{"id":"https://openalex.org/W2150779517","doi":"https://doi.org/10.1145/1282380.1282386","title":"Revealing skype traffic","display_name":"Revealing skype traffic","publication_year":2007,"publication_date":"2007-08-27","ids":{"openalex":"https://openalex.org/W2150779517","doi":"https://doi.org/10.1145/1282380.1282386","mag":"2150779517"},"language":"en","primary_location":{"id":"doi:10.1145/1282380.1282386","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1282380.1282386","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070658637","display_name":"Dario Bonfiglio","orcid":null},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Dario Bonfiglio","raw_affiliation_strings":["Politecnico di Torino, Torino, Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino, Torino, Italy","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060087704","display_name":"Marco Mellia","orcid":"https://orcid.org/0000-0003-1859-6693"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Marco Mellia","raw_affiliation_strings":["Politecnico di Torino, Torino, Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino, Torino, Italy","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065722419","display_name":"Michela Meo","orcid":"https://orcid.org/0000-0001-7403-6266"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Michela Meo","raw_affiliation_strings":["Politecnico di Torino, Torino, Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino, Torino, Italy","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052449763","display_name":"Dario Rossi","orcid":"https://orcid.org/0000-0003-3936-8876"},"institutions":[{"id":"https://openalex.org/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https://ror.org/01naq7912","country_code":"FR","type":"education","lineage":["https://openalex.org/I12356871","https://openalex.org/I205703379","https://openalex.org/I4210145102"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Dario Rossi","raw_affiliation_strings":["ENST T\u00e9l\u00e9com Paris, Paris, France"],"affiliations":[{"raw_affiliation_string":"ENST T\u00e9l\u00e9com Paris, Paris, France","institution_ids":["https://openalex.org/I12356871"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007069218","display_name":"Paolo Tofanelli","orcid":null},"institutions":[{"id":"https://openalex.org/I4210097600","display_name":"Motorola (Italy)","ror":"https://ror.org/00chw7248","country_code":"IT","type":"company","lineage":["https://openalex.org/I1333370159","https://openalex.org/I4210097600"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Paolo Tofanelli","raw_affiliation_strings":["Motorola Inc., Torino, Italy"],"affiliations":[{"raw_affiliation_string":"Motorola Inc., Torino, Italy","institution_ids":["https://openalex.org/I4210097600"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5070658637"],"corresponding_institution_ids":["https://openalex.org/I177477856"],"apc_list":null,"apc_paid":null,"fwci":38.4781,"has_fulltext":false,"cited_by_count":269,"citation_normalized_percentile":{"value":0.99820299,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"37","last_page":"48"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8464230895042419},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.7434195280075073},{"id":"https://openalex.org/keywords/voice-over-ip","display_name":"Voice over IP","score":0.7107504606246948},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.6697680354118347},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6458848118782043},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5501384139060974},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.5281809568405151},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.48575833439826965},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4521966576576233},{"id":"https://openalex.org/keywords/python","display_name":"Python (programming language)","score":0.42589062452316284},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3447551131248474},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.33918070793151855},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.32719871401786804},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.21861660480499268}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8464230895042419},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.7434195280075073},{"id":"https://openalex.org/C171246234","wikidata":"https://www.wikidata.org/wiki/Q81945","display_name":"Voice over IP","level":3,"score":0.7107504606246948},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.6697680354118347},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6458848118782043},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5501384139060974},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.5281809568405151},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.48575833439826965},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4521966576576233},{"id":"https://openalex.org/C519991488","wikidata":"https://www.wikidata.org/wiki/Q28865","display_name":"Python (programming language)","level":2,"score":0.42589062452316284},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3447551131248474},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33918070793151855},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.32719871401786804},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.21861660480499268},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1282380.1282386","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1282380.1282386","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4300000071525574,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W122591841","https://openalex.org/W1550768496","https://openalex.org/W1656502710","https://openalex.org/W2012095206","https://openalex.org/W2076226477","https://openalex.org/W2099040451","https://openalex.org/W2102351657","https://openalex.org/W2120298561","https://openalex.org/W2146822278","https://openalex.org/W2241474894","https://openalex.org/W2807981689","https://openalex.org/W4213190682","https://openalex.org/W4244328360","https://openalex.org/W4255738146","https://openalex.org/W6604936284","https://openalex.org/W6633101944","https://openalex.org/W7036969914"],"related_works":["https://openalex.org/W2041550843","https://openalex.org/W2537489883","https://openalex.org/W3119500019","https://openalex.org/W2017644937","https://openalex.org/W1976515580","https://openalex.org/W2917586021","https://openalex.org/W3011161512","https://openalex.org/W2928278548","https://openalex.org/W2978828483","https://openalex.org/W4301866626"],"abstract_inverted_index":{"Skype":[0,27,118,208,237],"is":[1,84,111,166,203,230],"a":[2,21,51,59,114,135],"very":[3,43,204],"popular":[4],"VoIP":[5],"software":[6],"which":[7,129,165],"has":[8],"recently":[9],"attracted":[10],"the":[11,14,91,96,100,104,108,146,149,176,188,201,221,240],"attention":[12],"of":[13,117,122,134,148,178,187,223],"research":[15],"community":[16],"and":[17,24,29,79,126,162,181,214],"network":[18],"operators.":[19],"Following":[20],"closed":[22],"source":[23],"proprietary":[25],"design,":[26],"protocols":[28],"algorithms":[30],"are":[31,37,130,218],"unknown.":[32],"Moreover,":[33],"strong":[34],"encryption":[35,105],"mechanisms":[36],"adopted":[38],"by":[39,103,185],"Skype,":[40],"making":[41],"it":[42],"difficult":[44],"to":[45,66,81,86,144,174,227,235,246],"even":[46],"glimpse":[47],"its":[48],"presence":[49],"from":[50,90,194],"traffic":[52,119,229],"aggregate.":[53],"In":[54],"this":[55,234],"paper,":[56],"we":[57,152],"propose":[58],"framework":[60],"based":[61,75,112,138,158],"on":[62,76,113,139,159,225],"two":[63,189],"complementary":[64],"techniques":[65,217],"reveal":[67,228],"Skypetraffic":[68],"in":[69,120,196,206],"real":[70],"time.":[71],"The":[72],"first":[73],"approach,":[74],"Pearson'sChi-Square":[77],"test":[78],"agnostic":[80],"VoIP-related":[82],"trafficcharacteristics,":[83],"used":[85,131],"detect":[87],"Skype's":[88],"fingerprint":[89],"packet":[92,123,127,215],"framing":[93],"structure,":[94],"exploiting":[95],"randomness":[97,226],"introduced":[98],"at":[99],"bit":[101],"level":[102],"process.":[106],"Conversely,":[107],"second":[109],"approach":[110],"stochastic":[115],"characterization":[116],"terms":[121],"arrival":[124],"rate":[125],"length,":[128],"as":[132,250],"features":[133],"decision":[136],"process":[137],"Naive":[140],"Bayesian":[141,212],"Classifiers.In":[142],"order":[143],"assess":[145],"effectiveness":[147],"above":[150],"techniques,":[151],"develop":[153],"an":[154],"off-line":[155],"cross-checking":[156],"heuristic":[157,171],"deep-packet":[160],"inspection":[161,216],"flow":[163],"correlation,":[164],"interesting":[167],"per":[168],"se.":[169],"This":[170],"allows":[172],"us":[173],"quantify":[175],"amount":[177],"false":[179,182],"negatives":[180],"positives":[183],"gathered":[184],"means":[186],"proposed":[190],"approaches:":[191],"results":[192],"obtained":[193],"measurements":[195],"different":[197],"networks":[198],"show":[199],"that":[200],"technique":[202],"effective":[205],"identifying":[207],"traffic.":[209],"While":[210],"both":[211],"classifier":[213],"commonly":[219],"used,":[220],"idea":[222],"leveraging":[224],"novel.":[231],"We":[232],"adopt":[233],"identify":[236],"traffic,":[238],"but":[239],"same":[241],"methodology":[242],"can":[243],"be":[244],"applied":[245],"other":[247],"classification":[248],"problems":[249],"well.":[251]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":11},{"year":2019,"cited_by_count":11},{"year":2018,"cited_by_count":9},{"year":2017,"cited_by_count":10},{"year":2016,"cited_by_count":13},{"year":2015,"cited_by_count":16},{"year":2014,"cited_by_count":18},{"year":2013,"cited_by_count":27},{"year":2012,"cited_by_count":23}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
