Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 管理學院
  3. 資訊管理學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/40319
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor孫雅麗(Yeali S. Sun)
dc.contributor.author"Hao-Wen, Ko"en
dc.contributor.author柯皓文zh_TW
dc.date.accessioned2021-06-14T16:44:45Z-
dc.date.available2008-08-08
dc.date.copyright2008-08-08
dc.date.issued2008
dc.date.submitted2008-08-01
dc.identifier.citation[1] Telecommunications security; Lawful Interception (LI); Requirements for network functions, ETSI ES 201 158, 2002.
[2] European Telecommunications Standards Institute, http://www.etsi.org/
[3] Communications Assistance for Law Enforcement Act, 1994.
[4] R. Dingledine, N. Mathewson and and P. Syverson. “Tor: The Second Generation Onion Router,” In Proceedings of the 13th USENIX Security Symposium, 2004.
[5] Rosenberg, J., Camarillo Ericsson, G. “Best Current Practices for NAT Traversal for SIP,” work in progress (2006)
[6] A. Milanovic, S. Srbljic, I. Raznjevic, D. Sladden, D. Skrobo, I. Matosevic, “Distributed System for Lawful Interception in VoIP Networks,” EUROCON, 2003.
[7] B. Karpagavinayagam, R. State, O. Festor, “Monitoring Architecture for Lawful Interception in VoIP Networks,” ICIMP 2007.
[8] “Lawfully Authorized Electronic Surveillance (LAES) for Voice over Packet Technologies in Wireline Telecommunications Networks,” T1.678, ATIS, 2004.
[9] “Lawful Interception for IP Networks,” White Paper, AQSACOM, 2005
[10] X. Wang, S. Chen, and S. Jajodia, “Tracking Anonymous Peer-to-Peer VoIP Calls on the Internet,” ACM CCS, 2005.
[11] O. Verscheure, M. Vlachos, R. Anagnostopoulos, P. Frossard, E. Bouillet, Philip S. Yu. “Finding “Who is Talking to Whom” in VoIP Networks via Progressive Stream Clustering,” ICDM, 2006.
[12] Martin Dawson, James Winterbottoom, and Martin Thomson: IP Location, McGraw-Hill, 2006
[13] Directives on the retention of data, 2006/24/EC
[14] Notice of Proposed Rulemaking and Declaratory Ruling, http://hraunfoss.fcc.gov/edocs_public/attachmatch/FCC-04-187A1.pdf
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/40319-
dc.description.abstract近年來由於越來越多的犯罪和恐怖組織利用網路電話技術以規避傳統電信通訊監察,因此對國家安全以及法律執行而言,網路電話追蹤機制的建立是迫切需要的。因此將傳統的通訊偵察、電話追蹤的機制擴及至網路電話服務是克不容緩的。
網路電話有多種形式,而且能跨越多個異質網路包含IP網路以及電信網路,這些特性讓網路電話追蹤更具挑戰。在本論文裡,我們考慮的問題為透過取得所需要保存的電話追蹤相關資訊(Traceback Related Information)追蹤”可管理”的網路電話使用者的地理位址以及真實身份。
我們提出一個追蹤架構以及說明其原件的功能。我們也定義了一站接一站(leg-by-leg)的網路電話追蹤所需要的電話追蹤相關資訊的格式。我們舉了IP-IP以及跨異質網路IP-PLMN的網路電話追蹤的案例來說明網路電話追蹤如何進行以及追蹤架構的設計概念。在最後我們並將網路電話追蹤概念擴及至下一代網路(Next Generation Networks)的網路電話追蹤。
zh_TW
dc.description.abstractRecently, an increasing number of incidents by crime and terrorist organizations have used VoIP technology as an alternative communication tool to evade lawful communication interception. The capability of tracking VoIP calls has become imperative and critical to national security and law enforcement. Hence, it is mandatory that the law enforcement of traditional phone services be expanded to cover VoIP services. VoIP services have been provisioned in a variety