26
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users' Privacy

      Preprint
      , , , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          In this paper, we show how to exploit real-time communication applications to determine the IP address of a targeted user. We focus our study on Skype, although other real-time communication applications may have similar privacy issues. We first design a scheme that calls an identified targeted user inconspicuously to find his IP address, which can be done even if he is behind a NAT. By calling the user periodically, we can then observe the mobility of the user. We show how to scale the scheme to observe the mobility patterns of tens of thousands of users. We also consider the linkability threat, in which the identified user is linked to his Internet usage. We illustrate this threat by combining Skype and BitTorrent to show that it is possible to determine the file-sharing usage of identified users. We devise a scheme based on the identification field of the IP datagrams to verify with high accuracy whether the identified user is participating in specific torrents. We conclude that any Internet user can leverage Skype, and potentially other real-time communication systems, to observe the mobility and file-sharing usage of tens of millions of identified users.

          Related collections

          Most cited references1

          • Record: found
          • Abstract: not found
          • Article: not found

          Why and How to Perform Fraud Experiments

            Bookmark

            Author and article information

            Journal
            19 September 2011
            2011-10-16
            Article
            1109.4039
            7b63f1e7-9751-4878-8083-bcab02ec140c

            http://arxiv.org/licenses/nonexclusive-distrib/1.0/

            History
            Custom metadata
            This is the authors' version of the ACM/USENIX Internet Measurement Conference (IMC) 2011 paper
            cs.NI
            ccsd

            Comments

            Comment on this article