27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Numbers called.<br />

Source and destination IP addresses.<br />

IP geographical localization.<br />

Incoming calls.<br />

Start/end times and duration.<br />

Voice mail access numbers.<br />

Call forwarding numbers.<br />

Incoming/outgoing messages.<br />

Access codes for voice mail systems.<br />

Contact lists.<br />

Jose Mas y Rubi et al.<br />

b) VoIP data:<br />

Protocol type.<br />

Configuration data.<br />

Raw packets.<br />

Inter-arrival times.<br />

Variance of inter-arrival times.<br />

Payload size.<br />

Port numbers.<br />

Codecs.<br />

The Session Initiation Protocol (SIP) is an important part of the VoIP network communication. SIP is<br />

an IETF standard for IP multimedia conferences. SIP is an application layer control protocol use to<br />

create, modify and terminate session with one or more participants. These sessions include internet<br />

multimedia conferences, internet phone calls and multimedia distribution. The signaling allows the<br />

transportation of call information across the network boundaries. The session management provides<br />

the ability to control the attributes of an end-to-end call (Fernandez 2007).<br />

3. Related works<br />

In our preliminary investigation, we searched different models that could adapt to the DFRWS general<br />

model, and among the most outstanding models we found REN-JIN and CALEA, which will be<br />

describes in the following subsections.<br />

3.1 CALEA model<br />

Government Surveillance is a network forensic special case. Communications Assistance for Law<br />

Enforcement Act (CALEA) is another term use for this electronic surveillance. This means that is<br />

legally valid to introduce an agent inside a communication channel to intercept information, without<br />

altering it (Scoggins 2004).<br />

The wiretapping installation is based on the wire modem’s MAC address, so it can be use for the data<br />

or digital voice connections. This characteristic is controlled by the command interface, intercepted<br />

cable, which requires a MAC address, an IP address and an UDP port number as their parameters<br />

(Scoggins 2004).<br />

When it is active, the router examines each packet with the desirable MAC addresses and when finds<br />

a match to one of those addresses (either from the origin or destination terminal device), a copy is<br />

send to the server, specifying the IP address and port number (Scoggins 2004).<br />

Figure 2 shows how the components of CALEA model (Delivery Function, Collection Function and<br />

Law Enforcement Agency) integrate with a VoIP system providing a transparent lawful interception.<br />

Calls are routed through an access gateway that hides any intercepts in place (Pelaez 2007).<br />

162

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!