A Novel Protocol Design and Collaborative Forensics Mechanism for VoIP Services
نویسندگان
چکیده
The simplicity and low cost of Voice over Internet Protocol (VoIP) services has made these services increasingly popular as the Internet has grown. Unfortunately, these advantages of VoIP are attractive to both legitimate and nefarious users, and VoIP is often used by criminals to communicate and conduct illegal activities (such as fraud or blackmail) without being intercepted by Law Enforcement Agencies (LEAs). However, VoIP can also increase the efficiency of law enforcement and forensic collaboration. Currently, VoIP researchers have only proposed a framework for this type of partnership, and have yet to provide a common protocol for forensic Internet collaboration. As a result, Internet-based collaboration between agencies is not widespread. Building from the Collaborative Forensics Mechanism (CFM) and the procedures of collaborative forensics work, this paper designs a novel application-layer Collaborative Forensics Protocol (CFP) to overcome the current framework-protocol gap. Here, CFP can exchange collaborative request and response messages between collaborative forensics region centers (CFRCs) to acquire collaborative forensics information. We present a procedure for collaborative forensics and discuss the details of protocol design. In addition, we discuss the defense of PKI working with CFM against various types of attacks and analyze the features of CFP.
منابع مشابه
A Collaborative Forensics Framework for VoIP Services in Multi-network Environments
We propose a collaborative forensics framework to trace back callers of VoIP services in a multi-network environment. The paper is divided into two parts. The first part discusses the critical components of SIP-based telephony and determines the information needed for traceback in single and multiple Autonomous Systems (ASs). The second part proposes the framework and the entities of collaborat...
متن کاملInternet network design for quality of service guarantee using Data Envelopment Analysis (DEA)
By developing the new services such as VoIP and Videoconference, using a mechanism is needed to support the quality of service of the application programs. Different models have been presented to guarantee the quality of service. Among these, the differentiated services can be mentioned which was presented by IETF. In the architecture of the differentiated services, no admission control mechani...
متن کاملVoIP Forensic Analyzer
People have been utilizing Voice over Internet Protocol (VoIP) in most of the conventional communication facilities which has been of assistance in the enormous attenuation of operating costs, as well as the promotion of nextgeneration communication services-based IP. As an intimidating upshot, cyber criminals have correspondingly started interjecting the environment and creating new challenges...
متن کاملSecurity testing of session initiation protocol implementations
The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...
متن کاملModel-Driven Design of VoIP Services for E-Learning
Project-centered learning increasingly demands for communication tools to enhance learners’ virtual interaction. In the context of the COOPER EU project a model-based approach has been conceived to support and facilitate the introduction of a set of VoIP (Voice over IP) services within collaborative environments. This paper discusses the integration of two up-to-date technologies enabling Web a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JCM
دوره 7 شماره
صفحات -
تاریخ انتشار 2012