Detail publikace

Designing Lawful Interception System

POLČÁK, L.

Originální název

Designing Lawful Interception System

Anglický název

Designing Lawful Interception System

Jazyk

en

Originální abstrakt

This paper focuses on issues of lawful interception. Few recommendations how to design a lawful interception system were written since the lawful interception legislative has been adopted. This paper lists several challenges which are not covered by the aforementioned documents. The challenges contain identification of the communication of a suspect, support of new protocols, detection evasion and others. An original architecture of the Intercept Related Information Internal Interception Function that deals with the identified challenges is proposed and described. The presented architecture utilizes both application logs and network traffic captured to detect the communication of a suspect.

Anglický abstrakt

This paper focuses on issues of lawful interception. Few recommendations how to design a lawful interception system were written since the lawful interception legislative has been adopted. This paper lists several challenges which are not covered by the aforementioned documents. The challenges contain identification of the communication of a suspect, support of new protocols, detection evasion and others. An original architecture of the Intercept Related Information Internal Interception Function that deals with the identified challenges is proposed and described. The presented architecture utilizes both application logs and network traffic captured to detect the communication of a suspect.

Dokumenty

BibTex


@inproceedings{BUT76332,
  author="Libor {Polčák}",
  title="Designing Lawful Interception System",
  annote="This paper focuses on issues of lawful interception. Few recommendations how to
design a lawful interception system were written since the lawful interception
legislative has been adopted. This paper lists several challenges which are not
covered by the aforementioned documents. The challenges contain identification of
the communication of a suspect, support of new protocols, detection evasion and
others. An original architecture of the Intercept Related Information Internal
Interception Function that deals with the identified challenges is proposed and
described. The presented architecture utilizes both application logs and network
traffic captured to detect the communication of a suspect.",
  address="Faculty of Information Technology BUT",
  booktitle="Proceedings of the 17th Conference STUDENT EEICT 2011 Volume 3",
  chapter="76332",
  edition="NEUVEDEN",
  howpublished="print",
  institution="Faculty of Information Technology BUT",
  year="2011",
  month="april",
  pages="569--573",
  publisher="Faculty of Information Technology BUT",
  type="conference paper"
}