透過您的圖書館登入
IP:3.135.183.46
  • 期刊

VoIP攻擊分析與數位證據鑑識機制之研究

A Study on VoIP Attack Analysis and Digital Evidence Forensic Mechanism

摘要


網路電話(VoIP)具有高隱匿性、移動性、低成本性,目前已經成為詐騙集團最佳的犯罪工具之一,本文首先探討網路電話的安全威脅,再針對所有的威脅逐一分析,研究出各種威脅的因應之道,並提出網路電話數位證據鑑識標準作業程序,來解決數位證據易修改的問題,以確保原始資料及所擷取的證據之完整性。最後進行網路電話數位證據鑑識機制的驗證,以供鑑識資通犯罪人員提供未來偵查的原則、方向和準則。

關鍵字

VoIP 攻擊 數位鑑識

並列摘要


The development of the Internet is fuelled by numerous commercial intentions; it is no longer simple information delivery. Moreover, many criminals try to earn profit through the Internet. Thus, the use of the internet should be under the protection of information security in order to assure honest users. The main problems today include Internet phone fraud and internet phone attacks; therefore, in addition to the analysis and management of Internet security vulnerabilities, penetration testing should be added to test the security in a practical Internet environment. This paper consults the related works of DEFSOP and correlative digital evidence from different scholars and develops a higher quality and more suitable DEFSOP. In addition, this paper discusses the security problems faced by the VoIP, lists prevention policies and designs a VoIP DEFSOP to help forensics operators. This paper shows how VoIP DEFSOP works in the operation stage through experiments in order to provide investigators with suggestions for the future.

並列關鍵字

VoIP Attack Digital Forensics

參考文獻


林宜隆、顏雲生、吳柏霖()。
林宜隆、顏雲生、吳柏霖()。
林宜隆、楊鴻正、王俊雄()。
林宜隆、藍添興()。
黃志龍(2006)。建構數位證據鑑識標準作業程序規範之研究(碩士論文)。中央警察大學。

被引用紀錄


劉美雲(2017)。組織科技擴散與應用之研究- 以網路電話為例〔碩士論文,中原大學〕。華藝線上圖書館。https://doi.org/10.6840/cycu201700217
柯孟澤(2014)。網路電話在臺灣學術網路之科技接受模式研究〔碩士論文,國立屏東科技大學〕。華藝線上圖書館。https://doi.org/10.6346/NPUST.2014.00156

延伸閱讀