CFP last date
20 January 2025
Reseach Article

Detection for Trusted Content Delivery Networks Traffic by Pattern-based Content Leakage

Published on June 2016 by Madhavi R. Suryawanshi, Sarita A. Patil
National Conference on Advances in Computing, Communication and Networking
Foundation of Computer Science USA
ACCNET2016 - Number 5
June 2016
Authors: Madhavi R. Suryawanshi, Sarita A. Patil
7756c14e-5878-4d23-8300-096ebffcdfaf

Madhavi R. Suryawanshi, Sarita A. Patil . Detection for Trusted Content Delivery Networks Traffic by Pattern-based Content Leakage. National Conference on Advances in Computing, Communication and Networking. ACCNET2016, 5 (June 2016), 4-8.

@article{
author = { Madhavi R. Suryawanshi, Sarita A. Patil },
title = { Detection for Trusted Content Delivery Networks Traffic by Pattern-based Content Leakage },
journal = { National Conference on Advances in Computing, Communication and Networking },
issue_date = { June 2016 },
volume = { ACCNET2016 },
number = { 5 },
month = { June },
year = { 2016 },
issn = 0975-8887,
pages = { 4-8 },
numpages = 5,
url = { /proceedings/accnet2016/number5/24996-2286/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advances in Computing, Communication and Networking
%A Madhavi R. Suryawanshi
%A Sarita A. Patil
%T Detection for Trusted Content Delivery Networks Traffic by Pattern-based Content Leakage
%J National Conference on Advances in Computing, Communication and Networking
%@ 0975-8887
%V ACCNET2016
%N 5
%P 4-8
%D 2016
%I International Journal of Computer Applications
Abstract

Due to growing reputation of multimedia systems surging applications and solutions nowadays, the issue of trusted online video supply in order to avoid undesired content leakage possesses, certainly, become essential. Even though keeping user comfort, standard systems get tackled this challenge by simply proposing methods in line with the observation of streamed traffic through the circle. Most of these standard systems keep a high prognosis precision though dealing with a few of the traffic variance inside circle (e. g. ,circle hold up and bundle loss), nonetheless, the prognosis overall performance drastically degrades as a result of the particular significant variance of online video programs. Within this papers, all concentrate on defeating this challenge by simply proposing any fresh content-leakage prognosis program which is effective towards variance in the online video size. Through researching videos of diverse programs, all ascertain any regards between the duration of videos to get in comparison and the particular likeness between your in comparison videos. Consequently, enhance the prognosis overall performance in the suggested program also in the natural environment the subject of variance in length of online video. Via a test bed try, the potency of your suggested program is considered with regard to variance of online video size, hold up variance, and bundle damage.

