EXTRACTION OF ELECTRONIC EVIDENCE FROM VoIP: IDENTIFICATION & ANALYSIS OF DIGITAL SPEECH

被引:0
|
作者
Irwin, David [1 ]
Dadej, Arek [1 ]
机构
[1] Univ South Australia, Adelaide, SA, Australia
基金
澳大利亚研究理事会;
关键词
Computer forensics; digital evidence; electronic evidence; Voice over Internet Protocol; VoIP; Random Access Memory; RAM; Fast Fourier Transform; Frequency Domain analysis;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Voice over Internet Protocol (VoIP) is increasing in popularity as a cost effective and efficient means of making telephone calls via the Internet. However, VoIP may also be an attractive method of communication to criminals as their true identity may be hidden and voice and video communications are encrypted as they are deployed across the Internet. This produces a new set of challenges for forensic analysts compared with traditional wire-tapping of the Public Switched Telephone Network (PSTN) infrastructure, which is not applicable to VoIP. Therefore, other methods of recovering electronic evidence from VoIP are required. This research investigates the analysis and recovery of digitised human voice, which persists in computer memory after a VoIP call. This paper outlines the ongoing development of a software tool, the purpose of which, determines how remnants of digitised human speech from a VoIP call may be identified within a forensic memory capture based on how the human voice is detected via a microphone and encoded to a digital format using the sound card of a personal computer. This digital format is unencrypted whist stored in Random Access Memory (RAM) before it is passed to the VoIP application for encryption and transmission over the Internet. Similarly, an incoming encrypted VoIP call is decrypted by the VoIP application and passes through RAM unencrypted in order to be played via the speaker output. A series of controlled tests were undertaken whereby RAM captures were analysed for remnants of digital audio after a VoIP audio call with known conversation. The identification and analysis of digital audio from RAM attempts to construct an automatic process for the identification and subsequent reconstruction of the audio content of a VoIP call. This research focuses on the analysis of RAM captures acquired using X-Ways Forensics software. This research topic, guided by a Law Enforcement Agency, uses X-Ways Forensics to simulate a RAM capture which is achieved covertly on a target machine without the user's knowledge, via the Internet, during or after a VoIP call has taken place. The authors assume no knowledge of the technique implemented to recover the covert RAM capture and are asked to base their analysis on a memory capture supplied in the format of a file with a '.txt' extension. The methods of analysis described herein are independent of the acquisition method applied to RAM capture. The goal of this research is to develop automated software that may be applied to a RAM capture to identify fragments of audio persisting in RAM after a VoIP call has been terminated, using time domain and signal processing technique, frequency domain analysis. Once individual segments of audio have been identified, the feasibility of reproducing audio from a VoIP call may be determined.
引用
收藏
页码:55 / 82
页数:28
相关论文
共 50 条
  • [1] Extraction of Electronic Evidence from VoIP: Forensic Analysis of a Virtual Hard Disk vs RAM
    Irwin, David
    Slay, Jill
    Dadej, Arek
    Shore, Malcolm
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2011, 6 (01) : 15 - 35
  • [2] Framework for VOIP speech database generation and a comparaison of different features extraction methodes for speaker identification on VOIP
    Imen, El-Taani
    Imen, Amrous Anissa
    Debyeche, Mohamed
    3RD INTERNATIONAL CONFERENCE ON CONTROL, ENGINEERING & INFORMATION TECHNOLOGY (CEIT 2015), 2015,
  • [3] A pitch analysis technique for automated speech distortion identification in VoIP networks
    Wei, W
    Kilmartin, L
    PROCEEDINGS OF THE 2002 IEEE 10TH DIGITAL SIGNAL PROCESSING WORKSHOP & 2ND SIGNAL PROCESSING EDUCATION WORKSHOP, 2002, : 47 - 52
  • [4] A study on the forensic mechanisms of VoIP attacks: Analysis and digital evidence
    Yen, Yun-Sheng
    Lin, I-Long
    Wu, Bo-Lin
    DIGITAL INVESTIGATION, 2011, 8 (01) : 56 - 67
  • [5] Applying feature extraction of speech recognition on VOIP auditing
    Wang, Xuan
    Lin, Jiancheng
    Sun, Yong
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2007, : 237 - +
  • [6] APPLYING FEATURE EXTRACTION OF SPEECH RECOGNITION ON VOIP AUDITING
    Wang, Xuan
    Lin, Jiancheng
    Sun, Yong
    Gan, Haibo
    Yao, Lin
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (07): : 1851 - 1856
  • [7] APPROACHES TO CODEC INDEPENDENT SPEAKER IDENTIFICATION IN VOIP SPEECH
    Chilli, Anil Kumar
    Kumar, K. R. Prasanna
    Murthy, Hema A.
    Sekhar, C. Chandra
    2018 TWENTY FOURTH NATIONAL CONFERENCE ON COMMUNICATIONS (NCC), 2018,
  • [8] Identification of VoIP Speech With Multiple Domain Deep Features
    Huang, Yuankun
    Li, Bin
    Barni, Mauro
    Huang, Jiwu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2253 - 2267
  • [9] DIGITAL STORAGE AND ANALYSIS OF SPEECH - PITCH EXTRACTION IS UNDOUBTEDLY ONE OF THE MESSIEST AREAS OF SPEECH ANALYSIS
    WITTEN, IH
    WIRELESS WORLD, 1982, 88 (1552): : 44 - 45
  • [10] Investigation of the relation between amount of VoIP speech data and performance in speaker identification task over VoIP Networks
    Bouziane, Ayoub
    Kharroubi, Jamal
    Zarghili, Arsalane
    2015 WORLD CONGRESS ON INFORMATION TECHNOLOGY AND COMPUTER APPLICATIONS (WCITCA), 2015,