孫雅麗Sun, Yeali S.臺灣大學:資訊管理學研究所柯皓文Hao-Wen, KoKoHao-Wen2010-05-052018-06-292010-05-052018-06-292008U0001-2507200808452400http://ntur.lib.ntu.edu.tw//handle/246246/179898近年來由於越來越多的犯罪和恐怖組織利用網路電話技術以規避傳統電信通訊監察,因此對國家安全以及法律執行而言,網路電話追蹤機制的建立是迫切需要的。因此將傳統的通訊偵察、電話追蹤的機制擴及至網路電話服務是克不容緩的。路電話有多種形式,而且能跨越多個異質網路包含IP網路以及電信網路,這些特性讓網路電話追蹤更具挑戰。在本論文裡,我們考慮的問題為透過取得所需要保存的電話追蹤相關資訊(Traceback Related Information)追蹤”可管理”的網路電話使用者的地理位址以及真實身份。們提出一個追蹤架構以及說明其原件的功能。我們也定義了一站接一站(leg-by-leg)的網路電話追蹤所需要的電話追蹤相關資訊的格式。我們舉了IP-IP以及跨異質網路IP-PLMN的網路電話追蹤的案例來說明網路電話追蹤如何進行以及追蹤架構的設計概念。在最後我們並將網路電話追蹤概念擴及至下一代網路(Next Generation Networks)的網路電話追蹤。Recently, an increasing number of incidents by crime and terrorist organizations have used VoIP technology as an alternative communication tool to evade lawful communication interception. The capability of tracking VoIP calls has become imperative and critical to national security and law enforcement. Hence, it is mandatory that the law enforcement of traditional phone services be expanded to cover VoIP services. VoIP services have been provisioned in a variety of forms and across IP (wired and wireless) and telecommunication networks. It has made the law enforcement of VoIP services complex and challenging. In this paper, we investigate the problem of tracing the true identities and geo-locations of the caller/callee of a “managed” VoIP call, by the provision of traceback related information (TRI). We propose a traceback architecture, the functionalities of its components, the TRI information and the data bases crucial for leg-by-leg VoIP origin traceback in VoIP lawful enforcement and traceback. An IP-to-3G and IP-to-IP with NAT VoIP call traceback is presented to illustrate the concepts and designs of the proposed work. Furthermore, we also extend our work to IMS-based Next Generation Networks (NGN) VoIP call traceback.謝詞 I文摘要 IIHESIS ABSTRACT IIIONTENTS IVIST OF FIGURES VI. INTRODUCTION 1.1 BACKGROUND AND MOTIVATION 1.2 OBJECTIVES 2.3 PAPER ORGANIZATION 5. ISSUES IN LAW ENFORCEMENT OF VOIP SERVICES 6. RELATED WORKS 9.1 IP LOCATION DETERMINATION 9.2 PEER-TO-PEER VOIP TRACEBACK 11.3 LAWFUL INTERCEPTION 14. VOIP TRACEBACK REFERENCE MODEL 18.1 THE ARCHITECTURE 18.2 FORMATION OF VOIP TRACEBACK CORRELATION CHAIN 21. THE VOIP TRACEBACK RELATED INFORMATION 25.1 THE DATA BASES 25.2 THE VOIP-TRI INFORMATION – WHAT AND WHERE 26.3 DISCUSSIONS 32. VOIP TRACEBACK 33.1 REAL CASES AND THE PROCEDURE OF SIP -BASED VOIP CALL TRACEBACK 33. CALL TRACEBACK IN NGN VOIP SERVICES 39.1 NEXT GENERATION NETWORKS AND IP MULTIMEDIA SUBSYSTEM 39.2 FORMATION OF IMS-BASED NGN VOIP CALL TRACEBACK CORRELATION CHAIN 41.3 THE PROCEDURE OF IMS-BASED VOIP CALL TRACEBACK 44. CONCLUSIONS 46EFERENCES 47application/pdf551675 bytesapplication/pdfen-US網路電話資料保存網路電話追蹤跨異質網路IP追蹤下一代網路電話追蹤通訊監察VoIPdata retentionleg-by-leg VoIP tracebackacross heterogeneous networksIP tracebackNext Generation Networks VoIP tracebacklaw enforcement[SDGs]SDG16跨異質網路之網路電話服務的來源追蹤Law Enforcement and Traceback of VoIP Services in Heterogeneous Networkshttp://ntur.lib.ntu.edu.tw/bitstream/246246/179898/1/ntu-97-R95725017-1.pdf