skip to main content
article

Revealing skype traffic: when randomness plays with you

Published:27 August 2007Publication History
Skip Abstract Section

Abstract

Skype is a very popular VoIP software which has recently attracted the attention of the research community and network operators. Following a closed source and proprietary design, Skype protocols and algorithms are unknown. Moreover, strong encryption mechanisms are adopted by Skype, making it very difficult to even glimpse its presence from a traffic aggregate. In this paper, we propose a framework based on two complementary techniques to reveal Skypetraffic in real time. The first approach, based on Pearson'sChi-Square test and agnostic to VoIP-related trafficcharacteristics, is used to detect Skype's fingerprint from the packet framing structure, exploiting the randomness introduced at the bit level by the encryption process. Conversely, the second approach is based on a stochastic characterization of Skype traffic in terms of packet arrival rate and packet length, which are used as features of a decision process based on Naive Bayesian Classifiers.In order to assess the effectiveness of the above techniques, we develop an off-line cross-checking heuristic based on deep-packet inspection and flow correlation, which is interesting per se. This heuristic allows us to quantify the amount of false negatives and false positives gathered by means of the two proposed approaches: results obtained from measurements in different networks show that the technique is very effective in identifying Skype traffic. While both Bayesian classifier and packet inspection techniques are commonly used, the idea of leveraging on randomness to reveal traffic is novel. We adopt this to identify Skype traffic, but the same methodology can be applied to other classification problems as well.

References

  1. Skype web site, http://www.skype.comGoogle ScholarGoogle Scholar
  2. Hesiod, "Theogony", ca 700 BCGoogle ScholarGoogle Scholar
  3. S. A., Baset, H. Schulzrinne, "An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol". IEEE Infocom'06, Barcelona, Spain, Apr. 2006.Google ScholarGoogle ScholarCross RefCross Ref
  4. P. Biondi, F. Desclaux, "Silver Needle in the Skype". Black Hat Europe'06, Amsterdam, the Netherlands, Mar. 2006.Google ScholarGoogle Scholar
  5. S. Guha, N. Daswani and R. Jain, "An Experimental Study of the Skype Peer-to-Peer VoIP System", 5th Intl. Workshop on Peer-to-Peer Systems, Santa Barbara, CA, Feb. 2006.Google ScholarGoogle Scholar
  6. K. Ta Chen, C. Y. Huang, P. Huang, C. L. Lei, "Quantifying Skype User Satisfaction", ACM Sigcomm'06, Pisa, Italy, Sep. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. K. Suh, D. R. Figuieredo, J. Kurose, D. Towsley, "Characterizing and detecting relayed traffic: A case study using Skype", IEEE Infocom'06, Barcelona, Spain, Apr. 2006.Google ScholarGoogle Scholar
  8. M. Carson, D. Santay, "NIST Net: a Linux-based network emulation tool". ACM SIGCOMM Computer Communication Review, V.33, N.3, July 2003, pp:111--126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. GlobalIPSound web site, http://www.globalipsound.com/Google ScholarGoogle Scholar
  10. T. Berson, "Skype Security Evaluation". Online report, http://www.skype.com/security/files/2005-031securityevaluation.pdf, Oct.2005.Google ScholarGoogle Scholar
  11. D. S. Sivia, "Data Analysis: A Bayesian Tutorial". Oxford University Press, Sep. 1996.Google ScholarGoogle Scholar
  12. A. Moore, D. Zuev, "Internet Traffic Classification Using Bayesian Analysis Techniques". ACM SIGMETRICS'05, Banff, CA, Jun. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. FastWeb web site, http://company.fastweb.it/Google ScholarGoogle Scholar
  14. M. Mellia, R. Lo Cigno, F. Neri, "Measuring IP and TCP behavior on edge nodes with Tstat", Computer Networks, Vol. 47, No. 1, pp.1--21, Jan 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. H. Schulzrinne, S. Casner, R. Frederick, V. Jacobson, "RTP: A Transport Protocol for Real-Time Applications", RFC 3550, Jul. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. E. Rescorla, "HTTP Over TLS", RFC 2818, May 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. Lehtinen, C. Lonvick, "The Secure Shell (SSH) Protocol Assigned Numbers", RFC 4250, Jan. 2006.Google ScholarGoogle Scholar

Index Terms

  1. Revealing skype traffic: when randomness plays with you

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM SIGCOMM Computer Communication Review
            ACM SIGCOMM Computer Communication Review  Volume 37, Issue 4
            October 2007
            420 pages
            ISSN:0146-4833
            DOI:10.1145/1282427
            Issue’s Table of Contents
            • cover image ACM Conferences
              SIGCOMM '07: Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
              August 2007
              432 pages
              ISBN:9781595937131
              DOI:10.1145/1282380

            Copyright © 2007 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 27 August 2007

            Check for updates

            Qualifiers

            • article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader