Computational Science - New Dimensions & Perspectives |
Foundation of Computer Science USA |
NCCSE - Number 2 |
None 2011 |
Authors: K. Ramya, D. Ramya Dorai, Dr. M. Rajaram |
26d190ff-9164-44e3-b89f-6d407159037e |
K. Ramya, D. Ramya Dorai, Dr. M. Rajaram . Tracing Illegal Redistributors of Streaming Contents using Traffic Patterns. Computational Science - New Dimensions & Perspectives. NCCSE, 2 (None 2011), 80-85.
The tracing scheme is using similarity of traffic pattern to trace the source of leaks when sensitive or proprietary data is made available to large set of parties. On the other hand we must implement digital rights management (DRM) to control content spreading and to avoid unintended content use. General tracing methods use either watermarking or cryptographic keys to protect the digitally protected content. In those methods, malicious users can interrupt tracing with illegal process at user side computers. To prevent all illegal process at user side, routers should analyze information embedded in to packets which is unrealistic. The proposed method is used to detect illegal content streaming by using only traffic patterns which are constructed from amount of traffic traversing routers.