of forms and across IP (wired and wireless) and telecommunication networks. It has made the law enforcement of VoIP services complex and challenging. In this paper, we investigate the problem of tracing the true identities and geo-locations of the caller/callee of a “managed” VoIP call, by the provision of traceback related information (TRI). We propose a traceback architecture, the functionalities of its components, the TRI information and the data bases crucial for leg-by-leg VoIP origin traceback in VoIP lawful enforcement and traceback. An IP-to-3G and IP-to-IP with NAT VoIP call traceback is presented to illustrate the concepts and designs of the proposed work. Furthermore, we also extend our work to IMS-based Next Generation Networks (NGN) VoIP call traceback.en
dc.description.provenanceMade available in DSpace on 2021-06-14T16:44:45Z (GMT). No. of bitstreams: 1
ntu-97-R95725017-1.pdf: 551675 bytes, checksum: 6f497c7787b57822a3f360821c123780 (MD5)
Previous issue date: 2008
en
dc.description.tableofcontents謝詞 I
論文摘要 II
THESIS ABSTRACT III
CONTENTS IV
LIST OF FIGURES VI
1. INTRODUCTION 1
1.1 BACKGROUND AND MOTIVATION 1
1.2 OBJECTIVES 2
1.3 PAPER ORGANIZATION 5
2. ISSUES IN LAW ENFORCEMENT OF VOIP SERVICES 6
3. RELATED WORKS 9
3.1 IP LOCATION DETERMINATION 9
3.2 PEER-TO-PEER VOIP TRACEBACK 11
3.3 LAWFUL INTERCEPTION 14
4. VOIP TRACEBACK REFERENCE MODEL 18
4.1 THE ARCHITECTURE 18
4.2 FORMATION OF VOIP TRACEBACK CORRELATION CHAIN 21
5. THE VOIP TRACEBACK RELATED INFORMATION 25
5.1 THE DATA BASES 25
5.2 THE VOIP-TRI INFORMATION – WHAT AND WHERE 26
5.3 DISCUSSIONS 32
6. VOIP TRACEBACK 33
6.1 REAL CASES AND THE PROCEDURE OF SIP -BASED VOIP CALL TRACEBACK 33
7. CALL TRACEBACK IN NGN VOIP SERVICES 39
7.1 NEXT GENERATION NETWORKS AND IP MULTIMEDIA SUBSYSTEM 39
7.2 FORMATION OF IMS-BASED NGN VOIP CALL TRACEBACK CORRELATION CHAIN 41
7.3 THE PROCEDURE OF IMS-BASED VOIP CALL TRACEBACK 44
8. CONCLUSIONS 46
REFERENCES 47
dc.language.isozh-TW
dc.subject網路電話追蹤zh_TW
dc.subject網路電話zh_TW
dc.subject資料保存zh_TW
dc.subject跨異質網路zh_TW
dc.subjectIP追蹤zh_TW
dc.subject下一代網路電話追蹤zh_TW
dc.subject通訊監察zh_TW
dc.subjectVoIPen
dc.subjectlaw enforcementen
dc.subjectNext Generation Networks VoIP tracebacken
dc.subjectIP tracebacken
dc.subjectacross heterogeneous networksen
dc.subjectleg-by-leg VoIP tracebacken
dc.subjectdata retentionen
dc.title跨異質網路之網路電話服務的來源追蹤zh_TW
dc.titleLaw Enforcement and Traceback of VoIP Services in Heterogeneous Networksen
dc.typeThesis
dc.date.schoolyear96-2
dc.description.degree碩士
dc.contributor.oralexamcommittee林永松,陳孟彰,蔡志宏
dc.subject.keyword網路電話,資料保存,網路電話追蹤,跨異質網路,IP追蹤,下一代網路電話追蹤,通訊監察,zh_TW
dc.subject.keywordVoIP,data retention,leg-by-leg VoIP traceback,across heterogeneous networks,IP traceback,Next Generation Networks VoIP traceback,law enforcement,en
dc.relation.page48
dc.rights.note有償授權
dc.date.accepted2008-08-01
dc.contributor.author-college管理學院zh_TW
dc.contributor.author-dept資訊管理學研究所zh_TW
顯示於系所單位:資訊管理學系

文件中的檔案:
檔案 大小格式 
ntu-97-1.pdf
  未授權公開取用
538.75 kBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved