Voice Over IP: Privacy and Forensic Implications
نویسندگان
چکیده
With the tremendous growth in popularity and bandwidth of the Internet, VoIP technology has emerged that allows phone calls to be routed over Internet infrastructure rather than the traditional Public Switched Telephone Network (PSTN) infrastructure. The issues faced by law enforcement authorities concerning VoIP are very different from that of traditional telephony. Wiretapping is not applicable to VoIP calls and packet capturing is negated by encryption. This article discusses experimental work carried out to explore methods by which electronic evidence may be collected from systems where VoIP conversations play an important role in suspected criminal activity or communications. It also considers the privacy issues associated with the growing use of VoIP.
منابع مشابه
Voice Over IP And Forensics: A Review of Recent Australian Work
The popularity of Voice over the Internet Protocol (VoIP) for providing voice communication over IP networks such as the Internet has resulted in VoIP becoming a global telephony service. VoIP applications convert analogue voice signals into a digital format, which is then encapsulated into IP packets for transmission over the Internet. Our research has examined both the security and privacy im...
متن کاملNetwork Forensics Models for Converged Architectures
We discuss a systematic approach to network forensic collection and analysis of data in converged networks. Since attacks cannot be completely avoided, it is necessary to have appropriate forensics systems. Upon integration into a network forensic infrastructure, we expect this forensic model will enable a faster response and more structured investigations of Voice over IP (VoIP)-based network ...
متن کاملCritical voice network security analysis and new approach for securing Voice over IP Communications
Voice networks evolved from the fixed traditional telephone system, to mobile and wireless networks and now towards a converged voice and data infrastructure. This convergence is based on the spread of the Internet Protocol, where VoIP is developing. Due to IP network characteristics, hackers are able to compromise and take control of different aspects of IP telephony such as signaling informat...
متن کاملInformation Leakage in Ubiquitous Voice-over-IP Communications
In VoIP, proxies are used by end-devices to perform a number of tasks including call setup and routing. Setup and routing is achieved through the exchange of call control messages which are forwarded among all involved proxies as well as the communicating end-devices. This paper will explore the information exchanged in Voice-over-IP (VoIP) call control messages and any possible implications th...
متن کاملVoice over IP: Forensic Computing Implications
The issues faced by law enforcement authorities concerning VoIP are very different from that of traditional telephony. VoIP provides strong encryption and a decentralised databased network. Wiretapping is not applicable to VoIP calls and packet capturing is negated by encryption. New methods are required to collect evidence from systems running VoIP software. This paper ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJDCF
دوره 1 شماره
صفحات -
تاریخ انتشار 2009