27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CAESMA – An On-Going Proposal of a Network Forensic<br />

Model for VoIP traffic<br />

Jose Mas y Rubi, Christian Del Carpio, Javier Espinoza, and Oscar Nuñez Mori<br />

Pontificia Universidad Catolica del Peru, Lima, Peru<br />

jlmasyrubi@pucp.edu.pe<br />

delcarpio.christian@pucp.edu.pe<br />

jmespino@pucp.edu.pe<br />

oscar.nunez@pucp.pe<br />

Abstract: In the near future, service convergence will be a reality, which presents us with a possible misuse<br />

problem of these technologies. One of these services is Voice over IP (VoIP), which provides the phone<br />

communication services in this scheme. Currently VoIP is a very popular technology, and could be use by<br />

malicious attackers related to informatics crimes, to perform their illicit actions, which will be difficult to track<br />

because of IP network’s nature. Because of this, our approach is to achieve a preliminary analysis to create a<br />

forensic model for detection and tracing of VoIP traffic, which will allow us to make an adequate evidence<br />

recollection which could be used by the police authorities.<br />

Keywords: network forensics, forensic model proposal, voice over IP<br />

1. Introduction<br />

Due to the inadequate use of the telephone service in converged networks, mainly generated by<br />

malicious attackers who misuse this technology, it becomes necessary to identify the security gaps in<br />

this network and provide a possible solution.<br />

Therefore, previous to the development of this article we analyze the security gaps (Annex 1), and<br />

based on that analysis we perceive like a potential security problem “the user identification for the<br />

calls originated from internet (VoIP)”, due to the lack of user data validation at the registration process<br />

when the named source is use it.<br />

This problem hinders the proper evidence recollection from the authorities, leading to the fact that<br />

many times this acts stay unpunished due to the lack of possible identification of the attackers.<br />

This document propose a preliminary data recollection model for a posterior forensic analysis in a<br />

VoIP network environment for calls generated from the Internet, based on the network architecture<br />

shown in Figure 1. For our analysis, we will rely on the Digital Forensics Research Workshop<br />

(DFRWS) model, which is a general model for a proper digital forensic analysis.<br />

Figure 1: Network architecture<br />

160

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!