{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T05:38:06Z","timestamp":1771047486496,"version":"3.50.1"},"reference-count":51,"publisher":"Association for Computing Machinery (ACM)","issue":"2s","license":[{"start":{"date-parts":[[2020,4,30]],"date-time":"2020-04-30T00:00:00Z","timestamp":1588204800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100014718","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1650685, cns-1413978, dge 16-44869"],"award-info":[{"award-number":["CNS-1650685, cns-1413978, dge 16-44869"]}],"id":[{"id":"10.13039\/100014718","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2020,4,30]]},"abstract":"<jats:p>\n            As video traffic dominates the Internet, it is important for operators to detect video quality of experience (QoE) to ensure adequate support for video traffic. With wide deployment of end-to-end encryption, traditional deep packet inspection--based traffic monitoring approaches are becoming ineffective. This poses a challenge for network operators to monitor user QoE and improve upon their experience. To resolve this issue, we develop and present a system for\n            <jats:italic>RE<\/jats:italic>\n            al-time\n            <jats:italic>QU<\/jats:italic>\n            ality of experience metric detection for &lt;underline&gt;\n            <jats:italic>E<\/jats:italic>\n            &lt;\/underline&gt;ncrypted\n            <jats:italic>T<\/jats:italic>\n            raffic\u2014\n            <jats:italic>Requet<\/jats:italic>\n            \u2014which is suitable for network middlebox deployment. Requet uses a detection algorithm that we develop to identify video and audio chunks from the IP headers of encrypted traffic. Features extracted from the chunk statistics are used as input to a machine learning algorithm to predict QoE metrics, specifically buffer warning (low buffer, high buffer), video state (buffer increase, buffer decay, steady, stall), and video resolution. We collect a large YouTube dataset consisting of diverse video assets delivered over various WiFi and LTE network conditions to evaluate the performance. We compare Requet with a baseline system based on previous work and show that Requet outperforms the baseline system in accuracy of predicting buffer low warning, video state, and video resolution by 1.12\u00d7, 1.53\u00d7, and 3.14\u00d7, respectively.\n          <\/jats:p>","DOI":"10.1145\/3394498","type":"journal-article","created":{"date-parts":[[2020,7,7]],"date-time":"2020-07-07T12:38:12Z","timestamp":1594125492000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Requet"],"prefix":"10.1145","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0586-1630","authenticated-orcid":false,"given":"Craig","family":"Gutterman","sequence":"first","affiliation":[{"name":"Columbia University, New York , NY"}]},{"given":"Katherine","family":"Guo","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs, New Providence, NJ"}]},{"given":"Sarthak","family":"Arora","sequence":"additional","affiliation":[{"name":"Columbia University, New York , NY"}]},{"given":"Trey","family":"Gilliland","sequence":"additional","affiliation":[{"name":"Columbia University, New York , NY"}]},{"given":"Xiaoyang","family":"Wang","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs, New Providence, NJ"}]},{"given":"Les","family":"Wu","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs, New Providence, NJ"}]},{"given":"Ethan","family":"Katz-Bassett","sequence":"additional","affiliation":[{"name":"Columbia University, New York , NY"}]},{"given":"Gil","family":"Zussman","sequence":"additional","affiliation":[{"name":"Columbia University, New York , NY"}]}],"member":"320","published-online":{"date-parts":[[2020,7,10]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"n.d. About Wireshark. Retrieved","year":"2020","unstructured":"Wireshark. n.d. About Wireshark. Retrieved May 15, 2020 from https:\/\/www.wireshark.org\/about.html. Wireshark. n.d. About Wireshark. Retrieved May 15, 2020 from https:\/\/www.wireshark.org\/about.html."},{"key":"e_1_2_1_2_1","volume-title":"Retrieved","year":"2020","unstructured":"Cisco. n.d. Cisco Annual Internet Report (2018--2023) White Paper . Retrieved May 15, 2020 from https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/mobile-white-paper-c11-520862.html. Cisco. n.d. Cisco Annual Internet Report (2018--2023) White Paper. Retrieved May 15, 2020 from https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/mobile-white-paper-c11-520862.html."},{"key":"e_1_2_1_3_1","volume-title":"n.d. Telerik Fiddler, the Free Web Debugging Proxy. Retrieved","year":"2020","unstructured":"Telerik. n.d. Telerik Fiddler, the Free Web Debugging Proxy. Retrieved May 15, 2020 from https:\/\/www.telerik.com\/fiddler. Telerik. n.d. Telerik Fiddler, the Free Web Debugging Proxy. Retrieved May 15, 2020 from https:\/\/www.telerik.com\/fiddler."},{"key":"e_1_2_1_4_1","volume-title":"Retrieved","year":"2016","unstructured":"Fortune. 2016 . How Google Is Making YouTube Safer For Its Users . Retrieved May 15, 2020 from http:\/\/fortune.com\/2016\/08\/02\/google-youtube-encryption-https\/. Fortune. 2016. How Google Is Making YouTube Safer For Its Users. Retrieved May 15, 2020 from http:\/\/fortune.com\/2016\/08\/02\/google-youtube-encryption-https\/."},{"key":"e_1_2_1_5_1","volume-title":"Retrieved","year":"2019","unstructured":"Cisco. 2019 . Cisco Encrypted Traffic Analytics . Retrieved May 15, 2020 from https:\/\/www.cisco.com\/c\/dam\/en\/us\/solutions\/collateral\/enterprise-networks\/enterprise-network-security\/nb-09-encrytd-traf-anlytcs-wp-cte-en.pdf. Cisco. 2019. Cisco Encrypted Traffic Analytics. Retrieved May 15, 2020 from https:\/\/www.cisco.com\/c\/dam\/en\/us\/solutions\/collateral\/enterprise-networks\/enterprise-network-security\/nb-09-encrytd-traf-anlytcs-wp-cte-en.pdf."},{"key":"e_1_2_1_6_1","volume-title":"3rd Generation Partnership Project. 3GPP.","author":"GPP.","unstructured":"3 GPP. 2010. Transparent End-to-End Packet-Switched Streaming Service (PSS). TS 26.234 . 3rd Generation Partnership Project. 3GPP. 3GPP. 2010. Transparent End-to-End Packet-Switched Streaming Service (PSS). TS 26.234. 3rd Generation Partnership Project. 3GPP."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2565585.2565600"},{"key":"e_1_2_1_8_1","volume-title":"Khakpour","author":"Ahmed Adnan","year":"2017","unstructured":"Adnan Ahmed , Zubair Shafiq , Harkeerat Bedi , and Amir R . Khakpour . 2017 . Suffering from buffering? Detecting QoE impairments in live video streams. In Proceedings of IEEE ICNP. Adnan Ahmed, Zubair Shafiq, Harkeerat Bedi, and Amir R. Khakpour. 2017. Suffering from buffering? Detecting QoE impairments in live video streams. In Proceedings of IEEE ICNP."},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of the ACM IMC Conference.","author":"Amann Johanna","year":"2017","unstructured":"Johanna Amann , Oliver Gasser , Quirin Scheitle , Lexi Brent , Georg Carle , and Ralph Holz . 2017 . Mission Accomplished? HTTPS Security AfterDigiNotar . In Proceedings of the ACM IMC Conference. Johanna Amann, Oliver Gasser, Quirin Scheitle, Lexi Brent, Georg Carle, and Ralph Holz. 2017. Mission Accomplished? HTTPS Security AfterDigiNotar. In Proceedings of the ACM IMC Conference."},{"key":"e_1_2_1_10_1","volume-title":"Retrieved","author":"Armasu Lucian","year":"2016","unstructured":"Lucian Armasu . 2016 . Netflix Adopts Efficient HTTPS Encryption for Its Video Streams . Retrieved May 15, 2020 from https:\/\/www.tomshardware.com\/news\/netflix-efficient-https-video-streams,32420.html. Lucian Armasu. 2016. Netflix Adopts Efficient HTTPS Encryption for Its Video Streams. Retrieved May 15, 2020 from https:\/\/www.tomshardware.com\/news\/netflix-efficient-https-video-streams,32420.html."},{"key":"e_1_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Francesco Bronzino Paul Schmitt Sara Ayoubi Guilherme Martins Renata Teixeira and Nick Feamster. 2020. Inferring streaming video quality from encrypted traffic: Practical models and deployment experience. arXiv:1901.05800.  Francesco Bronzino Paul Schmitt Sara Ayoubi Guilherme Martins Renata Teixeira and Nick Feamster. 2020. Inferring streaming video quality from encrypted traffic: Practical models and deployment experience. arXiv:1901.05800.","DOI":"10.1145\/3393691.3394194"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2518025.2518033"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2910017.2910597"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.44"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987459"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018478"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23456"},{"key":"e_1_2_1_19_1","volume-title":"Reschke","author":"Fielding Roy T.","year":"2014","unstructured":"Roy T. Fielding and Julian F . Reschke . 2014 . Hypertext Transfer Protocol (HTTP\/1.1): Message Syntax and Routing. RFC 7230. IETF Trust . Roy T. Fielding and Julian F. Reschke. 2014. Hypertext Transfer Protocol (HTTP\/1.1): Message Syntax and Routing. RFC 7230. IETF Trust."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWMN.2017.8078403"},{"key":"e_1_2_1_21_1","volume-title":"Alex Borges Vieira, \u00cdtalo Cunha, and Jussara M. Almeida","author":"Guarnieri Thiago A.","year":"2017","unstructured":"Thiago A. Guarnieri , Idilio Drago , Alex Borges Vieira, \u00cdtalo Cunha, and Jussara M. Almeida . 2017 . Characterizing QoE in large-scale live streaming. In Proceedings of IEEE GLOBECOM. Thiago A. Guarnieri, Idilio Drago, Alex Borges Vieira, \u00cdtalo Cunha, and Jussara M. Almeida. 2017. Characterizing QoE in large-scale live streaming. In Proceedings of IEEE GLOBECOM."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3304109.3306226"},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of IEEE ICDAR.","author":"Ho Tin Kam","year":"1995","unstructured":"Tin Kam Ho . 1995 . Random decision forests . In Proceedings of IEEE ICDAR. Tin Kam Ho. 1995. Random decision forests. In Proceedings of IEEE ICDAR."