1 / 9

Paper,Traffic Pattern-Based Content Leakage Detection

Due to the increasing popularity of multimedia streaming applications and services in recent years, the issue of trusted video delivery to prevent undesirable content-leakage has, indeed, become critical. While preserving user privacy, conventional systems have addressed this issue by proposing methods based on the observation of streamed traffic throughout the network. These conventional systems maintain high detection accuracy while coping with some of the traffic variation in the network (e.g., network delay and packet loss), http://kaashivinfotech.com/ http://inplanttrainingchennai.com/ http://inplanttraining-in-chennai.com/ http://internshipinchennai.in/ http://inplant-training.org/ http://kernelmind.com/ http://inplanttraining-in-chennai.com/ http://inplanttrainingchennai.com/

kaashivit
Télécharger la présentation

Paper,Traffic Pattern-Based Content Leakage Detection

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. DETECTION MONITORING OF SECURE PACKET TRANSFER OVER NETWORK TRAFFIC IEEE Transaction Paper,TrafficPattern-Based Content Leakage Detection for Trusted Content Delivery Networks

  2. A Software /Manufacturing Research Company Run By Microsoft Most Valuable Professional VenkatesanPrabu .J MANAGING DIRECTOR Microsoft Web Developer Advisory Council team member and a well known Microsoft Most Valuable Professional (MVP) for the year 2008, 2009, 2010,2011,2012,2013 ,2014. LakshmiNarayanan.J GENERAL MANAGER BlackBerry Server Admin. Oracle 10g SQL Expert. Arunachalam.J Electronic Architect Human Resourse Manager

  3. Abstract • Due to the increasing popularity of multimedia streaming applications and services in recent years, the issue of trusted video delivery to prevent undesirable content-leakage has, indeed, become critical. • While preserving user privacy, conventional systems have addressed this issue by proposing methods based on the observation of streamed traffic throughout the network. • These conventional systems maintain high detection accuracy while coping with some of the traffic variation in the network (e.g., network delay and packet loss), however, their detection performance substantially degrades owing to the significant variation of video lengths. In this paper, we focus on overcoming this issue by proposing a novel content-leakage detection scheme that is robust to the variation of the video length. • By comparing videos of different lengths, we determine a relation between the length of videos to be compared and the similarity between the compared videos. Therefore, we enhance the detection performance of the proposed scheme even in an environment subjected to variation in length of video. .

  4. Proposed System • Sender in an application, used to send the content with watermarking information. • To enhance the process, we are using monitoring system to detect the content leakage and intrusion . • Once monitored the content leakage and intrusion in an application, each and every content is transferred as packet • While packet transfer there is no intrusion or defect in a content. • It checks the originality of the content after packet transferred from a monitoring system not only the original content also with watermarked content. • Monitoring system analyzes the originality of the content and it is time consuming while transferring packets.

  5. Existing System • The conventional systems maintain a high detection accuracy while coping with some of the traffic variation in the network (e.g., network delay and packet loss), however, their detection performance substantially degrades owing to the significant variation of video lengths. • In this paper, we focus on overcoming this issue by proposing a novel content-leakage detection scheme that is robust to the variation of the video length. • By comparing videos of different lengths, we determine a relation between the length of videos to be compared and the similarity between the compared videos. • Therefore, we enhance the detection performance of the proposed scheme even in an environment subjected to variation in length of video. • Through a test bed experiment, the effectiveness of our proposed scheme is evaluated in terms of variation of video length, delay variation, and packet loss.

  6. System Requirements • Hardware Requirements: System : Pentium IV 2.4 GHz. Hard Disk : 80 GB. Floppy Drive : 1.44 Mb. Monitor : 15 VGA Colour. Mouse : Logitech. Ram : 1 GB or Above • Software Requirements: Operating system : Windows 7 Front End : Dot net 4.0 (VS 2010) Backend : SQL Server 2008 R2

  7. Architecture Diagram

  8. Records Breaks Asia Book Of Records Tamil Nadu Of Records India Of Records MVP Awards World Record

  9. Services: A Software /Manufacturing Research Company Run By Microsoft Most Valuable Professional Inplant Training. Internship. Workshop’s. Final Year Project’s. Industrial Visit. Contact Us: +91 98406 78906,+91 90037 18877 kaashiv.info@gmail.com www.kaashivinfotech.com Shivanantha Building (Second building to Ayyappan Temple),X41, 5th Floor, 2nd avenue,Anna Nagar,Chennai-40.

More Related