Revealing skype traffic
- 27 August 2007
- journal article
- conference paper
- Published by Association for Computing Machinery (ACM) in ACM SIGCOMM Computer Communication Review
- Vol. 37 (4) , 37-48
- https://doi.org/10.1145/1282427.1282386
Abstract
Skype is a very popular VoIP software which has recently attracted the attention of the research community and network operators. Following a closed source and proprietary design, Skype proto- cols and algorithms are unknown. Moreover, strong encryption mechanisms are adopted by Skype, making it very difficult to even glimpse its presence from a traffic aggregate. In this paper, we propose a framework based on two complementary techniques to reveal Skype traffic in real time. The first approach, based on Pear- son's Chi-Square test and agnostic to VoIP-related traffic character- istics, is used to detect Skype's fingerprint from the packet framing structure, exploiting the randomness introduced at the bit level by the encryption process. Conversely, the second approach is based on a stochastic characterization of Skype traffic in terms of packet arrival rate and packet length, which are used as features of a deci- sion process based on Naive Bayesian Classifiers. In order to assess the effectiveness of the above techniques, we develop an off-line cross-checking heuristic based on deep-packet inspection and flow correlation, which is interesting per se. This heuristic allows us to quantify the amount of false negatives and false positives gathered by means of the two proposed approaches: results obtained from measurements in different networks show that the technique is very effective in identifying Skype traffic. While both Bayesian classifier and packet inspection techniques are commonly used, the idea of leveraging on randomness to reveal traffic is novel. We adopt this to identify Skype traffic, but the same methodology can be applied to other classification problems as welKeywords
This publication has 7 references indexed in Scilit:
- Quantifying Skype user satisfactionPublished by Association for Computing Machinery (ACM) ,2006
- An Analysis of the Skype Peer-to-Peer Internet Telephony ProtocolPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- The Secure Shell (SSH) Protocol Assigned NumbersPublished by RFC Editor ,2006
- Internet traffic classification using bayesian analysis techniquesACM SIGMETRICS Performance Evaluation Review, 2005
- Measuring IP and TCP behavior on edge nodes with TstatComputer Networks, 2005
- NIST NetACM SIGCOMM Computer Communication Review, 2003
- HTTP Over TLSPublished by RFC Editor ,2000