2010
DOI: 10.1002/dac.1142
|View full text |Cite
|
Sign up to set email alerts
|

On the identification and analysis of Skype traffic

Abstract: SUMMARYSkype applies strong encryption to provide secure communication inside the whole Skype network. It also uses several techniques to conceal the traffic and the protocol. As a consequence, traditional port-based or payload-based identification of Skype traffic cannot be applied. In this paper, after an overview of the Skype P2P system, network entities and operation, we introduce novel algorithms to detect several types of communications (including voice calls primarily) that the Skype client initiates to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(16 citation statements)
references
References 18 publications
0
15
0
Order By: Relevance
“…For the problem under investigation, we resort to the simple statistics of x in order to avoid packet inspection and to guarantee quick feature building. The joint analysis of the anomalies at different timescales [14] or at different points of the system [15,16] sometimes helps improve performance. Anomaly-based detection may be more adaptive than ML as it simply looks at sudden changes of flows statistics [4,13], while providing good detection rates [12].…”
Section: Problem Formulationmentioning
confidence: 99%
“…For the problem under investigation, we resort to the simple statistics of x in order to avoid packet inspection and to guarantee quick feature building. The joint analysis of the anomalies at different timescales [14] or at different points of the system [15,16] sometimes helps improve performance. Anomaly-based detection may be more adaptive than ML as it simply looks at sudden changes of flows statistics [4,13], while providing good detection rates [12].…”
Section: Problem Formulationmentioning
confidence: 99%
“…Literature [3]- [5] research how to identify Skype traffic. However, these studies were only for audio calls, and not apply to video call traffic identification.…”
Section: Related Workmentioning
confidence: 99%
“…A variety of techniques have been used; perhaps the most thorough approach is that of Molnár [11] which makes use of observed signaling traffic on a range of ports, timing characteristics of UDP keepalive messages, and a range of call connection properties (bandwidth, packet rate, average packet size, main mode of packet inter-arrival time). …”
Section: Categorizationsmentioning
confidence: 99%