Abstract
The Internet telephony application Skype is well-known for its capability to intelligently tunnel through firewalls by selecting customized ports and encrypting its traffic to evade content based filtering. Although this capability may give some convenience to Skype users, it increases the difficulty of managing firewalls to filter out unwanted traffic. In this paper, we propose two different schemes, namely payload-based and non-payload based, for identification of Skype traffic. As payload based identification is not always practical due to legal, privacy, performance, protocol change and software upgrade issues, we focus on the non-payload based scheme, and use the payload based scheme mainly to verify its non-payload based counterpart. Our research results reveal that, at least to a certain extent, encryption by Skype to evade content analysis can be overcome.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Ethereal, http://www.ethereal.com
http://www.microsoft.com/windows/windowsmedia/serve/firewall.aspx#portallocation
Pescape, A., Dainottiand, A., Ventre, G.: A Packet-level Traffic Model of Startcraft. In: Proceedings of the 2005 Second International Workshop on Hot Topics in Peer-to-Peer Systems, pp. 33–42. IEEE, Los Alamitos (2005)
Anonymous. Why is Skype better than Net2Phone, ICQ, AIM, MSN, etc?, http://support.skype.com/index.php?_a=knowledgebase&_j=questiondetails&_i=70&nav2=General
Chen, K., Huang, P., Huang, C., Lei, C.: Game Traffic Analysis: An MMORPG Perspective. In: Proceedings of NOSSDAV (2005)
Suh, K., Figueiredo, R., Kurose, J., Towsley, D.: Characterizing and Detecting Skype-Relayed Traffic. In: Proceedings of IEEE Infocom, Barcelona (April 2006)
Winslow, J., Claypool, M., LaPoint, D.: Network Analysis of Counter-strike and Starcraft. In: Proceedings of 22nd IEEE International Performance, Computering and Communication Conference (IPCCC), Phoenix, Arizona, USA, April 2003. IEEE, Los Alamitos (2003)
McCreary, S., Claffy, K.: Trends in Wide Area IP Traffic Pattern: A View from Ames Internet Exchange. In: Proceedings of ITC Specialist Seminar on Measurement and Modeling of IP Traffic, pp. 1–11. Cooperative Association for Internet Data Analysis (CAIDA) (September 2000)
Mena, A., Heidemann, J.: An Empirical Study of Real Audio Traffic. In: Proceedings of the IEEE Infocom, Tel-Aviv, Israel, March 2000, pp. 101–110. IEEE, Los Alamitos (2000)
Baset, S.A., Schulzrinne, H.: An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol. Technical report, Department of Computer Science. Columbia University, New York (2004)
Guha, S., Daswani, N., Jain, R.: An Experimental Study of the Skype Peer-to-Peer VoIP System. In: Proceedings of IPTPS 2006, Santa Barbara, CA (February 2006)
Sen, S., Spatscheck, O., Wang, D.: Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures. In: Proceedings International WWW Conference, New York, USA (2004)
Skype FAQ, http://www.skype.com/help_faq.html
Faloutsos, M., Claffy, K., Karagiannis, T., Broido, A.: Transport Layer Identification of P2P Traffic. In: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, Taormina, Sicily, Italy, pp. 121–134. ACM Press, New York (2004)
Berson, T.: Skype Security Evaluation. Technical report, Anagram Laboratories (October 2005)
Verso Technologies. Verso Netspective Enterprise, http://www.verso.com/enterprise/netspective/netspective_brochure.pdf
Feng, W., Chang, F., Feng, W., Walpole, J.: A Traffic Characterization of Popular On-Line Games. IEEE/ACM Transactions On Networking 13(3), 488–500 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lu, L., Horton, J., Safavi-Naini, R., Susilo, W. (2008). Transport Layer Identification of Skype Traffic. In: Vazão, T., Freire, M.M., Chong, I. (eds) Information Networking. Towards Ubiquitous Networking and Services. ICOIN 2007. Lecture Notes in Computer Science, vol 5200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89524-4_47
Download citation
DOI: https://doi.org/10.1007/978-3-540-89524-4_47
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-89523-7
Online ISBN: 978-3-540-89524-4
eBook Packages: Computer ScienceComputer Science (R0)