VoIP evidence model: a new forensic method for investigating VoIP malicious attacks

Although the invention of Voice over Internet Protocol (VoIP) in communication technology created significant attractive services for its users, it also brings new security threats. Criminals exploit these security threats to perform illegal activities such as VoIP malicious attacks, this will req...

Full description

Saved in:
Bibliographic Details
Main Authors: Ibrahim, Mohammed, Abdullah @ Selimun, Mohd Taufik, Dehghantanha, Ali
Format: Conference or Workshop Item
Language:English
Published: IEEE 2012
Online Access:http://psasir.upm.edu.my/id/eprint/31691/1/31691.pdf
http://psasir.upm.edu.my/id/eprint/31691/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Although the invention of Voice over Internet Protocol (VoIP) in communication technology created significant attractive services for its users, it also brings new security threats. Criminals exploit these security threats to perform illegal activities such as VoIP malicious attacks, this will require digital forensic investigators to detect and provide digital evidence. Finding digital evidence in VoIP malicious attacks is the most difficult task, due to its associated features with converged network. In this paper, a Model of investigating VoIP malicious attacks is proposed for forensic analysis. The model formalizes hypotheses through information gathering and adopt a Secure Temporal Logic of Action(S-TLA+) in the process of reconstructing potential attack scenario. Through this processes, investigators can uncover unknown attack scenario executed in the process of attack. Subsequently, it is expected that the findings of this paper will provide clear description of attacks as well as generation of more specified evidences.