Articles

Towards a Forensic Analysis for Multimedia Communication Services

Geneiatakis, Dimitris; Keromytis, Angelos D.

No matter how robust the employed security mechanisms are malicious users or attackers will always find a way to bypass them. In addition, National Institute of Security and Technology mentions "In conjunction with appropriate tools and procedures, audit trail can assist in detecting security violation and flaws in applications". Until now, in Multimedia Communication Services (MCS), such as Voice over IP, audit trails are not utilized in security audits due to (a) the lack of the appropriate analysis tools and (b) privacy restrictions. In this paper we report on the analysis of MCS audit trail by employing a novel method for identifying "uncommon" traffic indicating non normal behaviour that does not violate users' privacy. We rely on entropy theory and the notion of "itself information" to quantify the randomness of specific message segments, and we also introduce the term "actual itself information" for the assessment of entire message randomness. To protect users' privacy we hash audit trail's data. For evaluating the applicability of our proposed method we utilize an audit trail of a real MCS provider published by honey pot project. Initial outcomes show the feasibility of employing such a method to recognize "uncommon" traffic, recorded in MCS audit trail.

Subjects

Files

Also Published In

Title
Proceedings: 25th IEEE International Conference on Advanced Information Networking and Applications Workshops: Biopolis, Singapore, 22-25 March 2011
Publisher
IEEE
DOI
https://doi.org/10.1109/WAINA.2011.14

More About This Work

Academic Units
Computer Science
Published Here
July 10, 2012