Voice Over IP And Forensics: A Review of Recent Australian Work

نویسندگان

  • Jill Slay
  • Matthew Simon
  • David Irwin
چکیده

The popularity of Voice over the Internet Protocol (VoIP) for providing voice communication over IP networks such as the Internet has resulted in VoIP becoming a global telephony service. VoIP applications convert analogue voice signals into a digital format, which is then encapsulated into IP packets for transmission over the Internet. Our research has examined both the security and privacy implications of widespread adoption of VoIP for personal and business telecommunications and also the use of VoIP calls by criminals, as many implementations of VoIP may also use strong encryption to secure both the voice payload as well as to control messages. We have also considered the implication of recovering electronic evidence and information from VoIP since conventional methods of eavesdropping and wire-tapping do not apply to VoIP calls. This paper provides an overview of the development of investigative processes and forensic tools to enable law enforcement to engage the digital forensic process in a VoIP environment

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Network Forensics Models for Converged Architectures

We discuss a systematic approach to network forensic collection and analysis of data in converged networks. Since attacks cannot be completely avoided, it is necessary to have appropriate forensics systems. Upon integration into a network forensic infrastructure, we expect this forensic model will enable a faster response and more structured investigations of Voice over IP (VoIP)-based network ...

متن کامل

System Factors Influencing the Australian Nurses' Evidence-based Clinical Decision Making: A Systematic Review of Recent Studies

Background: There is growing attention to evidence-based practice in Australian clinical contexts and nursing literature. Recent research explores the dimensions of evidence-based practice; however, the implementation of evidence-based clinical decision making has been identified as a cumbersome process. Aim: This study aimed to review the literature syst...

متن کامل

VoIP Forensic Analyzer

People have been utilizing Voice over Internet Protocol (VoIP) in most of the conventional communication facilities which has been of assistance in the enormous attenuation of operating costs, as well as the promotion of nextgeneration communication services-based IP. As an intimidating upshot, cyber criminals have correspondingly started interjecting the environment and creating new challenges...

متن کامل

Security testing of session initiation protocol implementations

The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012