27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Jose Mas y Rubi et al.<br />

As we can see within the network architecture, the originating point of the calls for our analysis will be<br />

the Internet cloud, the establishment path and signaling is the following:<br />

a. Connection to the SIP server, which contains the database of all the users in the VoIP network.<br />

b. After the validation of the destination user, which is part of the VoIP network, the SIP server sends<br />

the corresponding signaling for call establishment with the VoIP network.<br />

The rest of the article is organized as follows: In section II we introduce all the information related to<br />

our work, which offers a clear base about the DFRWS general analysis model and the technology<br />

behind VoIP service. In section III we describe the CALEA and REN-JIN models, offering a theoretical<br />

basis and techniques that will allow us to understand in a better way the proposal of this work. In<br />

section IV we develop a comparative analysis between CALEA and REN-JIN models, taking into<br />

account the DFRWS general model as study base for both of them. In section V we propose a new<br />

forensic model which is the result of the previous analysis, and we study its preliminary architecture<br />

and basic operation. Finally we present our conclusions and possible future works.<br />

2. Theoretical basis<br />

To start our investigation, it is necessary that we study our referential general model for forensic<br />

analysis of the DFRWS and the technical concepts of the VoIP technology, in order to contextualize<br />

our analysis in a suitable environment.<br />

2.1 Digital Forensics Research Workshop (DFRWS) model<br />

Several forensic investigators have analyzed multiple digital forensic models. Within those models,<br />

they found that the DFRWS model is rigid and linear but is particularly suitable where necessary<br />

investigative activities are well-understood (Ray 2007). Also, they highlight the fact that in the<br />

development of this model, for the first time, academic entities were involved, which didn’t happen<br />

with other forensic models in its time. All other models were more focused on guidelines established<br />

by law enforcement (Reith 2002).<br />

Therefore, we choose the DFRWS model because allows a comprehensive approach and is more<br />

goal-oriented to the objectives of this academic article. To proceed, we show the step sequence<br />

followed by this model for an adequate forensic analysis:<br />

Table 1: Steps for a digital forensic analysis (DFRWS 2001)<br />

2.2 Voice over IP (VoIP)<br />

The important point to keep in mind about the VoIP technology is concerning the shared information<br />

between the terminal devices and the data itself, which will enable us to discriminate the calls and<br />

their types. Those elements are presented in the following list (Pelaez 2010):<br />

a) Terminal device information:<br />

161

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!