Khan, Muhammad US, Bukhari, Syed MAH, Maqsood, Tahir, Fayyaz, Muhammad AB, Dancey, Darren and Nawaz, Raheel ORCID: https://orcid.org/0000-0001-9588-0052 (2022) SCNN-Attack: A Side-Channel Attack to Identify YouTube Videos in a VPN and Non-VPN Network Traffic. Electronics (Basel), 11 (3). p. 350. ISSN 2079-9292
|
Published Version
Available under License Creative Commons Attribution. Download (3MB) | Preview |
Abstract
Encryption Protocols e.g., HTTPS is utilized to secure the traffic between servers and clients for YouTube and other video streaming services, and to further secure the communication, VPNs are used. However, these protocols are not sufficient to hide the identity of the videos from someone who can sniff the network traffic. The present work explores the methodologies and features to identify the videos in a VPN and non-VPN network traffic. To identify such videos, a side-channel attack using a Sequential Convolution Neural Network is proposed. The results demonstrate that a sequence of bytes per second from even one-minute sniffing of network traffic is sufficient to predict the video with high accuracy. The accuracy is increased to 90% accuracy in the non-VPN, 66% accuracy in the VPN, and 77% in the mixed VPN and non-VPN traffic, for models with two-minute sniffing.
Impact and Reach
Statistics
Additional statistics for this dataset are available via IRStats2.