Visible to the public Forensic investigation framework for VoIP protocol

TitleForensic investigation framework for VoIP protocol
Publication TypeConference Paper
Year of Publication2015
AuthorsManesh, T., El-atty, S. M. A., Sha, M. M., Brijith, B., Vivekanandan, K.
Conference Name2015 First International Conference on Anti-Cybercrime (ICACC)
Date Publishednov
Keywordscommunication facilities, Computer crime, content level observation, cyber criminals, digital forensics, Electronic mail, forensic analysis, Forensics, Internet telephony, law enforcement system, malicious content, malicious users, network forensic investigation framework, network pattern analysis, next generation communication services-based IP, packet reordering, Ports (Computers), Protocols, pubcrawl170109, reconstruction algorithm, RTP, Servers, signalling protocols, SIP, Streaming media, Voice over Internet Protocol, VoIP, VoIP protocol, VoIP traffic, VoIP-RTP, VoIP-SIP
Abstract

The deployment of Voice over Internet Protocol (VoIP) in place of traditional communication facilities has helped in huge reduction in operating costs, as well as enabled adoption of next generation communication services-based IP. At the same time, cyber criminals have also started intercepting environment and creating challenges for law enforcement system in any Country. At this instant, we propose a framework for the forensic analysis of the VoIP traffic over the network. This includes identifying and analyzing of network patterns of VoIP- SIP which is used for the setting up a session for the communication, and VoIP-RTP which is used for sending the data. Our network forensic investigation framework also focus on developing an efficient packet reordering and reconstruction algorithm for tracing the malicious users involved in conversation. The proposed framework is based on network forensics which can be used for content level observation of VoIP and regenerate original malicious content or session between malicious users for their prosecution in the court.

DOI10.1109/Anti-Cybercrime.2015.7351935
Citation Keymanesh_forensic_2015