Investigating VoIP Calls: Law Enforcement Perspective

Main Article Content

Arjun Chetry
Uzzal Sharma

Abstract

Technology is advancing at an unprecedented pace, playing a pivotal role in benefiting society across various domains. However, it also presents formidable challenges for law enforcement agencies. Among the most significant current hurdles, lies in the anonymity criminals can maintain on the internet, particularly through VoIP calls. Policing is an ever-evolving field, demanding investigators to be adaptable in mastering novel investigative techniques. Whether dealing with conventional or tech-related crimes, call detail records have become indispensable components of any investigation. With the surge in smartphone usage and mobile data connections, IP address-based investigations have become imperative, especially when dealing with VoIP calls. Consequently, the ability to trace IP addresses has become a pressing necessity for investigators handling numerous cases involving VoIP calls. This research paper delves into the investigation of VoIP calls, employing IPDR and PCAP files to identify IP addresses.

Article Details

How to Cite
Chetry, A., & Sharma, U. (2025). Investigating VoIP Calls: Law Enforcement Perspective. INFOCOMP Journal of Computer Science, 23(2). Retrieved from https://infocomp.dcc.ufla.br/index.php/infocomp/article/view/3398
Section
Information Systems

References

. Jeffries, S., & Apeh, E. (2020). Standard operating procedures for cybercrime investigations: a systematic literature review. Emerging Cyber Threats and Cognitive Vulnerabilities, 145-162.

. Dobbins, C., & Denton, P. (2017). MyWallMate: An investigation into the use of mobile technology in enhancing student engagement. TechTrends, 61(6), 541-549.

. Hunton, P. (2011). The stages of cybercrime investigations: Bridging the gap between technology examination and law enforcement investigation. Computer Law & Security Review, 27(1), 61-67.

. Bellovin, Steven Michael, et al. "Security implications of applying the Communications Assistance to Law Enforcement Act to voice over IP." (2006).

. C. Shubha, S. A. Sushma and K. H. Asha, "Traffic Analysis of WhatsApp Calls," 2019 1st International Conference on Advances in Information Technology (ICAIT), 2019, pp. 256-260, doi: 10.1109/ICAIT47043.2019.8987315.

. Chen, S., Wang, X., & Jajodia, S. (2006). On the anonymity and traceability of peer-to-peer, VoIP calls. IEEE Network, 20(5), 32-37.

. Ibrahim, M., Abdullah, M. T., & Dehghantanha, A. (2012, June). VoIP evidence model: A new forensic method for investigating VoIP malicious attacks. In Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) (pp. 201-206). IEEE.

. Sarhan, S. A. E., Youness, H. A., & Bahaa-Eldin, A. M. (2023). A framework for digital forensics of encrypted real-time network traffic, instant messaging, and VoIP application case study. Ain Shams Engineering Journal, 14(9), 102069.

. Cents, R., & Le-Khac, N. A. (2020, December). Towards a new approach to identify WhatsApp messages. In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 1895-1902). IEEE.

. Freire, Emanuel & Ziviani, Artur & Salles, Ronaldo. (2009). Detecting VoIP calls hidden in web traffic. IEEE Transactions on Network and Service Management. 5. 204-214. 10.1109/TNSM.2009.041102.

. Cuadra-Sanchez, Antonio & Aracil, Javier. (2017). A novel blind traffic analysis technique for detection of WhatsApp VoIP calls: CUADRA-SANCHEZ AND ARACIL. International Journal of Network Management. 27.e1968. 10.1002/nem.1968.

. Swamy, K. K., Teakumalla, S., Vemula, D., Patil, S. R., & Deepika, P. (2023). DETECTION OF IP MASKING USING WHOIS. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 14(03), 115-124.

. Wickramasinghe, N., Nabeel, M., Thilakaratne, K., Keppitiyagama, C., & De Zoysa, K. (2021). Uncovering ip address hosting types behind malicious websites. arXiv preprint arXiv:2111.00142.

. Chetry, A., & Sharma, U. (2021). Dark web Activity on Tor—investigation challenges and retrieval of memory artifacts. In International Conference on Innovative Computing and Communications: Proceedings of ICICC 2020, Volume 1 (pp. 953-964). Springer Singapore.

. Hunton, P. (2010). Cybercrime and security: a new model of law enforcement investigation. Policing : a journal of policy and practice, 4(4), 385-395.

. Alghamdi, M. I. (2020). A descriptive study on the impact of cybercrime and possible measures to curtail its spread worldwide. International Journal of Engineering Research and Technology, 9, 731-5.

