Beruflich Dokumente
Kultur Dokumente
Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks
PROPOSED SYSTEM:
In this paper, we focus on the illegal redistribution of streaming content by an authorized user to
external networks.The existing proposals monitor information obtained at different nodes in the
middle of the streaming path. The retrieved information are used to generate traffic patterns
which appear as unique waveform per content, just like a fingerprint.
ADVANTAGES OF PROPOSED SYSTEM:
These technologies enhance the distribution of any type of information over the Internet .
SYSTEM ARCHITECTURE:
Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
System
Hard Disk
Floppy Drive
Monitor
1.44 Mb.
:
Mouse
Ram
40 GB.
15 VGA Colour.
Logitech.
:
512 Mb.
SOFTWARE REQUIREMENTS:
Operating system
Windows XP/7.
Coding Language
JAVA/J2EE
IDE
Netbeans 7.4
Database
MYSQL
REFERENCE:
Hiroki Nishiyama, Desmond Fomo, Zubair Md. Fadlullah, and Nei Kato Traffic PatternBased Content Leakage Detection for Trusted Content Delivery Networks IEEE
TRANSACTIONS
ON
PARALLEL
AND
DISTRIBUTED
SYSTEMS,VOL.
2,FEBRUARY 2014.
25,NO.