SlideShare a Scribd company logo
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 4, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 884
Abstract— The invention of Voice over Internet Protocol
(VoIP) in communication technology created significant
attractive services for its users, it also brings new security
threats. Criminals exploit these security threats to perform
illegal activities such as VoIP malicious attacks, this will
require digital forensic investigators to detect and provide
digital evidence. Finding digital evidence in VoIP malicious
attacks is the most difficult task, due to its associated
features with converged network. In this paper, a Model of
investigating VoIP malicious attacks is proposed for
forensic analysis. VoIP spoofing is being a common and
most important threat to the VoIP users. It is technically
possible for an attacker to masquerade as another VoIP
caller (VoIP spoofing). A design of a SIP which will try to
capture all of the data on a VoIP network and process it for
forensic analysis with also detection of the spoofing or the
fake caller address.
Keywords: VoIP, Spoofing, Digital Evidence, Digital
Forensics, SIP
I. INTRODUCTION
Securing VoIP is not an easy task, as it needs efforts in
several stages. One of the essential issues in VoIP security is
protecting the signaling messages being exchanged between
VoIP infrastructures. Signaling does not transfer voice
packets, but is designed for establishing, controlling,
modifying and terminating communications. The protection
of signaling includes integrity and confidentiality of
signaling messages as well as availability and confidentiality
of signaling services [1]. Another core issue in VoIP security
is protecting multimedia communications between
endpoints, which is a separate topic from signaling security.
It consist confidentiality, integrity and availability of
multimedia communications. In this thesis, the scope of our
research ONLY focuses on the security issues of SIP, a
signaling protocol. Security issues deal with the problems
encountered during the authentication phase rather than at
the communication phase. It focuses on the pre-requisites of
the communication so that the attacks can be avoided.
Traditionally, in the normal telephone network, it was much
harder to spoof Caller ID as at every end, a unique phone
number is assigned by the phone company. Today, with the
move to SIP trunks and VoIP technology, spoofing caller ID
is fairly trivial. It has been said that the nature of VoIP calls
make it difficult to trace the identity or location of the
callers. The most outstanding phenomena is Dialing
telephone numbers directly by the arbitrary number
modification software, for fraudulent activities which is
termed as CALLER ID SPOOFING. Existing protocol will
not provide the mechanism for spoofing detection and
prevention. The main challenge in VoIP is to accurately
identify that from where actually the call has been initialized
and identify the legitimate caller.[1,2]
This research focuses on the tendency of the evildoers to
use existing communication technology while committing
the crime basically the SPOOFING in VoIP. The analysis
will be focused on the security of internet phone and design
a prevention method of internet phone call attack and the
attention points of setting up a internet phone to prevent it
from such phone frauds. A design of SIP which will prevent
VoIP spoofing using Public Key Infrastructure concepts and
use it as forensic analysis, all this will help in the detection
and prevention of the spoofing or identify the fake caller.
II. BACKGROUND THEORY
A. What is VoIP? [3]
VoIP stands for-Voice over Internet Protocol (VoIP) or
transmission of voice over internet. In more simple terms,
one can say that VoIP is the transmission of voice over the
digital network. VoIP is an innovative technology which
enables its users to make calls through the existing packet-
switched networks (e.g., the Internet) instead of traditional
PSTN networks. The concept of VoIP is based on the factor
that packets running over an IP network can deliver different
kinds of multimedia contents including text, pictures, audio
and video.
B. VoIP Spoofing Attack
An attacker may insert fake (spoofed) messages into a
certain VoIP session to interrupt the service, or insert them
to steal the session. Attackers and spammers equently spoof
identities in order to become untraceable. It is possible for
an attacker to masquerade as another VoIP caller (VoIP
spoofing).
1) Why people are doing spoofing?
Attackers can use call spoofing for many cyber-crimes.
These may be the main reasons.
1) Making abusive or threatening calls.
2) Making calls from bank numbers to ask users
personal banking details.
3) Marketing company using this to fake a number to
show that it comes from local area. And then trick
users to sale their services.
C. Digital Evidence [7]
Digital evidence or Electronic evidence is any probative
information stored or transmitted in digital form that a party
to a court case may use at trial. Before accepting digital
evidence a court will determine if the evidence is relevant,
whether it is authentic, if it is hearsay and whether a copy is
acceptable or the original is required.
Analysis of VoIP Forensics with Digital Evidence Procedure
Ovel Database-Centric Framework For Incremental Information
Extraction
Riddhi Patel1
Aditya K. Sinha2
1
PG Student 2
Principal Technical Officer
1
Department of Computer Engineering, GTU, India 2
CDAC-ACTS, Pune, India
S.P.B.Patel Engineering College, Mehsana, Gujarat
Analysis of VoIP Forensics with Digital Evidence Procedure
(IJSRD/Vol. 1/Issue 4/2013/0020)
All rights reserved by www.ijsrd.com 885
1) Integrating Digital Evidence with VoIP call
1) In VoIP we can find address of spoofed call and
present it as evidence in court.
2) So, basically when a VoIP call is made to some one’s
phone and when one find sit as a spoofed(different)
address on the screen then here will try to prevent the
system from spoofed call after crime, if crime has been
done using VoIP, so we can get back to the attacker
using digital evidence. Here, the digital certificate
from CA for that particular user which has been shown
as caller ID can be presented as evidence.
III. ANALYSIS OF EXISTING SIP PROTOCOL IN VOIP
PACKET
A. Introducing SIP [4]
SIP, developed by IETF, is a text-encoded protocol based on
elements from the HTTP and SMTP protocols. The primary
function of SIP is to establish or terminate a session between
two or more endpoints, but it also contains other important
function such as notification for presence and short
messaging services. Similar to email users, SIP users are
rep-resented by means of Uniform Resource Identifier
(URI), a universal name with a pair of domain name and a
user name registered for this domain. Most current SIP
applications in the real world employ a client/server
transaction model similar to HTTP. A SIP client generates
SIP request messages and a SIP server responds by
generating response messages. SIP RFC is RFC 3261.[5]
That being said, SIP is flexible and open enough to
allow developers to build their own “hooks” into SIP. This
flexibility has given SIP an advantage over other
“telecommunications protocols,” and is why many
enterprises are eager to develop, implement, and use SIP.
B. SIP SERVICES [4]
SIP supports basically five services for managing
communication:
1) User Location: determination of the end system to
be used for communication
2) User Availability: determination of the willingness
of the called party to engage in communications.
3) User Capabilities: determination of the media and its
