Forensic investigation framework for VoIP protocol
Title | Forensic investigation framework for VoIP protocol |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | Manesh, T., El-atty, S. M. A., Sha, M. M., Brijith, B., Vivekanandan, K. |
Conference Name | 2015 First International Conference on Anti-Cybercrime (ICACC) |
Date Published | nov |
Keywords | communication facilities, Computer crime, content level observation, cyber criminals, digital forensics, Electronic mail, forensic analysis, Forensics, Internet telephony, law enforcement system, malicious content, malicious users, network forensic investigation framework, network pattern analysis, next generation communication services-based IP, packet reordering, Ports (Computers), Protocols, pubcrawl170109, reconstruction algorithm, RTP, Servers, signalling protocols, SIP, Streaming media, Voice over Internet Protocol, VoIP, VoIP protocol, VoIP traffic, VoIP-RTP, VoIP-SIP |
Abstract | The deployment of Voice over Internet Protocol (VoIP) in place of traditional communication facilities has helped in huge reduction in operating costs, as well as enabled adoption of next generation communication services-based IP. At the same time, cyber criminals have also started intercepting environment and creating challenges for law enforcement system in any Country. At this instant, we propose a framework for the forensic analysis of the VoIP traffic over the network. This includes identifying and analyzing of network patterns of VoIP- SIP which is used for the setting up a session for the communication, and VoIP-RTP which is used for sending the data. Our network forensic investigation framework also focus on developing an efficient packet reordering and reconstruction algorithm for tracing the malicious users involved in conversation. The proposed framework is based on network forensics which can be used for content level observation of VoIP and regenerate original malicious content or session between malicious users for their prosecution in the court. |
DOI | 10.1109/Anti-Cybercrime.2015.7351935 |
Citation Key | manesh_forensic_2015 |
- packet reordering
- VoIP-SIP
- VoIP-RTP
- VoIP traffic
- VoIP protocol
- VoIP
- Voice over Internet Protocol
- Streaming media
- SIP
- signalling protocols
- Servers
- RTP
- reconstruction algorithm
- pubcrawl170109
- Protocols
- Ports (Computers)
- communication facilities
- next generation communication services-based IP
- network pattern analysis
- network forensic investigation framework
- malicious users
- malicious content
- law enforcement system
- Internet telephony
- Forensics
- forensic analysis
- Electronic mail
- Digital Forensics
- cyber criminals
- content level observation
- Computer crime