2011
DOI: 10.1016/j.diin.2011.03.003
|View full text |Cite
|
Sign up to set email alerts
|

A study on the forensic mechanisms of VoIP attacks: Analysis and digital evidence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…Some of the relevant articles are cited here. Some researchers worked on VoIP client [10], while some researchers focused on VoIP networks [11] [12], some focused on attack patterns [13] [14], while some emphasized on forensics aspects [15] [16]. However, different researchers worked on enhancing security and forensics practice for VoIP attacks, there is still much to do in this field.…”
Section: Related Workmentioning
confidence: 99%
“…Some of the relevant articles are cited here. Some researchers worked on VoIP client [10], while some researchers focused on VoIP networks [11] [12], some focused on attack patterns [13] [14], while some emphasized on forensics aspects [15] [16]. However, different researchers worked on enhancing security and forensics practice for VoIP attacks, there is still much to do in this field.…”
Section: Related Workmentioning
confidence: 99%
“…Step 6 We utilized the DF toolkit, ProDiscover Basic version 4.8a [22] to parse the image file of the RAM, gmail_chat_close_ie_image.dd.…”
Section: Design Of the Experimentsmentioning
confidence: 99%
“…Hai-Cheng Chu et al presented the disclosure of evaporating digital trails respecting the combinations of Gmail and IE for pervasive multimedia. This paper illustrates the essence of generic procedures to provide the probative digital evidences for a typical Gmail Chat session in connection with the IE browser under different scenarios [6]. When the computer-related information security issues arise with regard to the company, the corporate information incident response team should be able to disclose and preserve the evaporating digital trails following the right procedures to avoid the volatile characteristics in their natures.…”
Section: Related Workmentioning
confidence: 99%