VoIP Forensic Analyzer
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 1
Abstract
People have been utilizing Voice over Internet Protocol (VoIP) in most of the conventional communication facilities which has been of assistance in the enormous attenuation of operating costs, as well as the promotion of next- generation communication services-based IP. As an intimidating upshot, cyber criminals have correspondingly started interjecting the environment and creating new challenges for the law enforcement system in any Country. This paper presents an idea of a framework for the forensic analysis of the VoIP traffic over the network. This forensic activity includes spotting and scrutinizing the network patterns of VoIP-SIP stream, which is used to initiate a session for the communication, and regenerate the content from VoIP-RTP stream, which is employed to convey the data. Proposed network forensic investigation framework also accentuates on developing an efficient packet restructuring algorithm for tracing the depraved users involved in a conversation. Network forensics is the basis of proposed work, and performs packet level surveillance of VoIP followed by reconstruction of original malicious content or network session between users for their prosecution in the court.
Authors and Affiliations
M Sha, Manesh T, Saied Abd El-atty
Printed Arabic Script Recognition: A Survey
Optical character recognition (OCR) is essential in various real-world applications, such as digitizing learning resources to assist visually impaired people and transforming printed resources into electronic media. Howe...
Evaluation of Fault Tolerance in Cloud Computing using Colored Petri Nets
Nowadays, the necessity of rendering reliable services to the customers in business markets is assumed as a crucial matter for the service providers, and the importance of this subject in many fields is undeniable. Desig...
WHITE - DONKEY: Unmanned Aerial Vehicle for searching missing people
Searching for a missing person is not an easy task to accomplish,so over the years search methods have been developed, the problem is that the methods currently available have certain limitations and these limitations ar...
Factors Influencing the Adoption of ICT by Teachers in Primary Schools in Saudi Arabia
Information and communication technology (ICT) has become part of everyday life for the many people in business, entertainment, education and many other areas of human activity. Students in primary school are just beginn...
An Ontology Based Reuse Algorithm towards Process Planning in Software Development
The process planning task for specified design provisions in software development can be significantly developed by referencing the knowledge reuse scheme. Reuse is considered to be one of the most promising techniques t...