請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/40319完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 孫雅麗(Yeali S. Sun) | |
| dc.contributor.author | "Hao-Wen, Ko" | en |
| dc.contributor.author | 柯皓文 | zh_TW |
| dc.date.accessioned | 2021-06-14T16:44:45Z | - |
| dc.date.available | 2008-08-08 | |
| dc.date.copyright | 2008-08-08 | |
| dc.date.issued | 2008 | |
| dc.date.submitted | 2008-08-01 | |
| dc.identifier.citation | [1] Telecommunications security; Lawful Interception (LI); Requirements for network functions, ETSI ES 201 158, 2002.
[2] European Telecommunications Standards Institute, http://www.etsi.org/ [3] Communications Assistance for Law Enforcement Act, 1994. [4] R. Dingledine, N. Mathewson and and P. Syverson. “Tor: The Second Generation Onion Router,” In Proceedings of the 13th USENIX Security Symposium, 2004. [5] Rosenberg, J., Camarillo Ericsson, G. “Best Current Practices for NAT Traversal for SIP,” work in progress (2006) [6] A. Milanovic, S. Srbljic, I. Raznjevic, D. Sladden, D. Skrobo, I. Matosevic, “Distributed System for Lawful Interception in VoIP Networks,” EUROCON, 2003. [7] B. Karpagavinayagam, R. State, O. Festor, “Monitoring Architecture for Lawful Interception in VoIP Networks,” ICIMP 2007. [8] “Lawfully Authorized Electronic Surveillance (LAES) for Voice over Packet Technologies in Wireline Telecommunications Networks,” T1.678, ATIS, 2004. [9] “Lawful Interception for IP Networks,” White Paper, AQSACOM, 2005 [10] X. Wang, S. Chen, and S. Jajodia, “Tracking Anonymous Peer-to-Peer VoIP Calls on the Internet,” ACM CCS, 2005. [11] O. Verscheure, M. Vlachos, R. Anagnostopoulos, P. Frossard, E. Bouillet, Philip S. Yu. “Finding “Who is Talking to Whom” in VoIP Networks via Progressive Stream Clustering,” ICDM, 2006. [12] Martin Dawson, James Winterbottoom, and Martin Thomson: IP Location, McGraw-Hill, 2006 [13] Directives on the retention of data, 2006/24/EC [14] Notice of Proposed Rulemaking and Declaratory Ruling, http://hraunfoss.fcc.gov/edocs_public/attachmatch/FCC-04-187A1.pdf | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/40319 | - |
| dc.description.abstract | 近年來由於越來越多的犯罪和恐怖組織利用網路電話技術以規避傳統電信通訊監察,因此對國家安全以及法律執行而言,網路電話追蹤機制的建立是迫切需要的。因此將傳統的通訊偵察、電話追蹤的機制擴及至網路電話服務是克不容緩的。
網路電話有多種形式,而且能跨越多個異質網路包含IP網路以及電信網路,這些特性讓網路電話追蹤更具挑戰。在本論文裡,我們考慮的問題為透過取得所需要保存的電話追蹤相關資訊(Traceback Related Information)追蹤”可管理”的網路電話使用者的地理位址以及真實身份。 我們提出一個追蹤架構以及說明其原件的功能。我們也定義了一站接一站(leg-by-leg)的網路電話追蹤所需要的電話追蹤相關資訊的格式。我們舉了IP-IP以及跨異質網路IP-PLMN的網路電話追蹤的案例來說明網路電話追蹤如何進行以及追蹤架構的設計概念。在最後我們並將網路電話追蹤概念擴及至下一代網路(Next Generation Networks)的網路電話追蹤。 | zh_TW |
| dc.description.abstract | Recently, an increasing number of incidents by crime and terrorist organizations have used VoIP technology as an alternative communication tool to evade lawful communication interception. The capability of tracking VoIP calls has become imperative and critical to national security and law enforcement. Hence, it is mandatory that the law enforcement of traditional phone services be expanded to cover VoIP services. VoIP services have been provisioned in a variety of forms and across IP (wired and wireless) and telecommunication networks. It has made the law enforcement of VoIP services complex