A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Developing New Approaches for Intrusion Detection in Converged Networks
[chapter]
2011
VoIP Technologies
Current techniques dealing with evidence collection in converged networks are based on post-mortem (dead forensic) analysis. ...
The middle phases of the forensic process (i.e., the collection, examination, and analysis of the evidence) provide network investigators with a structured method to collect more and better evidence and ...
This book introduces research strategies that address various issues with the aim of enhancing VoIP quality. ...
doi:10.5772/13885
fatcat:jtuc2ttovfhafezsvvxjxfpndy
VoIP Forensic Analyzer
2016
International Journal of Advanced Computer Science and Applications
This paper presents an idea of a framework for the forensic analysis of the VoIP traffic over the network. ...
This forensic activity includes spotting and scrutinizing the network patterns of VoIP-SIP stream, which is used to initiate a session for the communication, and regenerate the content from VoIP-RTP stream ...
and digital evidence analysis practices [8]. ...
doi:10.14569/ijacsa.2016.070116
fatcat:zemrrbw5hbbovkonb3gzre2riy
A Novel Protocol Design and Collaborative Forensics Mechanism for VoIP Services
2012
Journal of Communications
We present a procedure for collaborative forensics and discuss the details of protocol design. ...
Building from the Collaborative Forensics Mechanism (CFM) and the procedures of collaborative forensics work, this paper designs a novel application-layer Collaborative Forensics Protocol (CFP) to overcome ...
the procedures that comprising units of the Collaborative Forensics Network follow for SIP-based VoIP services. ...
doi:10.4304/jcm.7.2.132-142
fatcat:w64db2ch5jbhdnoh3w54osaaua
A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing
2014
The Scientific World Journal
Network forensics enables investigation and identification of network attacks through the retrieved digital content. ...
However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms ...
VoIP network forensic analysis with digital evidence procedure (VoIP-NFDE) [88] lacks scalability because of the deployed analysis method. ...
doi:10.1155/2014/547062
pmid:25097880
pmcid:PMC4109117
fatcat:jpxfykm4mfba5ehjgydvyirzte
Cvoip-Fru: Comprehensive Voip Forensics Report Utility
2014
Zenodo
Therefore, in order to assist law enforcement with collecting forensically important information from variety of Betamax VoIP tools, CVOIP-FRU framework is developed. ...
Although there are a few VoIP forensic investigative applications available in the literature, most of them are particularly designed to collect evidence from the Skype product. ...
Overall, CVOIP-FRU's functionality will be instrumental for the VoIP Digital Evidence Forensics Standard Operating Procedure (DEFSOP) by gathering data that can be easily implemented into a report format ...
doi:10.5281/zenodo.1091145
fatcat:yqvjv226cngdph4jvd6fz7rq3m
Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics
2007
16th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2007)
With the forensic evidence, we identify a transport layer communication framework for Skype. We further formulate a set of socket-based detection and control policies for Skype traffics. ...
Skype is a popular peer-to-peer (P2P) voice over IP (VoIP) application evolving quickly since its launch in 2003. ...
Furthermore, we deal with the core properties of peer-to-peer and voice over IP protocol, these further increases the difficulty for Skype to evade the methods of detection discussed in this paper. ...
doi:10.1109/wetice.2007.4407198
fatcat:qpq2sppqaza6nkogvon2ftsmv4
Proposing a method for Skype Forensic-preserving data evidences to present in front of court of law
2016
Proceedings of the International Conference on Advances in Information Communication Technology & Computing - AICTC '16
Through this paper we will propose a forensic tool for Skype that will help investigator to collect the strong data evidence. ...
As per the perspective of Information Technology Act 2000/2008, to safeguard the legal admissibility of the digital records, it is mandatory to capture and preserve the digital evidences of digital data ...
These files need to be analyzed in order to get the proper evidences for preserving the evidences for the future forensic analysis. ...
doi:10.1145/2979779.2979882
fatcat:s4ke7f3vd5g2roezwjv7gwkv3a
Forensics Analysis of Android Mobile VoIP Apps
[chapter]
2017
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
This chapter presents analysis of forensically valuable remnants of three popular Mobile VoIP (mVoIP) apps on Google Play store, namely: Viber, Skype, and WhatsApp Messenger, in order to figure out to ...
