Abstract
In this paper we present an algorithm that is able to progressively discover nodes of a Skype overlay P2P network. Most notably, super nodes in the network core. Starting from a single, known Skype node, we can easily identify other Skype nodes in the network, through the analysis of widely available and standardized IPFIX (NetFlow) data. Instead of relying on the analysis of content characteristics or packet properties of the flow itself, we monitor connections of known Skype nodes in the network and then progressively discover the other nodes through the analysis of their mutual contacts.
This material is based upon work supported by the ITC-A of the US Army under Contract W911NF-12-1-0028 and by ONR Global under the Department of the Navy Grant N62909-11-1-7036. Also supported by Czech Ministry of Education grant MSMT ME10051 and MVCR Grant number VG2VS/189.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Skype Traces, http://tstat.tlc.polito.it/traces-skype.shtml (acc. May 11, 2011)
Baset, S.A., Schulzrinne, H.G.: An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol. In: Proceedings of 25th IEEE International Conference on Computer Communications, IEEE INFOCOM 2006, pp. 1–11. IEEE (2006)
Bonfiglio, D., Mellia, M., Meo, M., Rossi, D., Tofanelli, P.: Revealing skype traffic: when randomness plays with you. ACM SIGCOMM Computer Communication Review 37(4), 37–48 (2007)
Coskun, B., Dietrich, S., Memon, N.: Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts. In: Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC 2010, pp. 131–140. ACM, New York (2010)
Ehlert, S., Petgang, S., Magedanz, T.: Analysis and signature of Skype VoIP session traffic. In: 4th IASTED International (2006)
Guha, S., Daswani, N., Jain, R.: An experimental study of the skype peer-to-peer voip system. In: Proceedings of IPTPS, vol. 6, pp. 5–10. Citeseer (2006)
Haq, I.U., Ali, S., Khan, H., Khayam, S.A.: What Is the Impact of P2P Traffic on Anomaly Detection? In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 1–17. Springer, Heidelberg (2010)
Parkes, P.: 30 million people online on Skype (2011), http://blogs.skype.com/en/2011/03/30_million_people_online.html (acc. August 24, 2011)
Rossi, D., Mellia, M., Meo, M.: Following skype signaling footsteps. In: 2008 4th International Telecommunication Networking Workshop on QoS in Multiservice IP Networks, pp. 248–253. IEEE (February 2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Jusko, J., Rehak, M. (2012). Identifying Skype Nodes in the Network Exploiting Mutual Contacts. In: Pescapè, A., Salgarelli, L., Dimitropoulos, X. (eds) Traffic Monitoring and Analysis. TMA 2012. Lecture Notes in Computer Science, vol 7189. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28534-9_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-28534-9_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28533-2
Online ISBN: 978-3-642-28534-9
eBook Packages: Computer ScienceComputer Science (R0)