and challenging. In this paper, we investigate the problem of tracing the true identities and geo-locations of the caller/callee of a “managed” VoIP call, by the provision of traceback related information (TRI). We propose a traceback architecture, the functionalities of its components, the TRI information and the data bases crucial for leg-by-leg VoIP origin traceback in VoIP lawful enforcement and traceback. An IP-to-3G and IP-to-IP with NAT VoIP call traceback is presented to illustrate the concepts and designs of the proposed work. Furthermore, we also extend our work to IMS-based Next Generation Networks (NGN) VoIP call traceback. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-14T16:44:45Z (GMT). No. of bitstreams: 1 ntu-97-R95725017-1.pdf: 551675 bytes, checksum: 6f497c7787b57822a3f360821c123780 (MD5) Previous issue date: 2008 | en |
| dc.description.tableofcontents | 謝詞 I
論文摘要 II THESIS ABSTRACT III CONTENTS IV LIST OF FIGURES VI 1. INTRODUCTION 1 1.1 BACKGROUND AND MOTIVATION 1 1.2 OBJECTIVES 2 1.3 PAPER ORGANIZATION 5 2. ISSUES IN LAW ENFORCEMENT OF VOIP SERVICES 6 3. RELATED WORKS 9 3.1 IP LOCATION DETERMINATION 9 3.2 PEER-TO-PEER VOIP TRACEBACK 11 3.3 LAWFUL INTERCEPTION 14 4. VOIP TRACEBACK REFERENCE MODEL 18 4.1 THE ARCHITECTURE 18 4.2 FORMATION OF VOIP TRACEBACK CORRELATION CHAIN 21 5. THE VOIP TRACEBACK RELATED INFORMATION 25 5.1 THE DATA BASES 25 5.2 THE VOIP-TRI INFORMATION – WHAT AND WHERE 26 5.3 DISCUSSIONS 32 6. VOIP TRACEBACK 33 6.1 REAL CASES AND THE PROCEDURE OF SIP -BASED VOIP CALL TRACEBACK 33 7. CALL TRACEBACK IN NGN VOIP SERVICES 39 7.1 NEXT GENERATION NETWORKS AND IP MULTIMEDIA SUBSYSTEM 39 7.2 FORMATION OF IMS-BASED NGN VOIP CALL TRACEBACK CORRELATION CHAIN 41 7.3 THE PROCEDURE OF IMS-BASED VOIP CALL TRACEBACK 44 8. CONCLUSIONS 46 REFERENCES 47 | |
| dc.language.iso | zh-TW | |
| dc.subject | 網路電話追蹤 | zh_TW |
| dc.subject | 網路電話 | zh_TW |
| dc.subject | 資料保存 | zh_TW |
| dc.subject | 跨異質網路 | zh_TW |
| dc.subject | IP追蹤 | zh_TW |
| dc.subject | 下一代網路電話追蹤 | zh_TW |
| dc.subject | 通訊監察 | zh_TW |
| dc.subject | VoIP | en |
| dc.subject | law enforcement | en |
| dc.subject | Next Generation Networks VoIP traceback | en |
| dc.subject | IP traceback | en |
| dc.subject | across heterogeneous networks | en |
| dc.subject | leg-by-leg VoIP traceback | en |
| dc.subject | data retention | en |
| dc.title | 跨異質網路之網路電話服務的來源追蹤 | zh_TW |
| dc.title | Law Enforcement and Traceback of VoIP Services in Heterogeneous Networks | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 96-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 林永松,陳孟彰,蔡志宏 | |
| dc.subject.keyword | 網路電話,資料保存,網路電話追蹤,跨異質網路,IP追蹤,下一代網路電話追蹤,通訊監察, | zh_TW |
| dc.subject.keyword | VoIP,data retention,leg-by-leg VoIP traceback,across heterogeneous networks,IP traceback,Next Generation Networks VoIP traceback,law enforcement, | en |
| dc.relation.page | 48 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2008-08-01 | |
| dc.contributor.author-college | 管理學院 | zh_TW |
| dc.contributor.author-dept | 資訊管理學研究所 | zh_TW |
| 顯示於系所單位: | 資訊管理學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-97-1.pdf 未授權公開取用 | 538.75 kB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
