Lawful Interception of IP Traffic

نویسنده

  • P. Branch
چکیده

When compared with access network interception, Lawful Interception of the Internet is both more difficult and much less mature. However, Internet interception is becoming increasingly more important as Law Enforcement Agencies find that access network interception is becoming less effective. Unfortunately, the most common approach to Internet interception has some fundamental weaknesses, which may compromise security, privacy and network reliability. In this paper we explain how Internet interception differs from access network interception, highlight the weaknesses in existing solutions and suggest alternative approaches to Internet interception and how they might be developed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

LAWFUL INTERCEPTION FOR IP NETWORKS White Paper

The proliferation of communications over networks based on Internet Protocol (IP) technology imposes ever growing challenges for Law Enforcement Agencies. This Aqsacom White Paper provides an introductory background on the issues behind lawful interception as applied to IP networks and their overlying applications, with emphasis on the dominant applications of E-mail and Voice-Over-IP (VOIP).

متن کامل

Efficient Lawful Interception in Mobile IPv6 Networks

The Lawful Interception (LI) of communications is necessary in modern telecommunications networks in order to help law enforcement agencies with the investigation and prosecution of criminal activities. For IP networks that support user mobility, such as Mobile IP, the LI solution must be distributed throughout the network in order to satisfy the requirement that it capture 100% of a target use...

متن کامل

Minimising Cost of Lawful Interception in Mobile IP

Communications Interception is an essential part of law enforcement used by authorised government agencies to investigate criminal activities. With the growth of IP based applications and new IP technologies such as mobile IP, Internet Service Providers (ISPs) will find themselves increasingly obliged to provide interception capabilities. IP interception is usually done with expensive hardware ...

متن کامل

Analysis of IP Prefix Hijacking and Traffic Interception

In the Internet, BGP is de facto inter-domain routing protocol. And it is vulnerable to a number of damaging attacks. Among these attacks, IP prefix hijacking and traffic interception are regarded as the serious threats in the Internet. There have been many incidents of IP prefix hijacking in the Internet. The hijacking AS can blackhole the hijacked traffic by introducing network unreachability...

متن کامل

Lawful Interception of the Internet

This paper describes the state of Lawful Interception of the Internet and compares it with Lawful Interception of access networks. Lawful Interception is the process of secretly intercepting communications between parties of interest to Law Enforcement agencies. Internet interception is both more difficult and much more immature than access network interception. Refusal by the main standards bo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003