parameters to be used.
4) Call Setup: ringing and establishing call parameters
at both called and calling party.
5) Call handling: the transfer and termination of calls.
C. Components of SIP [5]
1) User Agent Client: Actual client who is requesting
for call to establish. Eg: Soft phone, IP phone
2) User Agent Server: It is a server which is
responsible to initiate the call to the destination and
provides VoIP services.
3) Registration Server: In order to establish call, user
(UAC) has to get registered to the SIP server. So
registration server will performs the authorization
of user.
4) Proxy Server: It works as a forwarder, in which UA
will locate one proxy server, proxy will forward it
to another and so on up to the destination server. It
also provides routing, authentication, authorization,
address resolution, and loop detection.
D. Security mechanism in SIP RFC [8]
Here, we have listed some of the security mechanisms with
a detailed explanation given below:
1) SIP Digest
This digest authentication algorithm (RFC-2617) is
currently the most frequently deployed security mechanism
with SIP. Derived from HTTP Digest it allows
authentication of a SIP subscriber (user agent, proxy-server
or registrar server). It is based on the transmission of a
shared secret, which consists of a checksum over a nonce
and parameters (user name, password, nonce, SIP method,
Request URI). SIP Digest does not exchange passwords.
The shared secret is hashed using MD5 or SHA- 1. SHA-1
is the IETF recommendation.
2) SIPS
SIPS (SIP over SSL/TLS) protect sensitive data such as
SIP URI, IP addresses from sniffing or message
manipulation. The URI scheme slightly differs from the
conventional SIP URI: sips:this_is_me@sip.com. SIPS
encrypts a connection between a SIP subscriber and a SIPS
URI and the network instances (user agent, proxy server,
DNS server, location server) in between via SSL/TLS.
However, because of SSL/TLS SIPS has to be transmitted
via TCP, instead of UDP. The default TCP port for SIP
over TLS is 5061. User authentication is accomplished by
SIP Digest, which hashes the SIP message (digital
signature).
3) SRTP
As RTP and RTCP do not offer any protection against
sniffing and manipulation of VoIP data, SRTP (Secure
Real-Time Transport Protocol; RFC-3711) has been
developed. It constitutes an alternative to IPsec based VPN
communications, particularly for real-time transport. SRTP
encrypts data symmetrically with AES2 (Advanced
Encryption Standard), i.e. SRTP is the secured variant of
RTP and SRTCP of RTCP respectively. They complicate
attacks such as sniffing, replay and DoS. For transportation
RTP/RTCP packets are encapsulated in SRTP/SRTCP
packets. Security features of SRTP comprise:
1) Encryption of the media stream (against sniffing)
2) Authentication of the sender (against identity
spoofing)
3) Validation of the integrity (against
modification/manipulation)
4) Replay3 protection (against unauthorized access to
end-points)
4) S/MIME
S/MIME (Security/Multipurpose Internet Mail Extension;
RFC-2311) has been originally designed to encrypt and
authenticate message bodies (MIME) in email
communications. However, MIME is not restricted to email
messaging. It can be applied for secured end-to-end
transport of message bodies within IP and thus it is suitable
for SIP. In addition to SDP parameters detailed subscriber
information data (e.g. presence information) can be secured
as well. In contrast to SIP, where encryption is only applied
on a “hop-by-hop” basis and thus information contained in
the message bodies are unencrypted within the traversed
SIP network, S/MIME offers “end-to-end” encryption.
Analysis of VoIP Forensics with Digital Evidence Procedure
(IJSRD/Vol. 1/Issue 4/2013/0020)
All rights reserved by www.ijsrd.com 886
Table (3): Overview of VoIP Security Protocol
IV. PROBLEMS IN SIP AUTHENTICATION
We have two major weaknesses in HTTP digest
authentication in SIP. The first missing security issue is the
lack of securing all headers and parameters in SIP which
would possibly need protection. The second security
weakness, relating to digest authentication, is the
requirement of pre-existing user configuration on servers,
which does not scale well [9].Though, for authenticating in
cellular mobile communication, it provides simple
authentication. This solution enables a mutual authentication
between any devices and the network. This security policy
requires a shared secret key and a shared cryptographic
algorithm that exist in SIP. So, pre-share keys are one of the
main problems for security distributed keys and cause
algorithm load for encode and decode security information
packet. S/MIME in SIP is used on carrying signed or
encrypted replication of headers and authenticating users.
This mechanism lacks the public key distribution problem,
which means that the public keys used in authentication are
difficult to distribute and maintain. The public key
infrastructure is also susceptible to man-in-the middle attack
[3]. It uses several hash computations and server certificates
to ensure security. This causes overhead and reduction in
performance.
1) One of the crucial security issues faced by current SIP
Protocol in how to authenticate end user identities. In
SIP , the identity of an end user is defined by its SIP
Uniform Identifier(URI), Which typically has a
canonical address-of record(AoR), From field, for ex:
sip:alice@10.0.2.1 . There are several places within a
SIP request where an end user can express his identity.
For example, the user populated From header field in the
SIP INVITE message. Hence an end user can spoof his
identity by inserting a false address in the From field and
there is no mechanism for verifying that field.
2) Source IP cannot be determine because VoIP assign IP
address dynamically. Since request and response each of
the header contains the field name as “Via:” which store
the path of each proxy so that receiver can communicate
to the same path but the problem is that what about the
path from UAC to proxy, proxy will not store that
address, only SIP address of the caller (UAC) will be in
the header but not any other information. So that makes
it difficult to reach to the caller. In the proposed SIP
stack they have the proxy which has the authentication
certificate. but they do not have the client which has its
own certificate which uniquely identifies the user and its
public key and private key. Another problem is the path
between caller (UAC) to proxy is still unsecure so that
the authentication is also unsecure because man in the
middle attack can be possible between UAC and proxy.
If the user is authorized then it won’t create any problem
but if the user is attacker and he wants to attack by doing
spoofed call then we can never determine that who has
done attack and from where it has been initiated because
VoIP uses dynamic IP address.
3) In the existing mechanism, SIP can provide client-to-
client protection only at the time of media exchange
using RTP and not at the time of authentication. So to
lessen the impact of the vulnerabilities from all the above
mentioned issues. There is a need for a stronger
authentication mechanism.
V. PROPOSED APPROACH
A. Proposed Authentication Mechanism
The proposed mechanism has the following features, as
shown below:
1) Proposes a transitive authentication mechanism
1) A new SIP header
2) An authentication service running on proxies
and UAC both
3) Only relevant for SIP requests, not responses
B. Steps in header verification
1) Acquire certificate for domain either stored or
retrieved
2) Validate certificate, determine signer's authority over
“From”
3) Verify signature
4) Validate Date, Contact, Call-ID
We will start explaining the concept starting from the
problem mentioned below:
Suppose if Alice sends an INVITE message along with her
signature to Bob, then Bob would require Alice’s public key
to verify her signature. Hence in this case, Bob is faced with
two problems:
1) How and from where would Bob retrieve Alice’s
public key?
2) And how can Alice be sure that the key is actually
Bob’s public key and not the attacker’s public key?
Public Key Infrastructure (PKI) helps solve the above
problem. The purpose of PKI is to help Bob retrieve Alice’s
public key, and to assure Alice that the key really belongs to
Alice and not of somebody else. PKI distributes public keys
using public key certificates.
However, with VoIP communications the audio signal is
converted in several encrypted digital 'packets' which are
sent separately via different routes across the internet, only
re-collating when they reach the other user's computer. This
means that there is no exchange through which all the
information passes and so traditional methods of
interception are ineffective. Instead, the problem of
interception becomes one for computer forensic analysts.
Analysis of VoIP Forensics with Digital Evidence Procedure
(IJSRD/Vol. 1/Issue 4/2013/0020)
All rights reserved by www.ijsrd.com 887
Fig (1): Proposed Approach
VI. PERFORMANCE EVALUATION, RESULT &
ANALYSIS
A. Analysis of Modified SIP Protocol
The end user certificate and a server certificate has been
created by running the “riddhi_certificate_create” script in
the contrib/scripts shown as below.
Fig (2)
In the development, standardization and implementation of
LTE Networks based on Orthogonal Freq. Division Multiple
Access (OFDMA), simulations are necessary to test as well
as optimize algorithms and procedures before real time
establishment. This can be done by both Physical Layer
(Link-Level) and Network (System-Level) context. This
paper proposes Network Simulator 3 (NS-3) which is
capable of evaluating the performance of the Downlink
Shared Channel of LTE networks and comparing it with
available MATLAB based LTE System Level Simulator
performance.
KEY WORDS--3GPP, LTE, Downlink, NS-3, Simulator,
MAC, PHY
VII. INTRODUCTION
The Long Term Evolution (LTE) standard specified by the
3rd Generation Partnership Project (3GPP) is a new mobile
communication technology, which is evolution of the
Universal Mobile Telecommunications System (UMTS) and
High-Speed Packet Access (HSPA) systems. LTE intends to
deliver high speed data and multimedia services to next
generation. LTE is also backward compatible with the
CDMA family of technologies and thereby enables even
CDMA operators to move to this technology. The main
reasons for these changes in the Radio Access Network
(RAN) system design are the need to provide higher spectral
efficiency, lower delay, and more multi-user flexibility than
the currently deployed networks. LTE supports scalable
carrier bandwidths, from 1.4 MHz to 20 MHz and supports
both frequency division duplexing (FDD) and time-division
duplexing (TDD). The IP-based network architecture called
the Evolved Packet Core (EPC) is designed to replace the
GPRS Core Network. The LTE device has been conceived
as a container of several entities: the IP classifier, the RRC
entity, the MAC entity and the PHY layer. The core of the
LTE module is composed by both MAC and PHY layers of
an LTE device.
The Evolved Packet Core comprises the Mobility
Management Entity (MME), the Serving Gateway (SGW),
and the Packet Data Network Gateway (PGW). The MME is
responsible for user mobility, intra-LTE handover, and
tracking and paging procedures of User Equipment (UEs)
upon connection establishment. The main purpose of the
SGW is, instead, to route and forward user data packets
among LTE nodes, and to manage handover among LTE
and other 3GPP technologies. The PGW interconnects LTE
network with the rest of the world, providing connectivity
among UEs and external packet data networks. The LTE
access network can host only two kinds of node: the UE
(that is the end-user) and the eNB. Note that eNB nodes are
directly connected to each other (this speeds up signaling
procedures) and to the MME gateway. The eNB is the only
device in charge of performing both radio resource
management and control procedures on the radio interface.
Figure 1 shows Service Architecture Evolution in LTE
network [7].
After certificate generation, now we will try to
establish a call between two of the clients using the
certificates and then analyze the call for the resultant
scenario. For that we have to recompile our modified SIP
code and run SIP phone again.
Once a call has been established will capture the
VoIP Packets using WIRESHARK and analyze the
REGISTER packet. it will show that user is able to add his
URL.
Fig (3): modified SIP with URL
Analysis of VoIP Forensics with Digital Evidence Procedure
(IJSRD/Vol. 1/Issue 4/2013/0020)
All rights reserved by www.ijsrd.com 888
A. Modified SIP REGISTER Packet
The following figure shows the packet captured during a
normal VoIP call scenario.
1) Client (UAC A) to server normal
Fig. (4) SIP INVITE from Client (UAC A) to Server
After modifying the code, when client will establish a call,
at that time after capturing the packet (client to server) and
analyzing it, it shows an extra field showing the hash value.
2) Modified SIP INVITE packet Client (UAC A) to Server
Fig. (5) Modified SIP INVITE from Client to Server
The below figure shows the comparative analysis of the
hash generated manually for the header packet to the hash
generated by client in SIP packet and both the values show
same result. This again shows the normal call establishment
between Servers to client (UAC B). It has been added to
show a comparative analysis of the packets virtue to the
header fields modified and the proposed result
When client will establish a call, at that time after capturing
the packet (server to client) and analyzing it, it shows URL
Fig. (5) SIP INVITE from Server to Client (end user)
field which is added by server and also shows the hash
already generated by client.
3) Modified SIP INVITE Packet from Server to Client
Fig. (6) Modified SIP INVITE from Server to Client
At this point, the generated hash is encrypted by client and
able to send along with the original header to the receiver
side and at receiver side, the encrypted hash is decrypted
and compared with the hash value contained in the original
header
REFERENCES
[1] R.Zhang, X. Wang, X. Yang, and X. Jiang. “Billing
attacks on SIP-based VoIP systems”. In WOOT ’07:
Proceedings of the first USENIX workshop on Oensive
Technologies, pages 1–8, Berkeley, CA, USA, 2007.
USENIX Association.
[2] Global NGN IP VoIP - Analyses Statistics and forecasts.
http://www.marketresearch.com/product/display.asp?pro
ductid=1513239&g=1 2007.
[3] D. Richard Kuhn, Thomas J. Walsh, Steffen Fries
“Security Consideration for Voice Over IP Systems”
National Institute of Standards & Technology.
Gaithersburg
[4] Paul Stalvig “Session Initiated Protocol – A Five Fun-
ction Protocol”
[5] Rakesh Arora “Voice Over IP Protocols and Standards”
[6] http://www.ietf.org/rfc/rfc3261.txt
[7] Jill Slay12, Matthew Simon1, David Irwin “Voice Over
IP And Forensics: A Review of Recent Australian
Work”, University of South Australia, Mawson Lakes,
SA 5095, AUSTRALIA.
[8] Prof. Dr. Even Eren, Dr. Kai-Oliver Detken “Voice-
over-IP Security Mechanisms – State-of-the-art, risks
assessment, concepts and recommendations”, 2007.
[9] A. Nemi, J. Arkko, V. Torvinen, '' Hypertext Transfer
Protocol(HTTP) Digest Authentication Using
Authentication and Key Agrement(AKA)”, IETF RFC
3310, 2002.

