Lawful Interception of IP Traffic
نویسنده
چکیده
When compared with access network interception, Lawful Interception of the Internet is both more difficult and much less mature. However, Internet interception is becoming increasingly more important as Law Enforcement Agencies find that access network interception is becoming less effective. Unfortunately, the most common approach to Internet interception has some fundamental weaknesses, which may compromise security, privacy and network reliability. In this paper we explain how Internet interception differs from access network interception, highlight the weaknesses in existing solutions and suggest alternative approaches to Internet interception and how they might be developed.
منابع مشابه
LAWFUL INTERCEPTION FOR IP NETWORKS White Paper
The proliferation of communications over networks based on Internet Protocol (IP) technology imposes ever growing challenges for Law Enforcement Agencies. This Aqsacom White Paper provides an introductory background on the issues behind lawful interception as applied to IP networks and their overlying applications, with emphasis on the dominant applications of E-mail and Voice-Over-IP (VOIP).
متن کاملEfficient Lawful Interception in Mobile IPv6 Networks
The Lawful Interception (LI) of communications is necessary in modern telecommunications networks in order to help law enforcement agencies with the investigation and prosecution of criminal activities. For IP networks that support user mobility, such as Mobile IP, the LI solution must be distributed throughout the network in order to satisfy the requirement that it capture 100% of a target use...
متن کاملMinimising Cost of Lawful Interception in Mobile IP
Communications Interception is an essential part of law enforcement used by authorised government agencies to investigate criminal activities. With the growth of IP based applications and new IP technologies such as mobile IP, Internet Service Providers (ISPs) will find themselves increasingly obliged to provide interception capabilities. IP interception is usually done with expensive hardware ...
متن کاملAnalysis of IP Prefix Hijacking and Traffic Interception
In the Internet, BGP is de facto inter-domain routing protocol. And it is vulnerable to a number of damaging attacks. Among these attacks, IP prefix hijacking and traffic interception are regarded as the serious threats in the Internet. There have been many incidents of IP prefix hijacking in the Internet. The hijacking AS can blackhole the hijacked traffic by introducing network unreachability...
متن کاملLawful Interception of the Internet
This paper describes the state of Lawful Interception of the Internet and compares it with Lawful Interception of access networks. Lawful Interception is the process of secretly intercepting communications between parties of interest to Law Enforcement agencies. Internet interception is both more difficult and much more immature than access network interception. Refusal by the main standards bo...
متن کامل