2015 First International Conference on Anti-Cybercrime (ICACC) 2015
DOI: 10.1109/anti-cybercrime.2015.7351935
|View full text |Cite
|
Sign up to set email alerts
|

Forensic investigation framework for VoIP protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…Network forensics is a fundamental branch of digital forensics. The analysis of network traffic to investigate security incidents, data breaches and security policy violations is known as network forensics [17]. Network forensics evidence can be collected when communication is intercepted at the packet level.…”
Section: Introductionmentioning
confidence: 99%
“…Network forensics is a fundamental branch of digital forensics. The analysis of network traffic to investigate security incidents, data breaches and security policy violations is known as network forensics [17]. Network forensics evidence can be collected when communication is intercepted at the packet level.…”
Section: Introductionmentioning
confidence: 99%
“…The SMTPS Stream Decrypt and POP3S Stream Decrypt sub segments decrypt network packets stored as PCAP files with SMPTPS and POP3 network sessions using the traced session key and further creates a PCAP file with a stream of unencrypted packets. [14] …”
Section: ) Smtps Stream Decrypt and Pop3 Stream Decryptmentioning
confidence: 99%
“…The client and server will encrypt further communication using the shared Master Secret. [14] Proposed segment of this forensic engine identifies TLS handshake packets and records cipher used, its key length, protocol version along with compression methods by dissecting network packets using JPCAP and OpenSSL software libraries. As discussed above, ultimate aim of this segment is to calculate 48-byte Master Secret (MS) or session key for encrypting the inbound traffic.…”
Section: ) Tls Handshake Decode and Certificate Handlementioning
confidence: 99%
See 2 more Smart Citations