More Related Content

What's hot

Securing VoIP Networks
Securing VoIP NetworksSecuring VoIP Networks
Securing VoIP Networks
GENBANDcorporate
 
Hacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To KnowHacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To Know
Dan York
 
BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.
Sumutiu Marius
 
Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Hacking SIP Like a Boss!
Hacking SIP Like a Boss!
Fatih Ozavci
 
Ce hv8 module 03 scanning networks
Ce hv8 module 03 scanning networksCe hv8 module 03 scanning networks
Ce hv8 module 03 scanning networks
Mehrdad Jingoism
 
The Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopThe Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 Workshop
Fatih Ozavci
 
Internet Relay Chat Forensics
Internet Relay Chat ForensicsInternet Relay Chat Forensics
Internet Relay Chat Forensics
IJSRD
 
VoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco PhonesVoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco Phones
Fatih Ozavci
 
Hacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysHacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP Gateways
Fatih Ozavci
 
VoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers AwakenVoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers Awaken
Fatih Ozavci
 
VoIP Wars : Return of the SIP
VoIP Wars : Return of the SIP VoIP Wars : Return of the SIP
VoIP Wars : Return of the SIP
Fatih Ozavci
 
Cscu module 04 data encryption
Cscu module 04 data encryptionCscu module 04 data encryption
Cscu module 04 data encryption
Sejahtera Affif
 
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
Fatih Ozavci
 
Performance analysis vo_ip_client_integrated_encryption_module11a
Performance analysis vo_ip_client_integrated_encryption_module11aPerformance analysis vo_ip_client_integrated_encryption_module11a
Performance analysis vo_ip_client_integrated_encryption_module11a
Rizal Broer
 
Performance Analysis between H.323 and SIP over VoIP
Performance Analysis between H.323 and SIP over VoIPPerformance Analysis between H.323 and SIP over VoIP
Performance Analysis between H.323 and SIP over VoIP
ijtsrd
 
Departed Communications: Learn the ways to smash them!
Departed Communications: Learn the ways to smash them!Departed Communications: Learn the ways to smash them!
Departed Communications: Learn the ways to smash them!
Fatih Ozavci
 
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceHardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Fatih Ozavci
 
SIP trunking: Weapon of mass communication
SIP trunking: Weapon of mass communicationSIP trunking: Weapon of mass communication
SIP trunking: Weapon of mass communication
Flowroute
 
VOIP
VOIPVOIP
2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement
TELKOMNIKA JOURNAL
 

What's hot (20)

Securing VoIP Networks
Securing VoIP NetworksSecuring VoIP Networks
Securing VoIP Networks
 
Hacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To KnowHacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To Know
 
BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.
 
Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Hacking SIP Like a Boss!
Hacking SIP Like a Boss!
 
Ce hv8 module 03 scanning networks
Ce hv8 module 03 scanning networksCe hv8 module 03 scanning networks
Ce hv8 module 03 scanning networks
 
The Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopThe Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 Workshop
 
Internet Relay Chat Forensics
Internet Relay Chat ForensicsInternet Relay Chat Forensics
Internet Relay Chat Forensics
 
VoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco PhonesVoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco Phones
 
Hacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysHacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP Gateways
 
VoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers AwakenVoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers Awaken
 
VoIP Wars : Return of the SIP
VoIP Wars : Return of the SIP VoIP Wars : Return of the SIP
VoIP Wars : Return of the SIP
 
Cscu module 04 data encryption
Cscu module 04 data encryptionCscu module 04 data encryption
Cscu module 04 data encryption
 
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
 
Performance analysis vo_ip_client_integrated_encryption_module11a
Performance analysis vo_ip_client_integrated_encryption_module11aPerformance analysis vo_ip_client_integrated_encryption_module11a
Performance analysis vo_ip_client_integrated_encryption_module11a
 
Performance Analysis between H.323 and SIP over VoIP
Performance Analysis between H.323 and SIP over VoIPPerformance Analysis between H.323 and SIP over VoIP
Performance Analysis between H.323 and SIP over VoIP
 
Departed Communications: Learn the ways to smash them!
Departed Communications: Learn the ways to smash them!Departed Communications: Learn the ways to smash them!
Departed Communications: Learn the ways to smash them!
 
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceHardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
 
SIP trunking: Weapon of mass communication
SIP trunking: Weapon of mass communicationSIP trunking: Weapon of mass communication
SIP trunking: Weapon of mass communication
 
VOIP
VOIPVOIP
VOIP
 
2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement
 

Similar to Analysis of VoIP Forensics with Digital Evidence Procedure

76 s201919
76 s20191976 s201919
76 s201919
IJRAT
 
Voice over IP
Voice over IPVoice over IP
Voice over IP
Togis UAB Ltd
 
Voice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A ResearchVoice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A Research
IJMER
 
Review of SIP based DoS attacks
Review of SIP based DoS attacksReview of SIP based DoS attacks
Review of SIP based DoS attacks
Editor IJCATR
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056
mashiur
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
Sean Flores
 
Voippresentation
VoippresentationVoippresentation
Voippresentation
eliran2
 
Sip Protocol
Sip ProtocolSip Protocol
Netas Nova Cyber Security Product Family
Netas Nova Cyber Security Product FamilyNetas Nova Cyber Security Product Family
Netas Nova Cyber Security Product Family
Cagdas Tanriover
 
Voip security
Voip securityVoip security
Voip security
Shethwala Ridhvesh
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
ronak56
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
daniahendric
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
makdul
 
why-your-network-needs-an-sbc-guide.pdf
why-your-network-needs-an-sbc-guide.pdfwhy-your-network-needs-an-sbc-guide.pdf
why-your-network-needs-an-sbc-guide.pdf
tardis2
 
It’s time to boost VoIP network security
It’s time to boost VoIP network securityIt’s time to boost VoIP network security
It’s time to boost VoIP network security
Bev Robb
 
1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...
Alexander Decker
 
Case study about voip
Case study about voipCase study about voip
Case study about voip
elmudthir
 
Raisul Haq Rajib (063435056)
Raisul Haq Rajib  (063435056)Raisul Haq Rajib  (063435056)
Raisul Haq Rajib (063435056)
mashiur
 
THE GOOD SEED DROP-IN, Website - (goodseedcdc.org) MISSION.docx
THE GOOD SEED DROP-IN, Website - (goodseedcdc.org) MISSION.docxTHE GOOD SEED DROP-IN, Website - (goodseedcdc.org) MISSION.docx
THE GOOD SEED DROP-IN, Website - (goodseedcdc.org) MISSION.docx
rtodd33
 
Reliance jio 4G & Volte
Reliance jio 4G & VolteReliance jio 4G & Volte
Reliance jio 4G & Volte
Marlabs
 

Similar to Analysis of VoIP Forensics with Digital Evidence Procedure (20)

76 s201919
76 s20191976 s201919
76 s201919
 
Voice over IP
Voice over IPVoice over IP
Voice over IP
 
Voice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A ResearchVoice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A Research
 
Review of SIP based DoS attacks
Review of SIP based DoS attacksReview of SIP based DoS attacks
Review of SIP based DoS attacks
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
 
Voippresentation
VoippresentationVoippresentation
Voippresentation
 
Sip Protocol
Sip ProtocolSip Protocol
Sip Protocol
 
Netas Nova Cyber Security Product Family
Netas Nova Cyber Security Product FamilyNetas Nova Cyber Security Product Family
Netas Nova Cyber Security Product Family
 
Voip security
Voip securityVoip security
Voip security
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
why-your-network-needs-an-sbc-guide.pdf
why-your-network-needs-an-sbc-guide.pdfwhy-your-network-needs-an-sbc-guide.pdf
why-your-network-needs-an-sbc-guide.pdf
 
It’s time to boost VoIP network security
It’s time to boost VoIP network securityIt’s time to boost VoIP network security
It’s time to boost VoIP network security
 
1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...
 
Case study about voip
Case study about voipCase study about voip
Case study about voip
 
Raisul Haq Rajib (063435056)
Raisul Haq Rajib  (063435056)Raisul Haq Rajib  (063435056)
Raisul Haq Rajib (063435056)
 
THE GOOD SEED DROP-IN, Website - (goodseedcdc.org) MISSION.docx
THE GOOD SEED DROP-IN, Website - (goodseedcdc.org) MISSION.docxTHE GOOD SEED DROP-IN, Website - (goodseedcdc.org) MISSION.docx
THE GOOD SEED DROP-IN, Website - (goodseedcdc.org) MISSION.docx
 
Reliance jio 4G & Volte
Reliance jio 4G & VolteReliance jio 4G & Volte
Reliance jio 4G & Volte
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
ijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
ijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
ijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
ijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
ijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
ijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
ijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
ijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
ijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
ijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
ijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
ijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
ijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
Dwarkadas J Sanghvi College of Engineering
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
Addu25809
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
Prakhyath Rai
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
vmspraneeth
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
uqyfuc
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
sydezfe
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
mahaffeycheryld
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Transcat
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
harshapolam10
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
PreethaV16
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Zener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and ApplicationsZener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and Applications
Shiny Christobel
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 

Recently uploaded (20)

LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Zener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and ApplicationsZener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and Applications
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 

