2018
DOI: 10.1007/978-3-319-99277-8_11
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Non-Expert Analysis OF Large Volumes OF Intercepted Network Traffic

Abstract: In criminal investigations, telecommunication wiretaps have become a common technique used by law enforcement. While phone-based wiretapping is well documented and the procedure for their execution are well known, the same cannot be said for Internet taps. Lawfully intercepted network traffic often contains a lot of encrypted traffic making it increasingly difficult to find useful information inside the traffic captured. The advent of Internet-of-Things further complicates the process for non-technical investi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 11 publications
(13 reference statements)
0
1
0
Order By: Relevance
“…Each of the mainstream PC operating systems, such as Mac OS, Windows, and Linux, provide built-in hard disk encryption. Meanwhile, network communications, both wired and wireless, commonly employ strong packet encryption mechanisms [5]. Modern computer hardware has made the automated handling of encrypted data an everyday possibility in consumer, industrial and military applications [6].…”
Section: Introductionmentioning
confidence: 99%
“…Each of the mainstream PC operating systems, such as Mac OS, Windows, and Linux, provide built-in hard disk encryption. Meanwhile, network communications, both wired and wireless, commonly employ strong packet encryption mechanisms [5]. Modern computer hardware has made the automated handling of encrypted data an everyday possibility in consumer, industrial and military applications [6].…”
Section: Introductionmentioning
confidence: 99%