DocumentCode :
2441371
Title :
Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics
Author :
Leung, Chun-Ming ; Chan, Yuen-Yan
Author_Institution :
Chinese Univ. of Hong Kong, Shatin
fYear :
2007
fDate :
18-20 June 2007
Firstpage :
401
Lastpage :
408
Abstract :
Skype is a popular peer-to-peer (P2P) voice over IP (VoIP) application evolving quickly since its launch in 2003. However, the ability to traverse network address translation (NAT) and bypass firewalls, as well as the induced bandwidth burden due to the super node (SN) mechanism, make Skype considerably a threat to enterprise networks security and availability. Because Skype uses both encryption and overlays, detection and blocking of Skype is non- trivial. Motivated by the work ofBiondi and Desclaux [3], we adopt the view of Skype as a backdoor and we take a forensic approach to analyze it. We share our experience in this paper. With the forensic evidence, we identify a transport layer communication framework for Skype. We further formulate a set of socket-based detection and control policies for Skype traffics. Our detection method is a hybrid between payload and non-payload inspections, with improved accuracy and version sustainability over the traditional payload-only approaches. Our solution is practicable both inside and outside the NAT firewalls. This breakthrough makes the detection, blocking, and prioritization of Skype traffics possible in both the enterprise internal networks and the Internet Services Providers carrier networks.
Keywords :
Internet telephony; authorisation; peer-to-peer computing; telecommunication security; telecommunication traffic; Internet Services Providers; Skype traffics blocking; Skype traffics detection; encrypted peer-to-peer VoIP traffics; enterprise networks security; firewalls; network address translation; network forensic; nonpayload inspections; payload inspections; socket-based detection; super node mechanism; transport layer communication framework; Bandwidth; Communication system traffic control; Cryptography; Forensics; Internet telephony; Network address translation; Payloads; Peer to peer computing; Telecommunication traffic; Tin;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Enabling Technologies: Infrastructure for Collaborative Enterprises, 2007. WETICE 2007. 16th IEEE International Workshops on
Conference_Location :
Evry
ISSN :
1524-4547
Print_ISBN :
978-0-7695-2879-3
Type :
conf
DOI :
10.1109/WETICE.2007.4407198
Filename :
4407198
Link To Document :
بازگشت