Inferring ADU Combinations from Encrypted QUIC Stream

Video traffic has experienced rapid growth in the past and will continue to grow rapidly. It is an essential issue to monitor video streaming for both network management and network security. With the popularity of encrypted video, most of the analysis methods are based on the extraction of application data units (ADUs) from an encrypted stream. However, that QUIC streaming use multiplexing makes it impossible to extract ADU from encrypted QUIC streaming. In an effort to overcome this challenge, we proposed a method to extract application data unit combination (ADUC) from encrypted QUIC streaming instead. Taking YouTube video streaming as an example, several stream features are defined. These features are used to develop machine learning models for classifying the ADUC types in the encrypted YouTube QUIC video streaming. The feasibility and accuracy of the method are validated by the actual encrypted YouTube QUIC video streams. Our proposed method represents an initial step towards the analysis of encrypted QUIC streaming.

[1]  Hua Wu,et al.  Towards QoE assessment of encrypted YouTube adaptive video streaming in mobile networks , 2016, 2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS).

[2]  Lea Skorin-Kapov,et al.  A machine learning approach to classifying YouTube QoE based on encrypted network traffic , 2017, Multimedia Tools and Applications.

[3]  Zubair Shafiq,et al.  Real-time Video Quality of Experience Monitoring for HTTPS and QUIC , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[4]  Ian Swett,et al.  QUIC Loss Recovery And Congestion Control , 2015 .

[5]  Andrew Reed,et al.  Identifying HTTPS-Protected Netflix Videos in Real-Time , 2017, CODASPY.

[6]  Kamakoti Veezhinathan,et al.  White Mirror: Leaking Sensitive Information from Interactive Netflix Movies using Encrypted Traffic Analysis , 2019, SIGCOMM Posters and Demos.

[7]  Fan Yang,et al.  The QUIC Transport Protocol: Design and Internet-Scale Deployment , 2017, SIGCOMM.

[8]  Kevin Jeffay,et al.  Passive, Streaming Inference of TCP Connection Structure for Network Server Management , 2009, TMA.

[9]  Jiliang Wang,et al.  Walls Have Ears: Traffic-based Side-channel Attack in Video Streaming , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[10]  Steven Bohez,et al.  Fingerprinting encrypted network traffic types using machine learning , 2018, NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.

[11]  Konstantina Papagiannaki,et al.  Measuring Video QoE from Encrypted Traffic , 2016, Internet Measurement Conference.

[12]  Vitaly Shmatikov,et al.  Beauty and the Burst: Remote Identification of Encrypted Video Streams , 2017, USENIX Security Symposium.

[13]  Lea Skorin-Kapov,et al.  Towards a Framework for Classifying YouTube QoE Based on Monitoring of Encrypted Traffic , 2017 .

[14]  Feng Li,et al.  Silhouette: Identifying YouTube Video Flows from Encrypted Traffic , 2018, NOSSDAV.