Forensic investigation framework for VoIP protocol

T. Manesh, Saied M.Abd El-Atty, M. Muhammed Sha, B. Brijith, K. Vivekanandan

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

The deployment of Voice over Internet Protocol (VoIP) in place of traditional communication facilities has helped in huge reduction in operating costs, as well as enabled adoption of next generation communication services-based IP. At the same time, cyber criminals have also started intercepting environment and creating challenges for law enforcement system in any Country. At this instant, we propose a framework for the forensic analysis of the VoIP traffic over the network. This includes identifying and analyzing of network patterns of VoIP-SIP which is used for the setting up a session for the communication, and VoIP-RTP which is used for sending the data. Our network forensic investigation framework also focus on developing an efficient packet reordering and reconstruction algorithm for tracing the malicious users involved in conversation. The proposed framework is based on network forensics which can be used for content level observation of VoIP and regenerate original malicious content or session between malicious users for their prosecution in the court.

Original languageEnglish
Title of host publication2015 1st International Conference on Anti-Cybercrime, ICACC 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479976201
DOIs
StatePublished - 9 Dec 2015
Event1st International Conference on Anti-Cybercrime, ICACC 2015 - Riyadh, Saudi Arabia
Duration: 10 Nov 201512 Nov 2015

Publication series

Name2015 1st International Conference on Anti-Cybercrime, ICACC 2015

Conference

Conference1st International Conference on Anti-Cybercrime, ICACC 2015
Country/TerritorySaudi Arabia
CityRiyadh
Period10/11/1512/11/15

Keywords

  • Forensics
  • Packet Reordering
  • RTP
  • SIP
  • VoIP

Fingerprint

Dive into the research topics of 'Forensic investigation framework for VoIP protocol'. Together they form a unique fingerprint.

Cite this