. Yasin, A., Fatima, R., Liu, L., Wang, J., Ali, R., & Wei, Z. (2021). Understanding and deciphering of social engineering attack scenarios. Security and Privacy, 4(4), e161.

. Atkins, B., & Huang, W. (2013). A study of social engineering in online frauds. Open Journal of Social Sciences, 1(03), 23.

. Siddiqi, M. A., Pak, W., & Siddiqi, M. A. (2022). A study on the psychology of social engineering-based cyberattacks and existing countermeasures. Applied Sciences, 12(12), 6042.

. Putri, A., & Israhadi, E. (2022, August). Law Enforcement of Criminal Defamation on social media. In Proceedings of the 2nd International Conference on Law, Social Science, Economics, and Education, ICLSSEE 2022, 16 April 2022, Semarang, Indonesia.

. Citron, D. K. (2014). Addressing cyber harassment: An overview of hate crimes in cyberspace. Case W. Res. JL Tech. & Internet, 6, 1.

. Laurensius, S., Situngkir, D., Putri, R., & Fauzi, R. (2019, March). Cyber Bullying Against Children In Indonesia. In Proceedings of the first International Conference on Social Sciences, Humanities, Economics and Law, September 5-6 2018, Padang, Indonesia.

. Shalaginov, A., Johnsen, J. W., & Franke, K. (2017, December). Cyber crime investigations in the era of big data. In 2017 IEEE International Conference on Big Data (Big Data) (pp. 3672-3676). IEEE.

. Hidayati, A. N., Riadi, I., Ramadhani, E., & Al Amany, S. U. (2021). Development of conceptual framework for cyber fraud investigation. Register: Jurnal Ilmiah Teknologi Sistem Informasi, 7(2), 125-135.

. Ye Zhu, Huirong Fu, Traffic analysis attacks on Skype VoIP calls, Computer Communications, Volume 34, Issue 10, 2011, Pages 1202-1212, ISSN 0140-3664, https://doi.org/10.1016/j.comcom.2010.12.007.

. Emmanuel Abba, A.M. Aibinu, J.K. Alhassan, Development of multiple mobile networks call detailed records and its forensic analysis, Digital Communications and Networks, Volume 5, Issue 4, 2019,Pages 256-265,ISSN 2352-8648, https://doi.org/10.1016/j.dcan.2019.10.005.

. Yen, Yun-Sheng & Lin, I.-Long & Wu, Bo-Lin. (2011). A study on the forensic mechanisms of VoIP attacks: Analysis and digital evidence. Digital Investigation. 8. 56-67. 10.1016/j.diin.2011.03.003.

. Irwin, David & Slay, Jill. (2011). Extracting Evidence Related to VoIP Calls. Advances in Digital Forensics VII, IFIP AICT 361. 221-228. 10.1007/978-3-642-24212-0_17.

. https://www.iana.org/numbers dated: 30th June 2023.

. Prasad, R., Rohokale, V., Prasad, R., & Rohokale, V. (2020). Cyber threats and attack overview. Cyber Security: The Lifeline of Information and Communication Technology, 15-31.

. https://whois.domaintools.com/223.238.101.204 dated: 30th June 2023

. Da-Yu, K. A. O., Chang, E. C., & Fu-Ching, T. S. A. I. (2019, February). Extracting Suspicious IP Addresses from WhatsApp Network Traffic in Cybercrime Investigations. In 2019 21st International Conference on Advanced Communication Technology (ICACT) (pp. 1108-1115). IEEE.

. https://www.wireshark.org dated: 30th June 2023

. Musa, A. (2020). Forensic analysis of peer-to-peer network traffic with wireshark. SLU Journal of Science and Technology, 1(2), 92-99.

. R. Cents and N. -A. Le-Khac, "Towards a New Approach to Identify WhatsApp Messages," 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2020, pp. 1895-1902, doi: 10.1109/TrustCom50675.2020.00259.

. Ashawa, Moses & Otache Innocent, Ogwuche. (2017). Forensic Data Extraction and Analysis of Left Artifacts on emulated Android Phones: A Case Study of Instant Messaging Applications. Circulation in Computer Science. 2. 8-16. 10.22632/ccs-2017-252-67.

. Harshwardhan, C., Sunny, D., Mehul, L., Rohit, N., & Patil, R. (2021, June). Management of digital evidence for cybercrime investigation—a review. In International Conference on Soft Computing and Signal Processing (pp. 133-143). Singapore: Springer Nature Singapore.