Revealing Skype traffic: When randomness plays with you

被引:134
作者
Bonfiglio, Dario [1 ]
Mellia, Marco
Meo, Michela
Rossi, Dario
Tofanelli, Paolo
机构
[1] Politecn Torino, Dipartimento Elettron, Turin, Italy
[2] ENST Telecom Paris, Informat & Reseaux, Paris, France
[3] Motorola Inc, Turin, Italy
关键词
experimentation; measurement; traffic identification; passive measurement; naive Bayesian classification; Pearson Chi-Square test; deep packet inspection;
D O I
10.1145/1282427.1282386
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Skype is a very popular VoIP software which has recently attracted the attention of the research community and network operators. Following a closed source and proprietary design, Skype protocols and algorithms are unknown. Moreover, strong encryption mechanisms are adopted by Skype, making it very difficult to even glimpse its presence from a traffic aggregate. In this paper, we propose a framework based on two complementary techniques to reveal Skype traffic in real time. The first approach, based on Pearson's Chi-Square test and agnostic to VoIP-related traffic characteristics, is used to detect Skype's fingerprint from the packet framing structure, exploiting the randomness introduced at the bit level by the encryption process. Conversely, the second approach is based on a stochastic characterization of Skype traffic in terms of packet arrival rate and packet length, which are used as features of a decision process based on Naive Bayesian Classifiers. In order to assess the effectiveness of the above techniques, we develop an off-line cross-checking heuristic based on deep-packet inspection and flow correlation, which is interesting per se. This heuristic allows us to quantify the amount of false negatives and false positives gathered by means of the two proposed approaches: results obtained from measurements in different networks show that the technique is very effective in identifying Skype traffic. While both Bayesian classifier and packet inspection techniques are commonly used, the idea of leveraging on randomness to reveal traffic is novel. We adopt this to identify Skype traffic, but the same methodology can be applied to other classification problems as well.
引用
收藏
页码:37 / 48
页数:12
相关论文
共 13 条
  • [1] Baset S., 2006, IEEE INFOCOM 06 BARC
  • [2] Berson T., SKYPE SECURITY EVALU
  • [3] BIONDI P, 2006, BLACK HAT EUROPE 06
  • [4] NIST Net - A linux-based network emulation tool
    Carson, M
    Santay, D
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2003, 33 (03) : 111 - 126
  • [5] CHEN KT, 2006, ACM SIGCOMM 06 PIS I
  • [6] GUHA S, 2006, 5 INT WORKSH PEER TO
  • [7] Lehtinen S., 2006, 4250 RFC
  • [8] Mellia M, 2005, COMPUT NETW, V47, P1, DOI [10.1016/S1389-1286(04)00201-4, 10.1016/j.comnet.2004.06.026]
  • [9] Moore A. W., 2005, ACM SIGMETRICS 05 BA
  • [10] Rescorla Eric., 2000, HTTP TLS