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626296"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131368"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3083187.3083193"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210445.3210448"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996604"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.23919\/TMA.2019.8784609"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.23919\/TMA.2018.8506519"},{"key":"e_1_2_1_32_1","volume-title":"Zegura","author":"Mangla Tarun","year":"2017","unstructured":"Tarun Mangla , Emir Halepovic , Mostafa H. Ammar , and Ellen W . Zegura . 2017 . MIMIC : Using passive network measurements to estimate HTTP-based adaptive video QoE metrics. In Proceedings of IEEE TMA. Tarun Mangla, Emir Halepovic, Mostafa H. Ammar, and Ellen W. Zegura. 2017. MIMIC: Using passive network measurements to estimate HTTP-based adaptive video QoE metrics. In Proceedings of IEEE TMA."},{"key":"e_1_2_1_33_1","volume-title":"Proceedings of ACM MoVid.","author":"Mansy Ahmed","year":"2014","unstructured":"Ahmed Mansy , Mostafa H. Ammar , Jaideep Chandrashekar , and Anmol Sheth . 2014 . Characterizing client behavior of commercial mobile video streaming services . In Proceedings of ACM MoVid. Ahmed Mansy, Mostafa H. Ammar, Jaideep Chandrashekar, and Anmol Sheth. 2014. Characterizing client behavior of commercial mobile video streaming services. In Proceedings of ACM MoVid."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098843"},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of IEEE INFOCOM.","author":"Hammad Mazhar M.","year":"2018","unstructured":"M. Hammad Mazhar and Zubair Shafiq . 2018 . Real-time video quality of experience monitoring for HTTPS and QUIC . In Proceedings of IEEE INFOCOM. M. Hammad Mazhar and Zubair Shafiq. 2018. Real-time video quality of experience monitoring for HTTPS and QUIC. In Proceedings of IEEE INFOCOM."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3083165.3083177"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2016.7849088"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/QoMEX.2018.8463379"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.07.009"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143400"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029821"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3142066"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3349611.3355547"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845109"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1943552.1943572"},{"key":"e_1_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Dimitrios Tsilimantos Theodoros Karagkioules and Stefan Valentin. 2018. Classifying flows and buffer state for YouTube\u2019s HTTP adaptive streaming service in mobile networks. arXiv:1803.00303.  Dimitrios Tsilimantos Theodoros Karagkioules and Stefan Valentin. 2018. Classifying flows and buffer state for YouTube\u2019s HTTP adaptive streaming service in mobile networks. arXiv:1803.00303.","DOI":"10.1145\/3204949.3204955"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3204949.3204955"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422609"},{"key":"e_1_2_1_49_1","volume-title":"Retrieved","author":"Vogt Nick","year":"2015","unstructured":"Nick Vogt . 2015 . YouTube Audio Quality Bitrate Used for 360p, 480p, 720p, 1080p, 1440p, 2160p . Retrieved May 15, 2020 from https:\/\/www.h3xed.com\/web-and-internet\/youtube-audio-quality-bitrate-240p-360p-480p-720p-1080p. Nick Vogt. 2015. YouTube Audio Quality Bitrate Used for 360p, 480p, 720p, 1080p, 1440p, 2160p. Retrieved May 15, 2020 from https:\/\/www.h3xed.com\/web-and-internet\/youtube-audio-quality-bitrate-240p-360p-480p-720p-1080p."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2015.7194076"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3349611.3355549"},{"key":"e_1_2_1_52_1","volume-title":"Retrieved","author":"Weil Nicolas","year":"2020","unstructured":"Nicolas Weil . n.d. The State of MPEG-DASH 2016 . Retrieved May 15, 2020 from http:\/\/www.streamingmedia.com\/Articles\/Articles\/Editorial\/Featured-Articles\/The-State-of-MPEG-DASH-2016-110099.aspx. Nicolas Weil. n.d. The State of MPEG-DASH 2016. Retrieved May 15, 2020 from http:\/\/www.streamingmedia.com\/Articles\/Articles\/Editorial\/Featured-Articles\/The-State-of-MPEG-DASH-2016-110099.aspx."}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3394498","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3394498","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:30Z","timestamp":1750195890000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3394498"}},"subtitle":["Real-Time QoE Metric Detection for Encrypted YouTube Traffic"],"short-title":[],"issued":{"date-parts":[[2020,4,30]]},"references-count":51,"journal-issue":{"issue":"2s","published-print":{"date-parts":[[2020,4,30]]}},"alternative-id":["10.1145\/3394498"],"URL":"https:\/\/doi.org\/10.1145\/3394498","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,30]]},"assertion":[{"value":"2019-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}