透過您的圖書館登入
IP:3.147.89.85
  • 學位論文

支援網路電話監聽及多播網路架構之模組化即時資訊隱藏分析平台設計與實作

The Design and Implementation of a Modularized Platform for Lawful Intercept in VoIP Networks and Real-time Steganalysis in Multicast Networks

指導教授 : 吳坤熹
本文將於2025/12/31開放下載。若您希望在開放下載時收到通知,可將文章加入收藏

摘要


人和網路已經密不可分的情況下,以往透過傳統電話的犯罪方式,也可能透過網路電話來進行。若是透過資訊隱藏技術將機密訊息隱藏在網路電話的通話中,執法人員在監聽網路電話時,只能聽到普通的對話,但實際上的機密訊息早已傳送出去。網路電話的通話所傳遞的訊息通常具有時效性,必須要能夠及時的分析出是否有在通話中做資訊隱藏。由於資訊隱藏技術有很多方法,所以資訊隱藏分析的技術也要能夠具有擴充性,這些都是分析上所面臨的挑戰。 本論文提出一個網路電話的監聽系統,能夠即時地對通話內容做資訊隱藏分析;此系統的分析平台具有模組化功能,讓資訊隱藏分析技術具有可擴充性。

並列摘要


The plethora of Internet applications brings impact on many aspects of our lives. Even criminals learned to use VoIP (Voice over Internet Protocol) to replace old-fashioned telephone systems. Some criminals even use steganography to hide secrete messages. When law enforcement department tries to intercept the VoIP calls, only normal conversation will be heard, but secrete data have actually been delivered. Unlike secret messages hidden in image/audio files, VoIP steganography must be detected in real-time. Furthermore, there are different methods of steganography, so lots of steganalysis algorithms must be applied to analyze those data in real-time. These all contribute great challenges to VoIP steganalysis. In this paper, we proposed a VoIP monitoring system which can perform steganalysis in real-time. It is composed by modularized functions which makes the steganalysis system to be easily extensible.

並列關鍵字

SIP VoIP Lawful Intercept Steganalysis Modularized Platform

參考文獻


[1] J. M. Berger and J. Morgan, "The ISIS Twitter Census:Defining and describing the population of ISIS supporters on Twitter," presented at the The Brookings Project on U.S. Relations with the Islamic World 3, 2015.
[2] M. Yang and H. Liu, "Implementation and performance of VoIP interception based on SIP session border controller," Telecommunication Systems, vol. 55, pp. 345-361, 2014.
[3] J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, et al., "SIP: session initiation protocol," RFC 3261, June, 2002.
[4] H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson, "RTP: A transport protocol for real-time applications," RFC 3550, July, 2003.
[5] B. Karpagavinayagam, R. State, and O. Festor, "Monitoring Architecture for Lawful Interception in VoIP Networks," IEEE Second International Conference on Internet Monitoring and Protection (ICIMP 2007), p. 5.

延伸閱讀