Identifying Skype nodes by NetFlow-based graph analysis

作者: Jan Jusko , Martin Rehak

DOI: 10.1109/IWCMC.2012.6314278

关键词:

摘要: In this paper we present an algorithm that is able to progressively discover nodes of a Skype overlay P2P network. Starting from single, known node, can easily identify other in the network, through analysis widely available and standardized IPFIX (NetFlow) data. Instead relying on content characteristics or packet properties, monitor connections network then their mutual contacts. We show our results are comparable methods using more complex data analytics. The use input allows for easy deployment onto real networks. Moreover, because approach requires only short processing times, it scales very well larger higher speed

参考文章(14)
D. Adami, C. Callegari, S. Giordano, M. Pagano, T. Pepe, A Real-Time Algorithm for Skype Traffic Detection and Classification NEW2AN '09 and ruSMART '09 Proceedings of the 9th International Conference on Smart Spaces and Next Generation Wired/Wireless Networking and Second Conference on Smart Spaces. ,vol. 5764, pp. 168- 179 ,(2009) , 10.1007/978-3-642-04190-7_16
Irfan Ul Haq, Sardar Ali, Hassan Khan, Syed Ali Khayam, None, What is the impact of p2p traffic on anomaly detection recent advances in intrusion detection. pp. 1- 17 ,(2010) , 10.1007/978-3-642-15512-3_1
Saikat Guha, Neil Daswani, Ravi Jain, An Experimental Study of the Skype Peer-to-Peer VoIP System international workshop on peer-to-peer systems. pp. 1- 6 ,(2005)
Brian Trammell, Elisa Boschi, Gregorio Procissi, Christian Callegari, Peter Dorfinger, Dominik Schatzmann, Identifying skype traffic in a large-scale flow data repository traffic monitoring and analysis. ,vol. 6613, pp. 72- 85 ,(2011) , 10.1007/978-3-642-20305-3_7
Philipp Svoboda, Esa Hyytiä, Fabio Ricciato, Markus Rupp, Martin Karner, Detection and Tracking of Skype by Exploiting Cross Layer Information in a Live 3G Network traffic monitoring and analysis. pp. 93- 100 ,(2009) , 10.1007/978-3-642-01645-5_11
Baris Coskun, Sven Dietrich, Nasir Memon, Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts annual computer security applications conference. pp. 131- 140 ,(2010) , 10.1145/1920261.1920283
Brian Trammell, Dominik Schatzmann, A tale of two outages: A study of the Skype network in distress international conference on wireless communications and mobile computing. pp. 1282- 1286 ,(2011) , 10.1109/IWCMC.2011.5982724
D. Bonfiglio, M. Mellia, M. Meo, D. Rossi, Detailed Analysis of Skype Traffic IEEE Transactions on Multimedia. ,vol. 11, pp. 117- 127 ,(2009) , 10.1109/TMM.2008.2008927
S. A. Baset, H. G. Schulzrinne, An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol ieee international conference computer and communications. pp. 1- 11 ,(2006) , 10.1109/INFOCOM.2006.312
PM Santiago Del Rio, Javier Ramos, José Luis García-Dorado, Javier Aracil, A Cuadra-Sánchez, M Cutanda-Rodríguez, None, On the processing time for detection of Skype traffic 2011 7th International Wireless Communications and Mobile Computing Conference. pp. 1784- 1788 ,(2011) , 10.1109/IWCMC.2011.5982805