Encrypted Video Traffic Clustering Demystified

Dvir, Amit and Marnerides, Angelos and Dubin, Ran and Golan, Nehor and Hajaj, Chen (2020) Encrypted Video Traffic Clustering Demystified. Computers and Security. ISSN 0167-4048

[img]
Text (Elsevier_C&S_accepted)
Elsevier_C_S_accepted.pdf - Accepted Version
Restricted to Repository staff only until 31 May 2021.
Available under License Creative Commons Attribution-NonCommercial-NoDerivs.

Download (460kB)

Abstract

Cyber threat intelligence officers and forensics investigators often require the behavioural profiling of groups based on their online video viewing activity. It has been demonstrated that encrypted video traffic can be classified under the assumption of using a known subset of video titles based on temporal video viewing trends of particular groups. Nonetheless, composing such a subset is extremely challenging in real situations. Therefore, this work exhibits a novel profiling scheme for encrypted video traffic with no a priori assumption of a known subset of titles. It introduces a seminal synergy of Natural Language Processing (NLP) and Deep Encoder-based feature embedding algorithms with refined clustering schemes from off-the-shelf solutions, in order to group viewing profiles with unknown video streams. This study is the first to highlight the most computationally effective, accurate combinations of feature embedding and clustering using real datasets, thereby, paving the way to future forensics tools for automated behavioral profiling of malicious actors.

Item Type:
Journal Article
Journal or Publication Title:
Computers and Security
Additional Information:
This is the author’s version of a work that was accepted for publication in Computers and Security. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Computers and Security, ?, ?, 2020 DOI: 10.1016/j.cose.2020.101917
Uncontrolled Keywords:
/dk/atira/pure/subjectarea/asjc/1700
Subjects:
ID Code:
144566
Deposited By:
Deposited On:
11 Jun 2020 08:58
Refereed?:
Yes
Published?:
Published
Last Modified:
17 Aug 2020 08:05