IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference 2007
DOI: 10.1109/glocom.2007.81
|View full text |Cite
|
Sign up to set email alerts
|

Skype Traffic Identification

Abstract: Skype applies strong encryption to provide secure communication inside the whole Skype network. The communication ports of clients are chosen randomly. As a consequence, traditional port based or payload based identification of Skype traffic cannot be applied. In this paper we present a novel flow dynamics based identification method to discover both Skype hosts and voice calls. The method is based only on packet headers and extracted flow level information. This method is the second algorithm from our researc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2007
2007
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 5 publications
0
7
0
Order By: Relevance
“…Literature [3]- [5] research how to identify Skype traffic. However, these studies were only for audio calls, and not apply to video call traffic identification.…”
Section: Related Workmentioning
confidence: 99%
“…Literature [3]- [5] research how to identify Skype traffic. However, these studies were only for audio calls, and not apply to video call traffic identification.…”
Section: Related Workmentioning
confidence: 99%
“…The identification method introduced in this paper has several advantages over our first version described in [1]. The identification process contains basically two steps in both methods: discovering candidate Skype hosts first, then searching for voice calls.…”
Section: Skype Identificationmentioning
confidence: 99%
“…However, the first steps are significantly different. In the first method [1] only the IP addresses of the hosts could be identified -based on connections initiated by the hosts towards other dedicated Skype servers, in addition to a special signaling flow between the host and the SN.…”
Section: Skype Identificationmentioning
confidence: 99%
See 1 more Smart Citation
“…[138] reveals many details about the Skype protocols and internals, including the Skype encryption and the techniques to circumvent NAT and firewall limitations. [139] and [140] investigate the identification methods to discover Skype hosts and voice calls. Skype traffic is characterized, identified and analyzed in [141] and [142].…”
Section: Skype Servicementioning
confidence: 99%