Tracing Illegal Redistributors of Streaming Contents using Traffic Patterns

Ramya Dorai,Y. Chu,S. G. Rao,S. Seshan,Z. Yang,H. Ma,M. Dobashi,H. Nakayama,N. Kato,Y. Nemoto
2011-01-01
Abstract:The tracing scheme is using similarity of traffic pattern to trace the source of leaks when sensitive or proprietary data is made available to large set of parties. On the other hand we must implement digital rights management (DRM) to control content spreading and to avoid unintended content use. General tracing methods use either watermarking or cryptographic keys to protect the digitally protected content. In those methods, malicious users can interrupt tracing with illegal process at user side computers. To prevent all illegal process at user side, routers should analyze information embedded in to packets which is unrealistic. The proposed method is used to detect illegal content streaming by using only traffic patterns which are constructed from amount of traffic traversing routers.
What problem does this paper attempt to address?