Explainable YouTube Video Identification Using Sufficient Input Subsets

Neural network models are black boxes in nature. The mechanics behind these black boxes are practically unexplainable. Having the insight into patterns identified by these algorithms can help unravel important properties of the subject in query. These artificial intelligence based algorithms are used in every domain for prediction. This research focuses on patterns formed in network traffic that can be leveraged to identify videos streaming over the network. The proposed work uses a sufficient input subset (SIS) model on two separate video identification techniques to understand and explain the patterns detected by the techniques. The first technique creates the fingerprints of videos on a period-based algorithm to handle variable bitrate inconsistencies. These fingerprints are passed to a convolutional Neural Network (CNN) for pattern recognition. The second technique is based on traffic pattern plot identification that creates a graph of packet size with respect to time for each stream before passing that to a CNN as an image. For model explainability, a sufficient input subset (SIS) model is used to identify features that are sufficient to reach the same prediction under a certain threshold of confidence by the model. The generated SIS of each input sample is clustered using DBSCAN, K-Means, and cosine-based Hierarchical clustering. The clustered SIS highlight the common patterns for each class. The SIS patterns learnt by each model of three individual videos are discussed. Furthermore, these patterns are used to investigate misclassification and provide a rationale behind it to justify the working of the classifier model.

[1]  Kamlesh Tiwari,et al.  Post Quantum Cryptography: Techniques, Challenges, Standardization, and Directions for Future Research , 2022, ArXiv.

[2]  Muhammad U. S. Khan,et al.  ISP can identify YouTube videos that you just watched , 2021, 2021 International Conference on Frontiers of Information Technology (FIT).

[3]  Assad Abbas,et al.  HateClassify: A Service Framework for Hate Speech Identification on Social Media , 2021, IEEE Internet Computing.

[4]  Anna Visvizi,et al.  Deep Learning-based Extraction of Algorithmic Metadata in Full-Text Scholarly Documents , 2020, Inf. Process. Manag..

[5]  Ahmad Karim,et al.  Malware Classification Framework using Convolutional Neural Network , 2020, 2020 International Conference on Cyber Warfare and Security (ICCWS).

[6]  Rao Muhammad Adeel Nawab,et al.  Deep sentiments in Roman Urdu text using Recurrent Convolutional Neural Network model , 2020, Inf. Process. Manag..

[7]  Yong Sun,et al.  ITP-KNN: Encrypted Video Flow Identification Based on the Intermittent Traffic Pattern of Video and K-Nearest Neighbors Classification , 2020, ICCS.

[8]  Siddhartha Jain,et al.  Overinterpretation reveals image classification model pathologies , 2020, NeurIPS.

[9]  Mazhar Ali,et al.  Bot detection using a single post on social media , 2019, 2019 Third World Conference on Smart Trends in Systems Security and Sustainablity (WorldS4).

[10]  Michael Seufert,et al.  Let me Decrypt your Beauty: Real-time Prediction of Video Resolution and Bitrate for Encrypted Video Streaming , 2019, 2019 Network Traffic Measurement and Analysis Conference (TMA).

[11]  Ran Dubin,et al.  Clustering the Unknown - The Youtube Case , 2019, 2019 International Conference on Computing, Networking and Communications (ICNC).

[12]  Jonas Mueller,et al.  What made you do this? Understanding black-box decisions with sufficient input subsets , 2018, AISTATS.

[13]  Samee Ullah Khan,et al.  Convolutional Neural Networks as Means to Identify Apposite Sensor Combination for Human Activity Recognition , 2018, 2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE).

[14]  Jiliang Wang,et al.  Walls Have Ears: Traffic-based Side-channel Attack in Video Streaming , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[15]  Bin Yu,et al.  Beyond Word Importance: Contextual Decomposition to Extract Interactions from LSTMs , 2018, ICLR.

[16]  Vitaly Shmatikov,et al.  Beauty and the Burst: Remote Identification of Encrypted Video Streams , 2017, USENIX Security Symposium.

[17]  May D. Wang,et al.  Interpretable Predictions of Clinical Outcomes with An Attention-based Recurrent Neural Network , 2017, BCB.

[18]  Kristof T. Schütt,et al.  Learning how to explain neural networks: PatternNet and PatternAttribution , 2017, ICLR.

[19]  Avanti Shrikumar,et al.  Learning Important Features Through Propagating Activation Differences , 2017, ICML.

[20]  Andrew Reed,et al.  Identifying HTTPS-Protected Netflix Videos in Real-Time , 2017, CODASPY.

[21]  Ankur Taly,et al.  Axiomatic Attribution for Deep Networks , 2017, ICML.

[22]  Jure Leskovec,et al.  Human Decisions and Machine Predictions , 2017, The quarterly journal of economics.

[23]  A. Rama Mohan Reddy,et al.  A fast DBSCAN clustering algorithm by accelerating neighbor searching using Groups method , 2016, Pattern Recognit..

[24]  Regina Barzilay,et al.  Rationalizing Neural Predictions , 2016, EMNLP.

[25]  Karol J. Piczak Environmental sound classification with convolutional neural networks , 2015, 2015 IEEE 25th International Workshop on Machine Learning for Signal Processing (MLSP).

[26]  Alexander Binder,et al.  On Pixel-Wise Explanations for Non-Linear Classifier Decisions by Layer-Wise Relevance Propagation , 2015, PloS one.

[27]  Andrew Zisserman,et al.  Deep Inside Convolutional Networks: Visualising Image Classification Models and Saliency Maps , 2013, ICLR.

[28]  Rob Fergus,et al.  Visualizing and Understanding Convolutional Networks , 2013, ECCV.

[29]  Motoaki Kawanabe,et al.  How to Explain Individual Classification Decisions , 2009, J. Mach. Learn. Res..

[30]  D. Pham,et al.  Selection of K in K-means clustering , 2005 .

[31]  Waleed S. Afandi,et al.  Fingerprinting Technique for YouTube Videos Identification in Network Traffic , 2022, IEEE Access.

[32]  Guigang Zhang,et al.  Deep Learning , 2016, Int. J. Semantic Comput..

[33]  I. S. Sitanggang,et al.  Determination of Optimal Epsilon (Eps) Value on DBSCAN Algorithm to Clustering Data on Peatland Hotspots in Sumatra , 2016 .

[34]  Shawn McCann,et al.  Object Detection using Convolutional Neural Networks , 2013 .

[35]  K. Sree,et al.  CLUSTERING BASED ON COSINE SIMILARITY MEASURE , 2012 .

[36]  Nizar Grira,et al.  Unsupervised and Semi-supervised Clustering : a Brief Survey ∗ , 2004 .

[37]  Marco Tulio Ribeiro,et al.  “Why Should I Trust You?”: Explaining the Predictions of Any Classifier , 2016, NAACL.