. A VPN or TOR can provide added layers of protection, but leaking information through side-channel analysis is still possible even with these protections. Side-channel attacks can lead to private or confidential information being revealed. Dynamic Adaptive Streaming over HTTPS is one example of a protocol that is vulnerable to side-channel attacks. This paper examines two machine-learning models for identifying encrypted videos streamed using DASH. The models include a convolutional neural network and a random forest classifier. Different features and capture lengths were examined and compared for each machine-learning model. The video traffic includes videos streamed using SSL/TLS, VPN, and TOR connections. Different resolutions (240p, 360p, 540p, and auto) were used when streaming the videos and collecting the traffic data. The data was divided into two categories: TOR only and mixed data (mix of SSL/TLS, VPN, and TOR). Each method has different benefits and trade-offs, including accuracy, scalability, and complexity. By achieving an accuracy of over 90% in some test cases, these methods demonstrate a vulnerability in the DASH protocol that allows videos to be uniquely identified from encrypted traffic. 

History

Date

2024-05-02

Degree Type

  • Master's Thesis

Department

  • Information Networking Institute

Degree Name

  • Master of Science (MS)

Advisor(s)

Patrick Tague

Usage metrics

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC