VoIP Network Forensics of Instant Messaging Calls

被引:0
|
作者
Sarhan, Soliman Abd Elmonsef [1 ]
Youness, Hassan A. [1 ]
Bahaa-Eldin, Ayman M. [2 ]
Taha, Ayman Elsayed [2 ,3 ]
机构
[1] Minia Univ, Fac Engn, Comp & Syst Engn Dept, Al Minya 61519, Egypt
[2] Elsewedy Univ Technol, Comp Engn, Cairo 7060010, Egypt
[3] Ain Shams Univ, Cairo 11517, Egypt
关键词
Keywords digital forensics; encrypted traffic forensics; VoIP forensics; IM; trace files; end-to-end encryption; nDPI; elasticsearch; logstash; TELEGRAM MESSENGER;
D O I
10.1109/ACCESS.2024.3352897
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital forensics is a prime professional field for law enforcement organizations. This is a major active research topic in the field of cybersecurity. Although traffic and content analysis are leading tasks in this field, most Internet traffic is now encrypted, rendering traditional content analysis impossible. Instant messaging (IM) applications have become increasingly popular for communication between individuals and groups. However, IM conversations can be used for illicit activities such as planning criminal activities or exchanging sensitive information. In such cases, law enforcement agencies may need to perform VoIP forensics to identify suspects involved in the conversations. This study proposes a network forensic approach (NFA) for correlating IM calls to identify suspects' IP addresses. This approach involves capturing and analyzing IM call data, correlating the data with other network traffic, and using the correlation to identify suspects' IP addresses. The proposed approach was tested on real-world IM call data and yielded promising results. The network forensics approach for VoIP is superior to other approaches that require physical access to end-user devices, making NFA suitable for early crime detection and in situations where the devices may have been destroyed or burnt. The proposed method achieved a success rate of 92.5% for identifying voice IM calls and providing information about the participants involved in the calls.
引用
收藏
页码:9012 / 9024
页数:13
相关论文
共 50 条
  • [1] A framework for digital forensics of encrypted real-time network traffic, instant messaging, and VoIP application case study
    Sarhan, Soliman Abd Elmonsef
    Youness, Hassan A.
    Bahaa-Eldin, Ayman M.
    [J]. AIN SHAMS ENGINEERING JOURNAL, 2023, 14 (09)
  • [2] Modeling Instant Messaging group network
    Wang, W.
    Lu, D. S.
    Fang, Y.
    [J]. DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2007, 14 : 1223 - 1227
  • [3] Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies
    Yang, Teing Yee
    Dehghantanha, Ali
    Choo, Kim-Kwang Raymond
    Muda, Zaiton
    [J]. PLOS ONE, 2016, 11 (03):
  • [4] VoIP Packets Filtering for Mobile Instant Messaging Using N-gram Models
    Tung, Cheng-Tan
    Yen, Chih-Ping
    [J]. International Journal of Network Security, 2021, 23 (06) : 1108 - 1117
  • [5] Instant messaging
    Resnic, D
    [J]. COMPUTER, 2003, 36 (05) : 8 - 8
  • [6] Instant messaging
    Bland, C
    [J]. IEEE SPECTRUM, 2003, 40 (02) : 14 - 14
  • [7] Instant messaging
    Tessot, J
    [J]. ALCATEL TELECOMMUNICATIONS REVIEW, 2003, (4-1): : 34 - 38
  • [8] Instant Messaging
    Grewal, Savraj S.
    [J]. SCIENTIST, 2013, 27 (03): : 45 - 49
  • [9] Analyzing worms under Instant Messaging group network
    Wang, Wei
    Xie, Ming
    Luo, Daisheng
    Fang, Yong
    [J]. INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING, 2008, : 403 - 408
  • [10] Semantic Based Network Growth in Instant Messaging Environment
    Ren, Wei
    Qiu, Yuhui
    [J]. JOURNAL OF COMPUTERS, 2014, 9 (10) : 2387 - 2394