ATTACK SCENARIOS ON VIDEOHOSTING

Authors

DOI:

https://doi.org/10.18372/2225-5036.30.18617

Keywords:

videohosting, streaming, steganography, playlists, thumbnail, password sharing, subtitles

Abstract

The development of both the violator model and threat model is required for protection of information system from potential harmful influence. Harmful influence can be caused by accident (by its legit users) or intentionally (by violators). Each model is an abstraction and the level of detail of this abstraction is determined by a few factors. One such factor is the object of protection. The most detailed models can be designed for specific systems, more generalized models – for the system type, even more generalized – for the systems of the certain field and the most generalized models are developed without specifying the system at all. In any case attacks, that will be included into the model, are selected from a certain set. The specifics of functioning of videohosting imply processing of large videofiles and substantial amount of misuse of its functions by legit users whereas the availability of given service means that attacks will be present in a form of a sequence of actions that are only prohibited at organizational level and are not blocked by the system itself.

References

Arendt F. Suicide on Instagram – Content Analysis of a German Suicide-Related Hashtag. Crisis. 2019 Jan;40(1): 36-41. doi: 10.1027/0227-5910/a000529. Epub 2018 Jun 21. PMID: 29932019.

Сhin-Yung Lin, "Watermarking and digital signature techniques form ultimedia authentication and copyright protection", PhDThesis, Columbia Universi-ty, 2001.

Nandakishore Ramaswamy and K. R. Rao. 2006. Video authentication for H.264/AVC using digital signature standard and secure hash algorithm. In Pro-ceedings of the 2006 international workshop on Net-work and operating systems support for digital audio and video (NOSSDAV '06). Association for Computing Machinery, New York, NY, USA, Article 21, 1-6. https://doi. org/ 10.1145/1378191.1378218.

Bor-Chun Chen, Pallabi Ghosh, Vlad I. Mora riu, Detection of Metadata Tampering Through Dis-crepancy Between Image Contentand Metadata Using Multi-Task Deep Learning in Proceedings of the IEEE Conference on Computer Vision and Pattern Recogni-tion (CVPR) Workshops, July, 2017.

P. Kakarand N. Sudha. Verifying temporal da-ta in geotagged images viasunazimut hestimation. IEEE Transactions on Information Forensics and Security, 7(3): 1029–1039, 2012.

Sadek, M.M., Khalifa, A.S. &Mostafa, M.G.M. Video steganography: a comprehensive review. Mul-timed ToolsAppl74, 7063–7094 (2015). https://doi.org/ 10.1007 /s11042-014-1952-z.

E. I. Lin, A. M. Eskicioglu, R. L. Lagendijkand E. J. Delp, "Advances in Digital Video Content Protec-tion," in Proceedings of the IEEE, vol. 93, no. 1, pp. 171-183, Jan. 2005, doi: 10.1109/JPROC.2004.839623.

Treimer, M; Simonson, M. Journal ofSo-cialPsychology; Worcester, ass. Том 128, Изд. 4, (Aug 1, 1988): 563-565.

Published

2024-05-15