27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 3: REN-JIN forensic model (Pelaez 2006)<br />

Jose Mas y Rubi et al.<br />

The Honeynets are highly controlled type of network architecture, one in which you can monitor all<br />

activity that occurs. By placing real victims (which can be any type of system, service or information)<br />

inside the network like an attack target, it creates an environment where you can observe everything<br />

that happens on it, allowing the attacking intruders interact with the Honeynet while information from<br />

that attack is being collected. This happens because Honeynets are high interaction real networks<br />

which implement traps to detect, deviate, or in some cases, to counteract non-authorize uses of the<br />

information system; where no service neither traffic is generated. Therefore, any interaction with the<br />

Honeynet implies malicious or non-authorize activities. Any connection initiated to a Honeynet implies<br />

that someone has compromised a system and has initiated a suspicious activity. This makes much<br />

easier the activity analysis, because all the captured information can be assumed as non-authorize or<br />

malicious one (Honeynet 2006).<br />

4. Comparative analysis<br />

One of the objectives of our work is to discuss the structure of REN-JIN and CALEA models, so that<br />

at the end, we could affirm if one of these models can be applicable for a VoIP traffic forensic<br />

analysis, and also proposing possible improvement to the selected model in this analysis process.<br />

The methodology to follow implies that the mentioned models are analyzed in the DFRWS general<br />

model structure, to identify if all the elements functions of each individual model meet the<br />

requirements of the chosen general model.<br />

In conclusion, the elements that integrate the forensic models CALEA and REN-JIN will be located in<br />

the corresponding step of the DFRWS model structure, to identify if the functions that those elements<br />

provide can cover one of the general model’s important steps.<br />

4.1 Discussion and analysis<br />

Table 2 shows the main function of each of the analyzed models, and then compared to the general<br />

model functions:<br />

4.2 REN-JIN and CALEA operation differences<br />

The main functions of CALEA are focused on a single component, LEA, which will depend on the<br />

traffic mirror used by the forensic agents to collect the required information. This makes the model<br />

easily adaptable to the rules governing the legal interception in the countries where these type of tools<br />

are used. However, it is the duty of each country to lay down rules for the use of this type of system,<br />

so the collected evidence could have full legality in the judicial environment.<br />

164

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!