27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 2: CALEA forensic model (Pelaez 2007)<br />

Jose Mas y Rubi et al.<br />

Telephone interception can be classified in two categories:<br />

Call detail: Send and receive call details from a subscriber, that will pass to LEA. The generated call<br />

registration created from signaling message can be very valuable in criminal investigations. The<br />

signaling message contains data from phone calls, not about the content of the conversation.<br />

Therefore, the recollection and analysis of signaling messages cannot be subject to the same legal<br />

restrictions as recording voice conversations (Moore 2005).<br />

Call content: It is the real content of the call that we pass to LEA. The suspect must not detect the<br />

mirror, so this element must be produced inside the network and not in the subscriber link. Also this<br />

mirror must not be detectable by any change in time, availability characteristics or operation (Pelaez<br />

2007).<br />

In order that LEA take advantage of the call content without the subscriber knowledge of any change,<br />

all the calls must pass through a device that duplicate the content and then pass it to the agency<br />

(Pelaez 2007).<br />

3.2 REN–JIN model<br />

This model, conceived by Wei Ren and Hai Jin, is designed to capture the network traffic and to<br />

register the corresponding data. This network forensic system has 4 elements (Pelaez 2006):<br />

Network Forensics Server, which integrates the forensic data and analyzes it. It also guides the<br />

network packet filter and captures the behavior of the Network Monitor. It can request the<br />

activation of an investigation program in the Network Investigator has an answer to a sensitive<br />

attack.<br />

Network Forensics Agents, is responsible of data recollection, data extraction and data secure<br />

transportation. These agents are distributed around the network and the monitored hosts.<br />

Network Monitor, is a packet and network traffic capture machine.<br />

Network Investigator, is the network surveillance machine. It investigates a target when the server<br />

gives the command. It activates a real time response program for each network intrusion.<br />

The forensic network and Honeynet systems have the same data recollection function for system<br />

misuse. A Honeynet system lures attackers and gains information about new types of intrusions.<br />

Network forensic system analyzes and reconstructs the attack behavior. The integration of both<br />

systems will help to create an active self-learning and response system to capture the intrusion<br />

behavior and investigate the attack original source (Pelaez 2006).<br />

163

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!