User Behavior Classification in Encrypted Cloud Camera Traffic

Home surveillance cameras have been widely used in recent years, however, what comes next is the increasing events of users' privacy disclosure. Most cameras use video compression technologies such as H.26X and MPEG to reduce the stream size during transmission on the purpose to transfer higher definition(HD) video with limited bandwidth. Although traffic is encrypted, these video differential encoding techniques can cause traffic patterns to change as users' behavior changes. Therefore, it is very meaningful to mine user privacy behavior hidden behind the surveillance traffic based on traffic statistical features. In this paper, we collected a large amount of surveillance video traffic, including 9 kinds of daily life behaviors, such as watching TV, switching door, sweeping the floor, etc. According to frequency distribution sequences of packet length, probability transition matrix of packet length and other statistical features, we used a variety of models to classify users' daily life behaviors. The results show that the random forest classifier and the AlexNet classifier can achieve a macro-averaging F1-score of 97.23% and 97.89% respectively. The performance of our approach reveals that the users' daily routine can be accurately constructed only through video traffic, which is a potentially huge security issue for the users. Moreover, this work has important reference value for camera manufacturers to improve user privacy protection.

[1]  Kyoung-Don Kang,et al.  Cost-Effective Security Support in Real-Time Video Surveillance , 2015, IEEE Transactions on Industrial Informatics.

[2]  Jiguo Yu,et al.  Side-channel information leakage of encrypted video stream in video surveillance systems , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[3]  Wenyuan Xu,et al.  HomeSpy: Inferring User Presence via Encrypted Traffic of Home Surveillance Camera , 2017, 2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS).

[4]  Mahdi Jafari Siavoshani,et al.  Deep packet: a novel approach for encrypted traffic classification using deep learning , 2017, Soft Computing.

[5]  Andrew W. Moore,et al.  Discriminators for use in flow-based classification , 2013 .

[6]  Ali Fanian,et al.  Encrypted Traffic Classification Using Statistical Features , 2018 .

[7]  Ali Saman Tosun,et al.  Investigating Security and Privacy of a Cloud-Based Wireless IP Camera: NetCam , 2015, 2015 24th International Conference on Computer Communication and Networks (ICCCN).

[8]  Sebastian Zander,et al.  A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification , 2006, CCRV.

[9]  Ali A. Ghorbani,et al.  Characterization of Encrypted and VPN Traffic using Time-related Features , 2016, ICISSP.

[10]  Raheem A. Beyah,et al.  Information Leakage in Encrypted IP Video Traffic , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[11]  Ajay Luthra,et al.  Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..

[12]  Mingtian Zhou,et al.  Internet traffic classification using feed-forward neural network , 2011, 2011 International Conference on Computational Problem-Solving (ICCP).