References
  1. XiaokuiShu, Danfeng Yao, Member, and Elisa Bertino, ``Privacy-Preserving Detection of Sensitive Data Exposure", In IEEE transactions on information forensics and security, vol. 10, no. 5, May 2015.
  2. K. Borders and A. Parkas, "Quantifying information leaks in outbound web traffic," in Proc. 30th IEEE Sump. Secure. Privacy, May 2009, pp. 129-140.
  3. H. Yin, D. Song, M. Agile, C. Kruegel, and E. Kirda, "Panorama: Capturing system wide information flow for malware detection and analysis," in Proc. 14th ACM Conf. Compute. Commun. Secur. , 2007,pp. 116-127.
  4. K. Borders, E. V. Weele, B. Lau, and A. Prakash, "Protecting confidential data on personal computers with storage capsules," in Proc. 18th USENIX Secur. Symp. , 2009, pp. 367-382.
  5. A. Nadkarni and W. Neck, "Preventing accidental data disclosure in modern operating systems," in Proc. 20th ACM Conf. Compute. Commun. Secur. , 2013, pp. 1029-1042.
  6. Shengbao Wang, Zhenfu Cao, Maurizio Adriano Strangio and Lihua Wang, `` Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol", In IEEE Transaction on December 14, 2007.
  7. S. Jha, L. Kruger, and V. Shmatikov, "Towards practical privacy for genomic computation," in Proc. 29th IEEE Symp. Secur. Privacy, May 2008, pp. 216–230.
  8. Y. Chu, S. G. Rao, S. Seshan, and H. Zhang, "EnablingConferencing Applications on the Internet Using an OverlayMulticast Architecture," Proc. ACM SIGCOMM, pp. 55-67,Aug. 2001.
  9. Z. Yang, H. Ma, and J. Zhang, "A Dynamic Scalable Service Modelfor SIP-Based Video Conference," Proc. Ninth Int'l Conf. ComputerSupported Cooperative Work in DE, pp. 594-599, May 2005.
  10. Y. Chu, S. G. Rao, S. Seshan, and H. Zhang, "Enabling ConferencingApplications on the Internet Using an Overlay MulticastArchitecture," Proc. ACM SIGCOMM, pp. 55-67, Aug. 2001.
  11. O. Adeyinka, "Analysis of IPSec VPNs Performance in a MultimediaEnvironment," Proc. Fourth Int'l Conf. Intelligent Environments,pp. 25-30, 2008.
  12. E. I. Lin, A. M. Eskicioglu, R. L. Lagendijk, and E. J. Delp, "Advancesin Digital Video Content Protection," Proc. IEEE, vol. 93, no. 1,pp. 171-183, Jan. 2005.
  13. S. Craver, N. Memon, B. L. Yeo, and M. M. Yeung, "ResolvingRightful Ownerships with Invisible Watermarking Techniques:Limitations, Attacks, and Implications," IEEE J. Selected AreasComm. , vol. 16, no. 4, pp. 573-586, May 1998.
  14. K. Xu, D. Yao, Q. Ma, and A. Crowell, "Detecting infection onsetwith behavior-based policies," in Proc. 5th Int. Conf. Netw. Syst. Secur. ,Sep. 2011, pp. 57–64.
  15. M. O. Rabin, "Fingerprinting by random polynomials," Dept. Math. ,Hebrew Univ. Jerusalem, Jerusalem, Israel, Tech. Rep. TR-15-81, 1981.
  16. A. Z. Broder, M. Charikar, A. M. Frieze, and M. Mitzenmacher,"Min-wise independent permutations," J. Comput. Syst. Sci. , vol. 60,no. 3, pp. 630–659, 2000.
  17. A. Z. Broder, "Some applications of Rabin's fingerprinting method," inSequences II. New York, NY, USA: Springer-Verlag, 1993, pp. 143–152.
  18. A. Z. Broder, "Identifying and filtering near-duplicate documents," inProc. 11th Annu. Symp. Combinat. Pattern Matching, 2000, pp. 1–10.
  19. A. Broder and M. Mitzenmacher, "Network applications of bloom filters:A survey," Internet Math. , vol. 1, no. 4, pp. 485–509, 2004.
  20. G. Aggarwalet al. , "Anonymizing tables," in Proc. 10th Int. Conf. Database Theory, 2005, pp. 246–258.
  21. R. Chen, B. C. M. Fung, N. Mohammed, B. C. Desai, and K. Wang,"Privacy-preserving trajectory data publishing by local suppression," Inf. Sci. , vol. 231, pp. 83–97, May 2013.
  22. M. O. Rabin, "Digitalized signatures and public-key functions asintractable as factorization," Massachusetts Inst. Technol. , Cambridge,MA, USA, Tech. Rep. MIT/LCS/TR-212, 1979.
  23. F. Liu, X. Shu, D. Yao, and A. R. Butt, "Privacy-preserving scanningof big content for sensitive data exposure with MapReduce," in Proc. ACM CODASPY, 2015.
  24. W. N. Francis and H. Kucera, "Brown corpus manual," 1979.
  25. J. Kleinberg, C. H. Papadimitriou, and P. Raghavan, "On the value ofprivate information," in Proc. 8th Conf. Theoretical Aspects RationalityKnowl. , 2001, pp. 249–257.
Index Terms

Computer Science
Information Sciences

Keywords

Streaming Content Leakage Detection Traffic Pattern Degree Of Similarity.