Digital Forensics in VoIP networks - INRIA - Institut National de Recherche en Informatique et en Automatique Accéder directement au contenu
Communication Dans Un Congrès Année : 2010

Digital Forensics in VoIP networks

Résumé

With VoIP being deployed on large scale, forensic analysis of captured VoIP traffic is of major practical interest. In this paper, we present a new fingerprinting approach that identifies the types of devices (name, version, brand, series) in captured VoIP traffic. We focus only on the signaling plane and discard voice related data. Although we consider only one signaling protocol for the illustration, our tool relies on structural information trees and can easily be adapted to any protocol of that has a known syntax. We have integrated our tool within the well known tshark application in order to provide an easy to use support for forensic analysts.
Fichier principal
Vignette du fichier
wifs10.pdf (292.78 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

inria-00548768 , version 1 (20-12-2010)

Identifiants

  • HAL Id : inria-00548768 , version 1

Citer

Jérôme François, Radu State, Thomas Engel, Olivier Festor. Digital Forensics in VoIP networks. IEEE Workshop on Information Forensics and Security - WIFS'10, Dec 2010, Seattle, United States. pp.6. ⟨inria-00548768⟩
188 Consultations
456 Téléchargements

Partager

Gmail Facebook X LinkedIn More