Skip to main content

Research Repository

Advanced Search

Modelling based approach for reconstructing evidence of VoIP malicious attacks

Ibrahim, M; Dehghantanha, A

Modelling based approach for reconstructing evidence of VoIP malicious attacks Thumbnail


Authors

M Ibrahim

A Dehghantanha



Abstract

Voice over Internet Protocol (VoIP) is a
new communication technology that uses
internet protocol in providing phone
services. VoIP provides various forms of
benefits such as low monthly fee and
cheaper rate in terms of long distance and
international calls. However, VoIP is
accompanied with novel security threats.
Criminals often take advantages of such
security threats and commit illicit activities.
These activities require digital forensic
experts to acquire, analyses, reconstruct and
provide digital evidence. Meanwhile, there
are various methodologies and models
proposed in detecting, analysing and
providing digital evidence in VoIP forensic.
However, at the time of writing this paper,
there is no model formalized for the
reconstruction of VoIP malicious attacks.
Reconstruction of attack scenario is an
important technique in exposing the
unknown criminal acts. Hence, this paper
will strive in addressing that gap. We
propose a model for reconstructing VoIP
malicious attacks. To achieve that, a formal
logic approach called Secure Temporal
Logic of Action(S-TLA+
) was adopted in
rebuilding the attack scenario. The expected
result of this model is to generate additional
related evidences and their consistency with
the existing evidences can be determined by
means of S-TLA+ model checker.

Citation

Ibrahim, M., & Dehghantanha, A. (2014). Modelling based approach for reconstructing evidence of VoIP malicious attacks. International Journal of Cyber-Security and Digital Forensics, 3(4), 183-199

Journal Article Type Article
Publication Date Jan 1, 2014
Deposit Date Mar 24, 2015
Publicly Available Date Apr 5, 2016
Journal International Journal of Cyber-Security and Digital Forensics (IJCSDF)
Print ISSN 2305-0012
Publisher Society of Digital Information and Wireless Communications
Peer Reviewed Peer Reviewed
Volume 3
Issue 4
Pages 183-199
Publisher URL http://sdiwc.net/security-journal/
Related Public URLs file:///C:/Users/uis630/Downloads/211189c5e384f309ee69e5ca4e77511c.pdf
Additional Information Funders : University Putra Malaysia

Files






Downloadable Citations