VoIP evidence model: a new forensic method for investigating VoIP malicious attacks
Although the invention of Voice over Internet Protocol (VoIP) in communication technology created significant attractive services for its users, it also brings new security threats. Criminals exploit these security threats to perform illegal activities such as VoIP malicious attacks, this will req...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
IEEE
2012
|
Online Access: | http://psasir.upm.edu.my/id/eprint/31691/1/31691.pdf http://psasir.upm.edu.my/id/eprint/31691/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.upm.eprints.31691 |
---|---|
record_format |
eprints |
spelling |
my.upm.eprints.316912016-06-07T08:46:42Z http://psasir.upm.edu.my/id/eprint/31691/ VoIP evidence model: a new forensic method for investigating VoIP malicious attacks Ibrahim, Mohammed Abdullah @ Selimun, Mohd Taufik Dehghantanha, Ali Although the invention of Voice over Internet Protocol (VoIP) in communication technology created significant attractive services for its users, it also brings new security threats. Criminals exploit these security threats to perform illegal activities such as VoIP malicious attacks, this will require digital forensic investigators to detect and provide digital evidence. Finding digital evidence in VoIP malicious attacks is the most difficult task, due to its associated features with converged network. In this paper, a Model of investigating VoIP malicious attacks is proposed for forensic analysis. The model formalizes hypotheses through information gathering and adopt a Secure Temporal Logic of Action(S-TLA+) in the process of reconstructing potential attack scenario. Through this processes, investigators can uncover unknown attack scenario executed in the process of attack. Subsequently, it is expected that the findings of this paper will provide clear description of attacks as well as generation of more specified evidences. IEEE 2012 Conference or Workshop Item PeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/31691/1/31691.pdf Ibrahim, Mohammed and Abdullah @ Selimun, Mohd Taufik and Dehghantanha, Ali (2012) VoIP evidence model: a new forensic method for investigating VoIP malicious attacks. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 26-28 June 2012, Kuala Lumpur, Malaysia. (pp. 201-206). 10.1109/CyberSec.2012.6246116 |
institution |
Universiti Putra Malaysia |
building |
UPM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Putra Malaysia |
content_source |
UPM Institutional Repository |
url_provider |
http://psasir.upm.edu.my/ |
language |
English |
description |
Although the invention of Voice over Internet Protocol
(VoIP) in communication technology created significant
attractive services for its users, it also brings new security threats. Criminals exploit these security threats to perform illegal activities such as VoIP malicious attacks, this will require digital forensic investigators to detect and provide digital evidence. Finding digital evidence in VoIP malicious attacks is the most
difficult task, due to its associated features with converged network. In this paper, a Model of investigating VoIP malicious attacks is proposed for forensic analysis. The model formalizes hypotheses through information gathering and adopt a Secure Temporal Logic of Action(S-TLA+) in the process of reconstructing potential attack scenario. Through this processes, investigators can uncover unknown attack scenario executed in the process of attack. Subsequently, it is expected that the findings of this paper will provide clear description of attacks as
well as generation of more specified evidences. |
format |
Conference or Workshop Item |
author |
Ibrahim, Mohammed Abdullah @ Selimun, Mohd Taufik Dehghantanha, Ali |
spellingShingle |
Ibrahim, Mohammed Abdullah @ Selimun, Mohd Taufik Dehghantanha, Ali VoIP evidence model: a new forensic method for investigating VoIP malicious attacks |
author_facet |
Ibrahim, Mohammed Abdullah @ Selimun, Mohd Taufik Dehghantanha, Ali |
author_sort |
Ibrahim, Mohammed |
title |
VoIP evidence model: a new forensic method for investigating VoIP malicious attacks |
title_short |
VoIP evidence model: a new forensic method for investigating VoIP malicious attacks |
title_full |
VoIP evidence model: a new forensic method for investigating VoIP malicious attacks |
title_fullStr |
VoIP evidence model: a new forensic method for investigating VoIP malicious attacks |
title_full_unstemmed |
VoIP evidence model: a new forensic method for investigating VoIP malicious attacks |
title_sort |
voip evidence model: a new forensic method for investigating voip malicious attacks |
publisher |
IEEE |
publishDate |
2012 |
url |
http://psasir.upm.edu.my/id/eprint/31691/1/31691.pdf http://psasir.upm.edu.my/id/eprint/31691/ |
_version_ |
1643830395766046720 |
score |
13.159267 |