Analysis of VoIP Forensics with Digital Evidence Procedure

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 4, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 884 Abstract— The invention of Voice over Internet Protocol (VoIP) in communication technology created significant attractive services for its users, it also brings new security threats. Criminals exploit these security threats to perform illegal activities such as VoIP malicious attacks, this will require digital forensic investigators to detect and provide digital evidence. Finding digital evidence in VoIP malicious attacks is the most difficult task, due to its associated features with converged network. In this paper, a Model of investigating VoIP malicious attacks is proposed for forensic analysis. VoIP spoofing is being a common and most important threat to the VoIP users. It is technically possible for an attacker to masquerade as another VoIP caller (VoIP spoofing). A design of a SIP which will try to capture all of the data on a VoIP network and process it for forensic analysis with also detection of the spoofing or the fake caller address. Keywords: VoIP, Spoofing, Digital Evidence, Digital Forensics, SIP I. INTRODUCTION Securing VoIP is not an easy task, as it needs efforts in several stages. One of the essential issues in VoIP security is protecting the signaling messages being exchanged between VoIP infrastructures. Signaling does not transfer voice packets, but is designed for establishing, controlling, modifying and terminating communications. The protection of signaling includes integrity and confidentiality of signaling messages as well as availability and confidentiality of signaling services [1]. Another core issue in VoIP security is protecting multimedia communications between endpoints, which is a separate topic from signaling security. It consist confidentiality, integrity and availability of multimedia communications. In this thesis, the scope of our research ONLY focuses on the security issues of SIP, a signaling protocol. Security issues deal with the problems encountered during the authentication phase rather than at the communication phase. It focuses on the pre-requisites of the communication so that the attacks can be avoided. Traditionally, in the normal telephone network, it was much harder to spoof Caller ID as at every end, a unique phone number is assigned by the phone company. Today, with the move to SIP trunks and VoIP technology, spoofing caller ID is fairly trivial. It has been said that the nature of VoIP calls make it difficult to trace the identity or location of the callers. The most outstanding phenomena is Dialing telephone numbers directly by the arbitrary number modification software, for fraudulent activities which is termed as CALLER ID SPOOFING. Existing protocol will not provide the mechanism for spoofing detection and prevention. The main challenge in VoIP is to accurately identify that from where actually the call has been initialized and identify the legitimate caller.[1,2] This research focuses on the tendency of the evildoers to use existing communication technology while committing the crime basically the SPOOFING in VoIP. The analysis will be focused on the security of internet phone and design a prevention method of internet phone call attack and the attention points of setting up a internet phone to prevent it from such phone frauds. A design of SIP which will prevent VoIP spoofing using Public Key Infrastructure concepts and use it as forensic analysis, all this will help in the detection and prevention of the spoofing or identify the fake caller. II. BACKGROUND THEORY A. What is VoIP? [3] VoIP stands for-Voice over Internet Protocol (VoIP) or transmission of voice over internet. In more simple terms, one can say that VoIP is the transmission of voice over the digital network. VoIP is an innovative technology which enables its users to make calls through the existing packet- switched networks (e.g., the Internet) instead of traditional PSTN networks. The concept of VoIP is based on the factor that packets running over an IP network can deliver different kinds of multimedia contents including text, pictures, audio and video. B. VoIP Spoofing Attack An attacker may insert fake (spoofed) messages into a certain VoIP session to interrupt the service, or insert them to steal the session. Attackers and spammers equently spoof identities in order to become untraceable. It is possible for an attacker to masquerade as another VoIP caller (VoIP spoofing). 1) Why people are doing spoofing? Attackers can use call spoofing for many cyber-crimes. These may be the main reasons. 1) Making abusive or threatening calls. 2) Making calls from bank numbers to ask users personal banking details. 3) Marketing company using this to fake a number to show that it comes from local area. And then trick users to sale their services. C. Digital Evidence [7] Digital evidence or Electronic evidence is any probative information stored or transmitted in digital form that a party to a court case may use at trial. Before accepting digital evidence a court will determine if the evidence is relevant, whether it is authentic, if it is hearsay and whether a copy is acceptable or the original is required. Analysis of VoIP Forensics with Digital Evidence Procedure Ovel Database-Centric Framework For Incremental Information Extraction Riddhi Patel1 Aditya K. Sinha2 1 PG Student 2 Principal Technical Officer 1 Department of Computer Engineering, GTU, India 2 CDAC-ACTS, Pune, India S.P.B.Patel Engineering College, Mehsana, Gujarat
  • 2. Analysis of VoIP Forensics with Digital Evidence Procedure (IJSRD/Vol. 1/Issue 4/2013/0020) All rights reserved by www.ijsrd.com 885 1) Integrating Digital Evidence with VoIP call 1) In VoIP we can find address of spoofed call and present it as evidence in court. 2) So, basically when a VoIP call is made to some one’s phone and when one find sit as a spoofed(different) address on the screen then here will try to prevent the system from spoofed call after crime, if crime has been done using VoIP, so we can get back to the attacker using digital evidence. Here, the digital certificate from CA for that particular user which has been shown as caller ID can be presented as evidence. III. ANALYSIS OF EXISTING SIP PROTOCOL IN VOIP PACKET A. Introducing SIP [4] SIP, developed by IETF, is a text-encoded protocol based on elements from the HTTP and SMTP protocols. The primary function of SIP is to establish or terminate a session between two or more endpoints, but it also contains other important function such as notification for presence and short messaging services. Similar to email users, SIP users are rep-resented by means of Uniform Resource Identifier (URI), a universal name with a pair of domain name and a user name registered for this domain. Most current SIP applications in the real world employ a client/server transaction model similar to HTTP. A SIP client generates SIP request messages and a SIP server responds by generating response messages. SIP RFC is RFC 3261.[5] That being said, SIP is flexible and open enough to allow developers to build their own “hooks” into SIP. This flexibility has given SIP an advantage over other “telecommunications protocols,” and is why many enterprises are eager to develop, implement, and use SIP. B. SIP SERVICES [4] SIP supports basically five services for managing communication: 1) User Location: determination of the end system to be used for communication 2) User Availability: determination of the willingness of the called party to engage in communications. 3) User Capabilities: determination of the media and its parameters to be used. 4) Call Setup: ringing and establishing call parameters at both called and calling party. 5) Call handling: the transfer and termination of calls. C. Components of SIP [5] 1) User Agent Client: Actual client who is requesting for call to establish. Eg: Soft phone, IP phone 2) User Agent Server: It is a server which is responsible to initiate the call to the destination and provides VoIP services. 3) Registration Server: In order to establish call, user (UAC) has to get registered to the SIP server. So registration server will performs the authorization of user. 4) Proxy Server: It works as a forwarder, in which UA will locate one proxy server, proxy will forward it to another and so on up to the destination server. It also provides routing, authentication, authorization, address resolution, and loop detection. D. Security mechanism in SIP RFC [8] Here, we have listed some of the security mechanisms with a detailed explanation given below: 1) SIP Digest This digest authentication algorithm (RFC-2617) is currently the most frequently deployed security mechanism with SIP. Derived from HTTP Digest it allows authentication of a SIP subscriber (user agent, proxy-server or registrar server). It is based on the transmission of a shared secret, which consists of a checksum over a nonce and parameters (user name, password, nonce, SIP method, Request URI). SIP Digest does not exchange passwords. The shared secret is hashed using MD5 or SHA- 1. SHA-1 is the IETF recommendation. 2) SIPS SIPS (SIP over SSL/TLS) protect sensitive data such as SIP URI, IP addresses from sniffing or message manipulation. The URI scheme slightly differs from the conventional SIP URI: sips:this_is_me@sip.com. SIPS encrypts a connection between a SIP subscriber and a SIPS URI and the network instances (user agent, proxy server, DNS server, location server) in between via SSL/TLS. However, because of SSL/TLS SIPS has to be transmitted via TCP, instead of UDP. The default TCP port for SIP over TLS is 5061. User authentication is accomplished by SIP Digest, which hashes the SIP message (digital signature). 3) SRTP As RTP and RTCP do not offer any protection against sniffing and manipulation of VoIP data, SRTP (Secure Real-Time Transport Protocol; RFC-3711) has been developed. It constitutes an alternative to IPsec based VPN communications, particularly for real-time transport. SRTP encrypts data symmetrically with AES2 (Advanced Encryption Standard), i.e. SRTP is the secured variant of RTP and SRTCP of RTCP respectively. They complicate attacks such as sniffing, replay and DoS. For transportation RTP/RTCP packets are encapsulated in SRTP/SRTCP packets. Security features of SRTP comprise: 1) Encryption of the media stream (against sniffing) 2) Authentication of the sender (against identity spoofing) 3) Validation of the integrity (against modification/manipulation) 4) Replay3 protection (against unauthorized access to end-points) 4) S/MIME S/MIME (Security/Multipurpose Internet Mail Extension; RFC-2311) has been originally designed to encrypt and authenticate message bodies (MIME) in email communications. However, MIME is not restricted to email messaging. It can be applied for secured end-to-end transport of message bodies within IP and thus it is suitable for SIP. In addition to SDP parameters detailed subscriber information data (e.g. presence information) can be secured as well. In contrast to SIP, where encryption is only applied on a “hop-by-hop” basis and thus information contained in the message bodies are unencrypted within the traversed SIP network, S/MIME offers “end-to-end” encryption.
  • 3. Analysis of VoIP Forensics with Digital Evidence Procedure (IJSRD/Vol. 1/Issue 4/2013/0020) All rights reserved by www.ijsrd.com 886 Table (3): Overview of VoIP Security Protocol IV. PROBLEMS IN SIP AUTHENTICATION We have two major weaknesses in HTTP digest authentication in SIP. The first missing security issue is the lack of securing all headers and parameters in SIP which would possibly need protection. The second security weakness, relating to digest authentication, is the requirement of pre-existing user configuration on servers, which does not scale well [9].Though, for authenticating in cellular mobile communication, it provides simple authentication. This solution enables a mutual authentication between any devices and the network. This security policy requires a shared secret key and a shared cryptographic algorithm that exist in SIP. So, pre-share keys are one of the main problems for security distributed keys and cause algorithm load for encode and decode security information packet. S/MIME in SIP is used on carrying signed or encrypted replication of headers and authenticating users. This mechanism lacks the public key distribution problem, which means that the public keys used in authentication are difficult to distribute and maintain. The public key infrastructure is also susceptible to man-in-the middle attack [3]. It uses several hash computations and server certificates to ensure security. This causes overhead and reduction in performance. 1) One of the crucial security issues faced by current SIP Protocol in how to authenticate end user identities. In SIP , the identity of an end user is defined by its SIP Uniform Identifier(URI), Which typically has a canonical address-of record(AoR), From field, for ex: sip:alice@10.0.2.1 . There are several places within a SIP request where an end user can express his identity. For example, the user populated From header field in the SIP INVITE message. Hence an end user can spoof his identity by inserting a false address in the From field and there is no mechanism for verifying that field. 2) Source IP cannot be determine because VoIP assign IP address dynamically. Since request and response each of the header contains the field name as “Via:” which store the path of each proxy so that receiver can communicate to the same path but the problem is that what about the path from UAC to proxy, proxy will not store that address, only SIP address of the caller (UAC) will be in the header but not any other information. So that makes it difficult to reach to the caller. In the proposed SIP stack they have the proxy which has the authentication certificate. but they do not have the client which has its own certificate which uniquely identifies the user and its public key and private key. Another problem is the path between caller (UAC) to proxy is still unsecure so that the authentication is also unsecure because man in the middle attack can be possible between UAC and proxy. If the user is authorized then it won’t create any problem but if the user is attacker and he wants to attack by doing spoofed call then we can never determine that who has done attack and from where it has been initiated because VoIP uses dynamic IP address. 