Proceedings of the 2nd International ICST Conference on Performance Evaluation Methodologies and Tools 2007
DOI: 10.4108/valuetools.2007.1782
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced Skype Traffic Identification

Abstract: Skype applies strong encryption to provide secure communication inside the whole Skype network. The communication ports of clients are chosen randomly. As a consequence, traditional port based or payload based identification of Skype traffic cannot be applied. In this paper we present a novel flow dynamics based identification method to discover both Skype hosts and voice calls. The method is based only on packet headers and extracted flow level information. This method is the second algorithm from our researc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 2 publications
0
10
0
Order By: Relevance
“…From previous research on Skype traffic identification [Perényi and Molnár 2007;Rossi et al 2008], we know that we can expect to find patterns (and thus a high degree of predictability) in Skype audio flows. From the cumulative distribution function (CDF) of the packet interarrival times in Figure 1(a), we can see that there are 4 distinct interarrival times in Skype VoIP flows.…”
Section: Real-time Flowsmentioning
confidence: 98%
“…From previous research on Skype traffic identification [Perényi and Molnár 2007;Rossi et al 2008], we know that we can expect to find patterns (and thus a high degree of predictability) in Skype audio flows. From the cumulative distribution function (CDF) of the packet interarrival times in Figure 1(a), we can see that there are 4 distinct interarrival times in Skype VoIP flows.…”
Section: Real-time Flowsmentioning
confidence: 98%
“…Many researches (Leung and Chan, 2007;Baset and Schulzrinne, 2006;Lu et al, 2010;Peranyi and Molnar, 2007) have been done for detecting Skype traffic by pattern analysis. By investigating Skype, the paper (Leung and Chan, 2007) discuss 15 basic stages of Skype communication from start to end such as start up, registration, etc.…”
Section: Background and Related Workmentioning
confidence: 99%
“…and dynamic path selection I (1.2). and the constant packet rate [5). To further protect privacy of Skype VolP calls.…”
Section: Ln Troducfionmentioning
confidence: 99%
“…(d) Skype calls are encrypted and hard to decipher [3]. (e) Skype sends packets at the constant rate of 33 packet/s [5]. Due to the un ique set of features listed above, Skype is known as secure voice communication [3] which can protect privacy of communication parties.…”
Section: Network Modelmentioning
confidence: 99%
See 1 more Smart Citation