• Please send your full manuscript to: jocm@vip.163.com

A Novel Protocol Design and Collaborative Forensics Mechanism for VoIP Services

Hsien-Ming Hsu1, Feng-Yu Lin1, Yeali S. Sun1, and Meng Chang Chen2
1. Dept. of Information Management, National Taiwan University, Taipei, Taiwan
2. Institute of Information Science, Academia Sinica, Taipei, Taiwan

Abstract—The simplicity and low cost of Voice over Internet Protocol (VoIP) services has made these services increasingly popular as the Internet has grown. Unfortunately, these advantages of VoIP are attractive to both legitimate and nefarious users, and VoIP is often used by criminals to communicate and conduct illegal activities (such as fraud or blackmail) without being intercepted by Law Enforcement Agencies (LEAs). However, VoIP can also increase the efficiency of law enforcement and forensic collaboration. Currently, VoIP researchers have only proposed a framework for this type of partnership, and have yet to provide a common protocol for forensic Internet collaboration. As a result, Internet-based collaboration between agencies is not widespread.
Building from the Collaborative Forensics Mechanism (CFM) and the procedures of collaborative forensics work, this paper designs a novel application-layer Collaborative Forensics Protocol (CFP) to overcome the current framework-protocol gap. Here, CFP can exchange collaborative request and response messages between collaborative forensics region centers (CFRCs) to acquire collaborative forensics information. We present a procedure for collaborative forensics and discuss the details of protocol design.  In addition, we discuss the defense of PKI working with CFM against various types of attacks and analyze the features of CFP.

Index Terms—SIP, VoIP, Security, Collaborative Forensics, Mechanism, Protocol Design, Traceback

Cite:Hsien-Ming Hsu, Feng-Yu Lin, Yeali sunny Sun, and Meng Chang Chen, "A Novel Protocol Design and Collaborative Forensics Mechanism for VoIP Services," Journal of Communications, vol. 7, no.2, pp.132-142, 2012. Doi: 10.4304/jcm.7.2.132-142

Copyright © 2013-2017 Journal of Communications, All Rights Reserved
E-mail: jcm@etpub.com