3) In the existing mechanism, SIP can provide client-to- client protection only at the time of media exchange using RTP and not at the time of authentication. So to lessen the impact of the vulnerabilities from all the above mentioned issues. There is a need for a stronger authentication mechanism. V. PROPOSED APPROACH A. Proposed Authentication Mechanism The proposed mechanism has the following features, as shown below: 1) Proposes a transitive authentication mechanism 1) A new SIP header 2) An authentication service running on proxies and UAC both 3) Only relevant for SIP requests, not responses B. Steps in header verification 1) Acquire certificate for domain either stored or retrieved 2) Validate certificate, determine signer's authority over “From” 3) Verify signature 4) Validate Date, Contact, Call-ID We will start explaining the concept starting from the problem mentioned below: Suppose if Alice sends an INVITE message along with her signature to Bob, then Bob would require Alice’s public key to verify her signature. Hence in this case, Bob is faced with two problems: 1) How and from where would Bob retrieve Alice’s public key? 2) And how can Alice be sure that the key is actually Bob’s public key and not the attacker’s public key? Public Key Infrastructure (PKI) helps solve the above problem. The purpose of PKI is to help Bob retrieve Alice’s public key, and to assure Alice that the key really belongs to Alice and not of somebody else. PKI distributes public keys using public key certificates. However, with VoIP communications the audio signal is converted in several encrypted digital 'packets' which are sent separately via different routes across the internet, only re-collating when they reach the other user's computer. This means that there is no exchange through which all the information passes and so traditional methods of interception are ineffective. Instead, the problem of interception becomes one for computer forensic analysts.
  • 4. Analysis of VoIP Forensics with Digital Evidence Procedure (IJSRD/Vol. 1/Issue 4/2013/0020) All rights reserved by www.ijsrd.com 887 Fig (1): Proposed Approach VI. PERFORMANCE EVALUATION, RESULT & ANALYSIS A. Analysis of Modified SIP Protocol The end user certificate and a server certificate has been created by running the “riddhi_certificate_create” script in the contrib/scripts shown as below. Fig (2) In the development, standardization and implementation of LTE Networks based on Orthogonal Freq. Division Multiple Access (OFDMA), simulations are necessary to test as well as optimize algorithms and procedures before real time establishment. This can be done by both Physical Layer (Link-Level) and Network (System-Level) context. This paper proposes Network Simulator 3 (NS-3) which is capable of evaluating the performance of the Downlink Shared Channel of LTE networks and comparing it with available MATLAB based LTE System Level Simulator performance. KEY WORDS--3GPP, LTE, Downlink, NS-3, Simulator, MAC, PHY VII. INTRODUCTION The Long Term Evolution (LTE) standard specified by the 3rd Generation Partnership Project (3GPP) is a new mobile communication technology, which is evolution of the Universal Mobile Telecommunications System (UMTS) and High-Speed Packet Access (HSPA) systems. LTE intends to deliver high speed data and multimedia services to next generation. LTE is also backward compatible with the CDMA family of technologies and thereby enables even CDMA operators to move to this technology. The main reasons for these changes in the Radio Access Network (RAN) system design are the need to provide higher spectral efficiency, lower delay, and more multi-user flexibility than the currently deployed networks. LTE supports scalable carrier bandwidths, from 1.4 MHz to 20 MHz and supports both frequency division duplexing (FDD) and time-division duplexing (TDD). The IP-based network architecture called the Evolved Packet Core (EPC) is designed to replace the GPRS Core Network. The LTE device has been conceived as a container of several entities: the IP classifier, the RRC entity, the MAC entity and the PHY layer. The core of the LTE module is composed by both MAC and PHY layers of an LTE device. The Evolved Packet Core comprises the Mobility Management Entity (MME), the Serving Gateway (SGW), and the Packet Data Network Gateway (PGW). The MME is responsible for user mobility, intra-LTE handover, and tracking and paging procedures of User Equipment (UEs) upon connection establishment. The main purpose of the SGW is, instead, to route and forward user data packets among LTE nodes, and to manage handover among LTE and other 3GPP technologies. The PGW interconnects LTE network with the rest of the world, providing connectivity among UEs and external packet data networks. The LTE access network can host only two kinds of node: the UE (that is the end-user) and the eNB. Note that eNB nodes are directly connected to each other (this speeds up signaling procedures) and to the MME gateway. The eNB is the only device in charge of performing both radio resource management and control procedures on the radio interface. Figure 1 shows Service Architecture Evolution in LTE network [7]. After certificate generation, now we will try to establish a call between two of the clients using the certificates and then analyze the call for the resultant scenario. For that we have to recompile our modified SIP code and run SIP phone again. Once a call has been established will capture the VoIP Packets using WIRESHARK and analyze the REGISTER packet. it will show that user is able to add his URL. Fig (3): modified SIP with URL
  • 5. Analysis of VoIP Forensics with Digital Evidence Procedure (IJSRD/Vol. 1/Issue 4/2013/0020) All rights reserved by www.ijsrd.com 888 A. Modified SIP REGISTER Packet The following figure shows the packet captured during a normal VoIP call scenario. 1) Client (UAC A) to server normal Fig. (4) SIP INVITE from Client (UAC A) to Server After modifying the code, when client will establish a call, at that time after capturing the packet (client to server) and analyzing it, it shows an extra field showing the hash value. 2) Modified SIP INVITE packet Client (UAC A) to Server Fig. (5) Modified SIP INVITE from Client to Server The below figure shows the comparative analysis of the hash generated manually for the header packet to the hash generated by client in SIP packet and both the values show same result. This again shows the normal call establishment between Servers to client (UAC B). It has been added to show a comparative analysis of the packets virtue to the header fields modified and the proposed result When client will establish a call, at that time after capturing the packet (server to client) and analyzing it, it shows URL Fig. (5) SIP INVITE from Server to Client (end user) field which is added by server and also shows the hash already generated by client. 3) Modified SIP INVITE Packet from Server to Client Fig. (6) Modified SIP INVITE from Server to Client At this point, the generated hash is encrypted by client and able to send along with the original header to the receiver side and at receiver side, the encrypted hash is decrypted and compared with the hash value contained in the original header REFERENCES [1] R.Zhang, X. Wang, X. Yang, and X. Jiang. “Billing attacks on SIP-based VoIP systems”. In WOOT ’07: Proceedings of the first USENIX workshop on Oensive Technologies, pages 1–8, Berkeley, CA, USA, 2007. USENIX Association. [2] Global NGN IP VoIP - Analyses Statistics and forecasts. http://www.marketresearch.com/product/display.asp?pro ductid=1513239&g=1 2007. [3] D. Richard Kuhn, Thomas J. Walsh, Steffen Fries “Security Consideration for Voice Over IP Systems” National Institute of Standards & Technology. Gaithersburg [4] Paul Stalvig “Session Initiated Protocol – A Five Fun- ction Protocol” [5] Rakesh Arora “Voice Over IP Protocols and Standards” [6] http://www.ietf.org/rfc/rfc3261.txt [7] Jill Slay12, Matthew Simon1, David Irwin “Voice Over IP And Forensics: A Review of Recent Australian Work”, University of South Australia, Mawson Lakes, SA 5095, AUSTRALIA. [8] Prof. Dr. Even Eren, Dr. Kai-Oliver Detken “Voice- over-IP Security Mechanisms – State-of-the-art, risks assessment, concepts and recommendations”, 2007. [9] A. Nemi, J. Arkko, V. Torvinen, '' Hypertext Transfer Protocol(HTTP) Digest Authentication Using Authentication and Key Agrement(AKA)”, IETF RFC 3310, 2002.