Detail publikace

On Identities in Modern Networks

Originální název

On Identities in Modern Networks

Anglický název

On Identities in Modern Networks

Jazyk

en

Originální abstrakt

Communicating parties inside computer networks use different kind of identifiers. Some of these identifiers are stable, e.g., logins used to access a specific service, some are only temporary, e.g., dynamically assigned IP addresses. This paper tackles several challenges of lawful interception that emerged in modern networks. The main contribution is the graph model that links identities learnt from various sources distributed in a network. The inferred identities result into an interception of more detailed data in conformance with the issued court order. The approach deals with network address translation, short-lived identifiers and simultaneous usage of different identities. The approach was evaluated to be viable during real network testing based on various means to learn identities of users connected to a network.

Anglický abstrakt

Communicating parties inside computer networks use different kind of identifiers. Some of these identifiers are stable, e.g., logins used to access a specific service, some are only temporary, e.g., dynamically assigned IP addresses. This paper tackles several challenges of lawful interception that emerged in modern networks. The main contribution is the graph model that links identities learnt from various sources distributed in a network. The inferred identities result into an interception of more detailed data in conformance with the issued court order. The approach deals with network address translation, short-lived identifiers and simultaneous usage of different identities. The approach was evaluated to be viable during real network testing based on various means to learn identities of users connected to a network.

BibTex


@article{BUT111587,
  author="Libor {Polčák} and Radek {Hranický} and Tomáš {Martínek}",
  title="On Identities in Modern Networks",
  annote="Communicating parties inside computer networks use different kind of identifiers.
Some of these identifiers are stable, e.g., logins used to access a specific
service, some are only temporary, e.g., dynamically assigned IP addresses. This
paper tackles several challenges of lawful interception that emerged in modern
networks. The main contribution is the graph model that links identities
learnt from various sources distributed in a network. The inferred identities
result into an interception of more detailed data in conformance with the issued
court order. The approach deals with network address translation, short-lived
identifiers and simultaneous usage of different identities. The approach was
evaluated to be viable during real network testing based on various means to
learn identities of users connected to a network.",
  address="NEUVEDEN",
  chapter="111587",
  doi="10.15394/jdfsl.2014.1167",
  edition="NEUVEDEN",
  howpublished="print",
  institution="NEUVEDEN",
  number="2",
  volume="2014",
  year="2014",
  month="september",
  pages="9--22",
  publisher="NEUVEDEN",
  type="journal article"
}