skip to main content
10.1145/3029806.3029821acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
short-paper
Best Poster

Identifying HTTPS-Protected Netflix Videos in Real-Time

Authors Info & Claims
Published:22 March 2017Publication History

ABSTRACT

After more than a year of research and development, Netflix recently upgraded their infrastructure to provide HTTPS encryption of video streams in order to protect the privacy of their viewers. Despite this upgrade, we demonstrate that it is possible to accurately identify Netflix videos from passive traffic capture in real-time with very limited hardware requirements. Specifically, we developed a system that can report the Netflix video being delivered by a TCP connection using only the information provided by TCP/IP headers. To support our analysis, we created a fingerprint database comprised of 42,027 Netflix videos. Given this collection of fingerprints, we show that our system can differentiate between videos with greater than 99.99% accuracy. Moreover, when tested against 200 random 20-minute video streams, our system identified 99.5% of the videos with the majority of the identifications occurring less than two and a half minutes into the video stream.

References

  1. J. L. Bentley. Multidimensional Binary Search Trees Used for Associative Searching. In Communications of the ACM, September 1975. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. DOM Standard, https://dom.spec.whatwg.org/.Google ScholarGoogle Scholar
  3. S. Englehardt and A. Narayanan. Online Tracking: A 1-Million-Site Measurement and Analysis. In ACM Conference on Computer and Communications Security, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. GitHub Repository, https://github.com/andrewreed.Google ScholarGoogle Scholar
  5. ISO/IEC 14496--12:2012, http://standards.iso.org/ittf/ PubliclyAvailableStandards/c061988_ISO_IEC_14496--12_2012.zip.Google ScholarGoogle Scholar
  6. Microsoft Silverlight, https://www.microsoft.com/silverlight.Google ScholarGoogle Scholar
  7. mitmproxy, https://mitmproxy.org.Google ScholarGoogle Scholar
  8. Netflix has tons of hidden categories -- here's how to see them, http://mashable.com/2016/01/11/netflix-search-codes.Google ScholarGoogle Scholar
  9. The Netflix Tech Blog: Protecting Netflix Viewing Privacy at Scale, http://techblog.netflix.com/2016/08/protecting-netflix-viewing-privacy-at.html.Google ScholarGoogle Scholar
  10. A. Reed and B. Klimkowski. Leaky Streams: Identifying Variable Bitrate DASH Videos Streamed over Encrypted 802.11n Connections. In IEEE Consumer Communications and Networking Conference, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  11. Sandvine Report: Netflix's Encoding Optimizations Result In North American Traffic Share Decline, https://www.sandvine.com/pr/2016/6/22/sandvine-report-netflix-encoding-optimizations-result-in-north-american-traffic-share-decline.html.Google ScholarGoogle Scholar
  12. T. S. Saponas, J. Lester, C. Hartung, S. Agarwal, and T. Kohno. Devices that Tell on You: Privacy Trends in Consumer Ubiquitous Computing. In USENIX Security Symposium, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Selenium, http://www.seleniumhq.org.Google ScholarGoogle Scholar
  14. J. Terrell, K. Jeffay, F. D. Smith, J. Gogan, and J. Keller. Passive, Streaming Inference of TCP Connection Structure for Network Server Management. In IEEE International Traffic Monitoring and Analysis Workshop, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. White, A. Matthews, K. Snow, and F. Monrose. Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on fon-iks. In IEEE Symposium on Security and Privacy, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Zhang, X. Chen, Y. Xiang, W. Zhou, and J. Wu. Robust Network Traffic Classification. In IEEE/ACM Transactions on Networking, August 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Identifying HTTPS-Protected Netflix Videos in Real-Time

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CODASPY '17: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy
      March 2017
      382 pages
      ISBN:9781450345231
      DOI:10.1145/3029806

      Copyright © 2017 Public Domain

      This paper is authored by an employee(s) of the United States Government and is in the public domain. Non-exclusive copying or redistribution is allowed, provided that the article citation is given and the authors and agency are clearly identified as its source.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 22 March 2017

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • short-paper

      Upcoming Conference

      CODASPY '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader