Skip to main content

Transport Layer Identification of Skype Traffic

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 5200))

Abstract

The Internet telephony application Skype is well-known for its capability to intelligently tunnel through firewalls by selecting customized ports and encrypting its traffic to evade content based filtering. Although this capability may give some convenience to Skype users, it increases the difficulty of managing firewalls to filter out unwanted traffic. In this paper, we propose two different schemes, namely payload-based and non-payload based, for identification of Skype traffic. As payload based identification is not always practical due to legal, privacy, performance, protocol change and software upgrade issues, we focus on the non-payload based scheme, and use the payload based scheme mainly to verify its non-payload based counterpart. Our research results reveal that, at least to a certain extent, encryption by Skype to evade content analysis can be overcome.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ethereal, http://www.ethereal.com

  2. http://asia-en.real.com/guide/radio/list.html

  3. http://service.real.com/firewall/rplay.html

  4. http://www.microsoft.com/windows/windowsmedia/serve/firewall.aspx#portallocation

  5. http://www.websense.com

  6. Pescape, A., Dainottiand, A., Ventre, G.: A Packet-level Traffic Model of Startcraft. In: Proceedings of the 2005 Second International Workshop on Hot Topics in Peer-to-Peer Systems, pp. 33–42. IEEE, Los Alamitos (2005)

    Google Scholar 

  7. Anonymous. Why is Skype better than Net2Phone, ICQ, AIM, MSN, etc?, http://support.skype.com/index.php?_a=knowledgebase&_j=questiondetails&_i=70&nav2=General

  8. Chen, K., Huang, P., Huang, C., Lei, C.: Game Traffic Analysis: An MMORPG Perspective. In: Proceedings of NOSSDAV (2005)

    Google Scholar 

  9. Suh, K., Figueiredo, R., Kurose, J., Towsley, D.: Characterizing and Detecting Skype-Relayed Traffic. In: Proceedings of IEEE Infocom, Barcelona (April 2006)

    Google Scholar 

  10. Winslow, J., Claypool, M., LaPoint, D.: Network Analysis of Counter-strike and Starcraft. In: Proceedings of 22nd IEEE International Performance, Computering and Communication Conference (IPCCC), Phoenix, Arizona, USA, April 2003. IEEE, Los Alamitos (2003)

    Google Scholar 

  11. McCreary, S., Claffy, K.: Trends in Wide Area IP Traffic Pattern: A View from Ames Internet Exchange. In: Proceedings of ITC Specialist Seminar on Measurement and Modeling of IP Traffic, pp. 1–11. Cooperative Association for Internet Data Analysis (CAIDA) (September 2000)

    Google Scholar 

  12. Mena, A., Heidemann, J.: An Empirical Study of Real Audio Traffic. In: Proceedings of the IEEE Infocom, Tel-Aviv, Israel, March 2000, pp. 101–110. IEEE, Los Alamitos (2000)

    Google Scholar 

  13. Baset, S.A., Schulzrinne, H.: An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol. Technical report, Department of Computer Science. Columbia University, New York (2004)

    Google Scholar 

  14. Guha, S., Daswani, N., Jain, R.: An Experimental Study of the Skype Peer-to-Peer VoIP System. In: Proceedings of IPTPS 2006, Santa Barbara, CA (February 2006)

    Google Scholar 

  15. Sen, S., Spatscheck, O., Wang, D.: Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures. In: Proceedings International WWW Conference, New York, USA (2004)

    Google Scholar 

  16. Skype FAQ, http://www.skype.com/help_faq.html

  17. Faloutsos, M., Claffy, K., Karagiannis, T., Broido, A.: Transport Layer Identification of P2P Traffic. In: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, Taormina, Sicily, Italy, pp. 121–134. ACM Press, New York (2004)

    Google Scholar 

  18. Berson, T.: Skype Security Evaluation. Technical report, Anagram Laboratories (October 2005)

    Google Scholar 

  19. Verso Technologies. Verso Netspective Enterprise, http://www.verso.com/enterprise/netspective/netspective_brochure.pdf

  20. Feng, W., Chang, F., Feng, W., Walpole, J.: A Traffic Characterization of Popular On-Line Games. IEEE/ACM Transactions On Networking 13(3), 488–500 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lu, L., Horton, J., Safavi-Naini, R., Susilo, W. (2008). Transport Layer Identification of Skype Traffic. In: Vazão, T., Freire, M.M., Chong, I. (eds) Information Networking. Towards Ubiquitous Networking and Services. ICOIN 2007. Lecture Notes in Computer Science, vol 5200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89524-4_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-89524-4_47

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-89523-7

  • Online ISBN: 978-3-540-89524-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics