skip to main content
10.1145/1542245.1542266acmconferencesArticle/Chapter ViewAbstractPublication PagesmmsysConference Proceedingsconference-collections
research-article

Rapid identification of Skype traffic flows

Authors Info & Claims
Published:03 June 2009Publication History

ABSTRACT

In this paper we present results of experimental work using machine learning techniques to rapidly identify Skype traffic. We show that Skype traffic can be identified by observing 5 seconds of a Skype traffic flow, with recall and precision better than 98%. We found the most effective features for classification were characteristic packet lengths less than 80 bytes, statistics of packet lengths greater than 80 bytes and inter-packet arrival times. Our classifiers do not rely on observing any particular part of a flow. We also report on the performance of classifiers built using combinations of two of these features and of each feature in isolation.

References

  1. Baset, S., Schulzrinne, H. 2006 An analysis of the Skype peer-to-peer Internet Telephony Protocol, IEEE INFOCOM'06.Google ScholarGoogle ScholarCross RefCross Ref
  2. Ebay results report, 3rd quarter 2008. http://investor.ebay.com/results.cfm, accessed 13 February 2009.Google ScholarGoogle Scholar
  3. Skype website, http://www.skype.com, accessed 13 February 2009.Google ScholarGoogle Scholar
  4. Bonfiglio, D., Mellia, M., Meo, M., Rossi, D., Tofanelli, P. 2007 Revealing Skype traffic: When Randomness Plays with you, ACM SIGCOMM'07. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Bonfiglio, D., Mellia, M., Meo, M., Rossi, D. 2009 Detailed Analysis of Skype Traffic, IEEE Transactions on Multimedia, vol 11, no1, pp. 117--127. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Suh, K., Figuiredo, D., Kurose, J., Towsley, D. 2006 Characterising and Detecting Skype Relayed Traffic, IEEE INFOCOM'06.Google ScholarGoogle Scholar
  7. CALEA Online, http://www.calea.org, accessed 13 February 2009.Google ScholarGoogle Scholar
  8. Upson, S. 2007 Wiretapping Woes, IEEE Spectrum, May 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Maloku, N., Aljaz, T., Dolenc, F. 2003 Legal Call Interception in Next Generation Networks, Proceedings of the 7th International Conference on Telecommunications.Google ScholarGoogle ScholarCross RefCross Ref
  10. Baker, F., Foster, B., Sharp, C. 2004 Internet Engineering Task Force, Cisco Architecture for Lawful Intercept in IP Networks, http://www.ietf.org/rfc/rfc3924.txt, Accessed 13 February 2009.Google ScholarGoogle Scholar
  11. Bellovein, S., Blaze, M., Bricell, E., Brooks, C., Cerf, V., Diffie, W., Landau, S., Peterson, J., Treichler, J. 2006 Security Implications of Applying Communications Assistance to Law Enforcement Act to Voice over IP, Information Technology Association of America.Google ScholarGoogle Scholar
  12. Nguyen, T. and Armitage, G. 2008 A Survey of Techniques for Internet Traffic Classification using Machine Learning, IEEE Communications Surveys & Tutorials, vol. 10 no. 4. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Lindblom, J. 2005 A sinusoidal voice over packet coder tailored for the frame-erasure channel, IEEE Transactions on Speech and Audio Processing, vol. 13, no. 5, pp. 787--798.Google ScholarGoogle ScholarCross RefCross Ref
  14. Witten, I., Frank, E. 2005 Data Mining: Practical Machine Learning Tools and Techniques, 2nd Ed, Elsevier Inc, San Fransciso, CA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Tcpdump, http://www.tcpdump.org, Accessed 13 February 2009.Google ScholarGoogle Scholar
  16. University of Twente, Traffic Measurement Data Repository http://traces.simpleweb.org/, Accessed 13 February 2009.Google ScholarGoogle Scholar
  17. Netmate, http://www.ip-measurement.org/tools/netmate, Accessed 13 February 2009.Google ScholarGoogle Scholar
  18. R, The R Project for Statistical Computing, http://www.r-project.org, Accessed 13 February 2009.Google ScholarGoogle Scholar
  19. Williams, N., Zander, S., Armitage, G. 2006 A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification, ACM SIGCOMM Computer Communication Review, vol. 36 no. 5 pp. 7--15. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. But, J., Armitage, G., Stewart, L. 2008 Outsourcing Automated QoS Control of Home Routers for a Better Online Game Experience IEEE Communications, vol. 46 no. 12 pp. 64--70. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Nguyen, T., Armitage, G. 2006 Training on multiple sub-flows to optimise the use of Machine Learning classifiers in real-world IP networks in IEEE 31st Conference on Local Computer Networks, pp. 369--376. Tampa, Florida, USA.Google ScholarGoogle Scholar
  22. Nguyen, T., Armitage, G. 2006 Synthetic Sub-flow Pairs for Timely and Stable IP Traffic Identification in Australian Telecommunication Networks and Application Conference 2006, pp. 293--297. Melbourne, Australia.Google ScholarGoogle Scholar

Index Terms

  1. Rapid identification of Skype traffic flows

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        NOSSDAV '09: Proceedings of the 18th international workshop on Network and operating systems support for digital audio and video
        June 2009
        142 pages
        ISBN:9781605584331
        DOI:10.1145/1542245

        Copyright © 2009 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 3 June 2009

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate118of363submissions,33%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader