Skip to main content

Identifying Skype Nodes in the Network Exploiting Mutual Contacts

  • Conference paper
  • 1162 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 7189))

Abstract

In this paper we present an algorithm that is able to progressively discover nodes of a Skype overlay P2P network. Most notably, super nodes in the network core. Starting from a single, known Skype node, we can easily identify other Skype nodes in the network, through the analysis of widely available and standardized IPFIX (NetFlow) data. Instead of relying on the analysis of content characteristics or packet properties of the flow itself, we monitor connections of known Skype nodes in the network and then progressively discover the other nodes through the analysis of their mutual contacts.

This material is based upon work supported by the ITC-A of the US Army under Contract W911NF-12-1-0028 and by ONR Global under the Department of the Navy Grant N62909-11-1-7036. Also supported by Czech Ministry of Education grant MSMT ME10051 and MVCR Grant number VG2VS/189.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Skype Traces, http://tstat.tlc.polito.it/traces-skype.shtml (acc. May 11, 2011)

  2. Baset, S.A., Schulzrinne, H.G.: An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol. In: Proceedings of 25th IEEE International Conference on Computer Communications, IEEE INFOCOM 2006, pp. 1–11. IEEE (2006)

    Google Scholar 

  3. Bonfiglio, D., Mellia, M., Meo, M., Rossi, D., Tofanelli, P.: Revealing skype traffic: when randomness plays with you. ACM SIGCOMM Computer Communication Review 37(4), 37–48 (2007)

    Article  Google Scholar 

  4. Coskun, B., Dietrich, S., Memon, N.: Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts. In: Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC 2010, pp. 131–140. ACM, New York (2010)

    Google Scholar 

  5. Ehlert, S., Petgang, S., Magedanz, T.: Analysis and signature of Skype VoIP session traffic. In: 4th IASTED International (2006)

    Google Scholar 

  6. Guha, S., Daswani, N., Jain, R.: An experimental study of the skype peer-to-peer voip system. In: Proceedings of IPTPS, vol. 6, pp. 5–10. Citeseer (2006)

    Google Scholar 

  7. Haq, I.U., Ali, S., Khan, H., Khayam, S.A.: What Is the Impact of P2P Traffic on Anomaly Detection? In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 1–17. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  8. Parkes, P.: 30 million people online on Skype (2011), http://blogs.skype.com/en/2011/03/30_million_people_online.html (acc. August 24, 2011)

  9. Rossi, D., Mellia, M., Meo, M.: Following skype signaling footsteps. In: 2008 4th International Telecommunication Networking Workshop on QoS in Multiservice IP Networks, pp. 248–253. IEEE (February 2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 IFIP International Federation for Information Processing

About this paper

Cite this paper

Jusko, J., Rehak, M. (2012). Identifying Skype Nodes in the Network Exploiting Mutual Contacts. In: Pescapè, A., Salgarelli, L., Dimitropoulos, X. (eds) Traffic Monitoring and Analysis. TMA 2012. Lecture Notes in Computer Science, vol 7189. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28534-9_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28534-9_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28533-2

  • Online ISBN: 978-3-642-28534-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics