Filters








246 Hits in 3.9 sec

Developing New Approaches for Intrusion Detection in Converged Networks [chapter]

Juan C.
2011 VoIP Technologies  
Current techniques dealing with evidence collection in converged networks are based on post-mortem (dead forensic) analysis.  ...  The middle phases of the forensic process (i.e., the collection, examination, and analysis of the evidence) provide network investigators with a structured method to collect more and better evidence and  ...  This book introduces research strategies that address various issues with the aim of enhancing VoIP quality.  ... 
doi:10.5772/13885 fatcat:jtuc2ttovfhafezsvvxjxfpndy

VoIP Forensic Analyzer

M Mohemmed, Manesh T, Saied M.
2016 International Journal of Advanced Computer Science and Applications  
This paper presents an idea of a framework for the forensic analysis of the VoIP traffic over the network.  ...  This forensic activity includes spotting and scrutinizing the network patterns of VoIP-SIP stream, which is used to initiate a session for the communication, and regenerate the content from VoIP-RTP stream  ...  and digital evidence analysis practices [8].  ... 
doi:10.14569/ijacsa.2016.070116 fatcat:zemrrbw5hbbovkonb3gzre2riy

A Novel Protocol Design and Collaborative Forensics Mechanism for VoIP Services

Hsien-Ming Hsu, Feng-Yu Lin, Yeali Sunny Sun, Meng Chang Chen
2012 Journal of Communications  
We present a procedure for collaborative forensics and discuss the details of protocol design.  ...  Building from the Collaborative Forensics Mechanism (CFM) and the procedures of collaborative forensics work, this paper designs a novel application-layer Collaborative Forensics Protocol (CFP) to overcome  ...  the procedures that comprising units of the Collaborative Forensics Network follow for SIP-based VoIP services.  ... 
doi:10.4304/jcm.7.2.132-142 fatcat:w64db2ch5jbhdnoh3w54osaaua

A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing

Suleman Khan, Muhammad Shiraz, Ainuddin Wahid Abdul Wahab, Abdullah Gani, Qi Han, Zulkanain Bin Abdul Rahman
2014 The Scientific World Journal  
Network forensics enables investigation and identification of network attacks through the retrieved digital content.  ...  However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms  ...  VoIP network forensic analysis with digital evidence procedure (VoIP-NFDE) [88] lacks scalability because of the deployed analysis method.  ... 
doi:10.1155/2014/547062 pmid:25097880 pmcid:PMC4109117 fatcat:jpxfykm4mfba5ehjgydvyirzte

Cvoip-Fru: Comprehensive Voip Forensics Report Utility

Alejandro Villegas, Cihan Varol
2014 Zenodo  
Therefore, in order to assist law enforcement with collecting forensically important information from variety of Betamax VoIP tools, CVOIP-FRU framework is developed.  ...  Although there are a few VoIP forensic investigative applications available in the literature, most of them are particularly designed to collect evidence from the Skype product.  ...  Overall, CVOIP-FRU's functionality will be instrumental for the VoIP Digital Evidence Forensics Standard Operating Procedure (DEFSOP) by gathering data that can be easily implemented into a report format  ... 
doi:10.5281/zenodo.1091145 fatcat:yqvjv226cngdph4jvd6fz7rq3m

Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics

Chun-Ming Leung, Yuen-Yan Chan
2007 16th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2007)  
With the forensic evidence, we identify a transport layer communication framework for Skype. We further formulate a set of socket-based detection and control policies for Skype traffics.  ...  Skype is a popular peer-to-peer (P2P) voice over IP (VoIP) application evolving quickly since its launch in 2003.  ...  Furthermore, we deal with the core properties of peer-to-peer and voice over IP protocol, these further increases the difficulty for Skype to evade the methods of detection discussed in this paper.  ... 
doi:10.1109/wetice.2007.4407198 fatcat:qpq2sppqaza6nkogvon2ftsmv4

Proposing a method for Skype Forensic-preserving data evidences to present in front of court of law

Vijay Chauhan, Dinesh S. Katre
2016 Proceedings of the International Conference on Advances in Information Communication Technology & Computing - AICTC '16  
Through this paper we will propose a forensic tool for Skype that will help investigator to collect the strong data evidence.  ...  As per the perspective of Information Technology Act 2000/2008, to safeguard the legal admissibility of the digital records, it is mandatory to capture and preserve the digital evidences of digital data  ...  These files need to be analyzed in order to get the proper evidences for preserving the evidences for the future forensic analysis.  ... 
doi:10.1145/2979779.2979882 fatcat:s4ke7f3vd5g2roezwjv7gwkv3a

Forensics Analysis of Android Mobile VoIP Apps [chapter]

T. Dargahi, A. Dehghantanha, M. Conti
2017 Contemporary Digital Forensic Investigations of Cloud and Mobile Applications  
This chapter presents analysis of forensically valuable remnants of three popular Mobile VoIP (mVoIP) apps on Google Play store, namely: Viber, Skype, and WhatsApp Messenger, in order to figure out to  ...  Voice over Internet Protocol (VoIP) applications (apps) provide convenient and low cost means for users to communicate and share information with each other in real-time.  ...  on the nature of digital evidence on mobile devices, along with a complete guide on forensic techniques to handle, preserve, extract and analyze evidence from mobile devices.  ... 
doi:10.1016/b978-0-12-805303-4.00002-2 fatcat:fb2wizpdq5ebbfa57xyd72brky

Misuse patterns in VoIP

Juan C. Pelaez, Eduardo B. Fernandez, M. M. Larrondo-Petrie, Christian Wieser
2007 Proceedings of the 14th Conference on Pattern Languages of Programs - PLOP '07  
We present a set of misuse patterns for VoIP: Denial of Service (DoS), Call Interception, and Theft of Service on VoIP.  ...  stopping the attack by enumerating possible security patterns that can be applied for this purpose, and describes how to trace the attack once it has happened by appropriate collection and observation of forensics  ...  in the event of a successful attack. • In VoIP, the misuse pattern technique may be complemented with the use of a network forensics analysis tool (NFAT) to offer a better view (interpretation) of the  ... 
doi:10.1145/1772070.1772072 fatcat:cqfn4n6nw5c7nevdsn6xoyqfle

Misuse patterns in VoIP

Juan C. Pelaez, Eduardo B. Fernandez, Maria M. Larrondo-Petrie
2009 Security and Communication Networks  
We present a set of misuse patterns for VoIP: Denial of Service (DoS), Call Interception, and Theft of Service on VoIP.  ...  stopping the attack by enumerating possible security patterns that can be applied for this purpose, and describes how to trace the attack once it has happened by appropriate collection and observation of forensics  ...  in the event of a successful attack. • In VoIP, the misuse pattern technique may be complemented with the use of a network forensics analysis tool (NFAT) to offer a better view (interpretation) of the  ... 
doi:10.1002/sec.105 fatcat:dmbtw2t6kvhnpiye5h4nyj7mry

Development of Domestic and International Computer Forensics

Rongsheng Xu, K.P. Chow, Ying Yang
2011 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing  
with the increasing of computer crime, instant emergence of new digital product, new computer technology and computer forensics technology is promoted, developed constantly.  ...  This paper described basic information/content of computer forensics, and elaborated the development of current computer forensics at domestic and overseas market.  ...  Extract evidence from VoIP Three network convergence is the big move for the network development in China.  ... 
doi:10.1109/iihmsp.2011.98 dblp:conf/iih-msp/XuCY11 fatcat:mqohxtt5mngrnamehrqrrgyqm4

Analysis of Challenges in Modern Network Forensic Framework

Sirajuddin Qureshi, Jianqiang Li, Faheem Akhtar, Saima Tunio, Zahid Hussain Khand, Ahsan Wajahat, Neetesh Saxena
2021 Security and Communication Networks  
Network forensics can be an expansion associated with network security design which typically emphasizes avoidance and detection of community assaults.  ...  The distinct objectives of this study include accessibility to the network infrastructure and artifacts and collection of evidence against the intruder using network forensic techniques to communicate  ...  Converge network-based network forensic techniques are specifically useful in identifying the digital evidence found in the converged networks. e VoIP communication is a specific example of the converged  ... 
doi:10.1155/2021/8871230 fatcat:nkrfvnk3vvdzxk5xihfzx7vrda

Skype Forensics in Android Devices

Mohammed I.Al-Saleh, Yahya A. Forihat
2013 International Journal of Computer Applications  
The discipline of smartphone forensics has recently got more at-tention because of the tremendous growth in the smartphones market.  ...  Even though Skype provides secure communications over the Internet, this paper shows that Skype call and chat evidences can be truly found in the devices.  ...  Recovering digital evidences from VoIP applications in computer systems has already been studied [13, 12] .  ... 
doi:10.5120/13504-1253 fatcat:lcrroh7ncnbnhkleyyqx4xbcpa

A Survey of Various Frameworks and Solutions in all Branches of Digital Forensics with a Focus on Cloud Forensics

Mohammed Khanafseh, Mohammad Qatawneh, Wesam Almobaideen
2019 International Journal of Advanced Computer Science and Applications  
Digital forensics is a class of forensic science interested with the use of digital information produced, stored and transmitted by various digital devices as source of evidence in investigations and legal  ...  Digital forensics can be split up to several classes such as computer forensics, network forensics, mobile forensics, cloud computing forensics, and IoT forensics.  ...  To deal with different crimes that happened on the level of digital devices, the investigators must implement consistent and precisely defined forensic procedures.  ... 
doi:10.14569/ijacsa.2019.0100880 fatcat:ox6z2ifpy5gy7jl34343rfuu2i

A Comprehensive Survey of Antiforensics for Network Security [chapter]

Rahul Chandran, Wei Yan
2013 Managing Trust in Cyberspace  
Current forensics deals with two types of evidence analysis such as live analysis and offline analysis. Live analysis mainly monitors and gathers evidence from live networks and systems [1, 2] .  ...  digital forensic process and evidence validation.  ... 
doi:10.1201/b16318-21 fatcat:gkc66uvjbbh55ixfxqapdoevnu
« Previous Showing results 1 — 15 out of 246 results