27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Jose Mas y Rubi et al.<br />

Another pending point in the improvement is the preservation function, and this can be improved<br />

through data duplication techniques like RAID disc structures, or by redundant servers; this<br />

modification must be implemented specifically in the Network Forensics Server, which can send the<br />

backup data to a medium describe above, after the data is previously analyzed.<br />

For the presentation function, the purpose of this element is to generate reports which will be<br />

presented to the competent authorities, for this is necessary to count with specialized personal that<br />

can adequately identify the proofs and validate them as possible evidences. For this purpose, we<br />

consider that an element that can fulfill this function is the Legal Enforcement Agency (LEA), which is<br />

a fundamental part of the CALEA model. Some of the basic parameters to be considered would be<br />

the ones presented in section II under the VoIP topic.<br />

5.2 Proposed network basic operation<br />

The operation of the network architecture and the relevant states for our analysis are appointed in the<br />

following lines:<br />

1) A call is generated from the Internet; it wants to communicate with some user on the network,<br />

for which it uses a number, for example, 4981791.<br />

2) Once the Gateway received the internet user communication petition, it will interact with the<br />

IMS core, which will interact at the same time with ENUM, and will return the user identification of<br />

the called number, according to SIP signaling.<br />

3) The CAESMA network will intercept the IMS core response and identify the affected user for<br />

the criminal acts which is being communicated.<br />

4) CAESMA will connect the capture network and starts the real time forensic process.<br />

5) The called user acts and proceeds with the communication normally.<br />

6) When the communication is finalized, the forensic process of recollecting proofs is also<br />

finished.<br />

Figure 6: Relevant states in CAESMA network operation<br />

6. Conclusions<br />

The current trend of widespread use of VoIP communications make indispensable to the forensic<br />

investigators to count with the necessary tools to study and prevent all the possible vulnerability<br />

threats in the communications.<br />

Possible applicable tools to this problematic issue, according to the investigation made in this paper,<br />

are the REN-JIN model and the CALEA model. Both were thought as network forensic models and<br />

are not fully adequate for evidence recollection in VoIP communications, due to the special<br />

parameters of the evidence, that allow the network forensic investigators to identify and capture<br />

specific data from the crime.<br />

167

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!