Voice over Internet Protocol (VoIP) applications (apps) provide convenient and low cost means for users to communicate and share information with each other in real-time. ...
on the nature of digital evidence on mobile devices, along with a
complete guide on forensic techniques to handle, preserve, extract and analyze
evidence from mobile devices. ...
doi:10.1016/b978-0-12-805303-4.00002-2
fatcat:fb2wizpdq5ebbfa57xyd72brky
Misuse patterns in VoIP
2007
Proceedings of the 14th Conference on Pattern Languages of Programs - PLOP '07
We present a set of misuse patterns for VoIP: Denial of Service (DoS), Call Interception, and Theft of Service on VoIP. ...
stopping the attack by enumerating possible security patterns that can be applied for this purpose, and describes how to trace the attack once it has happened by appropriate collection and observation of forensics ...
in the event of a successful attack. • In VoIP, the misuse pattern technique may be complemented with the use of a network forensics analysis tool (NFAT) to offer a better view (interpretation) of the ...
doi:10.1145/1772070.1772072
fatcat:cqfn4n6nw5c7nevdsn6xoyqfle
Misuse patterns in VoIP
2009
Security and Communication Networks
We present a set of misuse patterns for VoIP: Denial of Service (DoS), Call Interception, and Theft of Service on VoIP. ...
stopping the attack by enumerating possible security patterns that can be applied for this purpose, and describes how to trace the attack once it has happened by appropriate collection and observation of forensics ...
in the event of a successful attack. • In VoIP, the misuse pattern technique may be complemented with the use of a network forensics analysis tool (NFAT) to offer a better view (interpretation) of the ...
doi:10.1002/sec.105
fatcat:dmbtw2t6kvhnpiye5h4nyj7mry
Development of Domestic and International Computer Forensics
2011
2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing
with the increasing of computer crime, instant emergence of new digital product, new computer technology and computer forensics technology is promoted, developed constantly. ...
This paper described basic information/content of computer forensics, and elaborated the development of current computer forensics at domestic and overseas market. ...
Extract evidence from VoIP Three network convergence is the big move for the network development in China. ...
doi:10.1109/iihmsp.2011.98
dblp:conf/iih-msp/XuCY11
fatcat:mqohxtt5mngrnamehrqrrgyqm4
Analysis of Challenges in Modern Network Forensic Framework
2021
Security and Communication Networks
Network forensics can be an expansion associated with network security design which typically emphasizes avoidance and detection of community assaults. ...
The distinct objectives of this study include accessibility to the network infrastructure and artifacts and collection of evidence against the intruder using network forensic techniques to communicate ...
Converge network-based network forensic techniques are specifically useful in identifying the digital evidence found in the converged networks. e VoIP communication is a specific example of the converged ...
doi:10.1155/2021/8871230
fatcat:nkrfvnk3vvdzxk5xihfzx7vrda
Skype Forensics in Android Devices
2013
International Journal of Computer Applications
The discipline of smartphone forensics has recently got more at-tention because of the tremendous growth in the smartphones market. ...
Even though Skype provides secure communications over the Internet, this paper shows that Skype call and chat evidences can be truly found in the devices. ...
Recovering digital evidences from VoIP applications in computer systems has already been studied [13, 12] . ...
doi:10.5120/13504-1253
fatcat:lcrroh7ncnbnhkleyyqx4xbcpa
A Survey of Various Frameworks and Solutions in all Branches of Digital Forensics with a Focus on Cloud Forensics
2019
International Journal of Advanced Computer Science and Applications
Digital forensics is a class of forensic science interested with the use of digital information produced, stored and transmitted by various digital devices as source of evidence in investigations and legal ...
Digital forensics can be split up to several classes such as computer forensics, network forensics, mobile forensics, cloud computing forensics, and IoT forensics. ...
To deal with different crimes that happened on the level of digital devices, the investigators must implement consistent and precisely defined forensic procedures. ...
doi:10.14569/ijacsa.2019.0100880
fatcat:ox6z2ifpy5gy7jl34343rfuu2i
A Comprehensive Survey of Antiforensics for Network Security
[chapter]
2013
Managing Trust in Cyberspace
Current forensics deals with two types of evidence analysis such as live analysis and offline analysis. Live analysis mainly monitors and gathers evidence from live networks and systems [1, 2] . ...
digital forensic process and evidence validation. ...
doi:10.1201/b16318-21
fatcat:gkc66uvjbbh55ixfxqapdoevnu
« Previous
Showing results 1 — 15 out of 246 results