Detail výsledku

Designing Lawful Interception in IPv6 Networks

POLČÁK, L.; GRÉGR, M.; KAJAN, M.; MATOUŠEK, P.; VESELÝ, V. Designing Lawful Interception in IPv6 Networks. Security and Protection of Information. Brno: University of Defence in Brno, 2011. p. 114-126. ISBN: 978-80-7231-777-6.
Typ
článek ve sborníku konference
Jazyk
anglicky
Autoři
Polčák Libor, Ing., Ph.D., UIFS (FIT)
Grégr Matěj, Ing., Ph.D., CVIS ‒ KolejNet (CIS), UIFS (FIT)
Kajan Michal, Ing., UIFS (FIT), UPSY (FIT)
Matoušek Petr, doc. Ing., Ph.D., M.A., UIFS (FIT)
Veselý Vladimír, Ing., Ph.D., UIFS (FIT), UPSY (FIT)
Abstrakt

The aim of this paper isto enumerate major issues in designing a lawful interception systemfor IPv6 networks. Today, network and content providers arerequired to cooperate with Law Enforcement Agencies (LEAs) in orderto provide a lawful interception (LI) similarly as it is requiredfrom telecommunication operators. LI in IP networks is not as easy asin telecommunications. One major challenge is the identification of atracked person. IPv6 brings new challenges, e.g. a support oftemporary IP addresses, privacy extension or default IPv6 tunnels.There are LI implementation recommendations given by US law(Communications Assistance for Law Enforcement Act - CALEA) or EUstandards (defined by European Telecommunications Standards Institute- ETSI). Nevertheless, these documents do not cover IPv6 networks.This paper overviews related documents and current state-of-the-art.Then, it identifies issues of IPv6 LI and proposes possible approachto user's identity detection, and other issues related to IPv6 LIdeployment - enhancement of privacy ofusers in small networks, issues of multicast traffic and IPv6transition mechanisms. Finally, this paper shows an architecturaldesign of the system based on ETSI standard and describes how ETSIfunctions blocks are designed. It also describes some basicconsiderations and issues when implementing proposed architecture.Proposed architecture is mapped onto network devices. Suggesteddeployment of the system allows for the scalability of eavesdroppingwith respect to identified issues.

Klíčová slova

Lawfulinterception, IPv6, networking user identity, communication tracking.

Rok
2011
Strany
114–126
Sborník
Security and Protection of Information
Konference
Security and Protection of Information 2011
ISBN
978-80-7231-777-6
Vydavatel
University of Defence in Brno
Místo
Brno
BibTeX
@inproceedings{BUT76356,
  author="Libor {Polčák} and Matěj {Grégr} and Michal {Kajan} and Petr {Matoušek} and Vladimír {Veselý}",
  title="Designing Lawful Interception in IPv6 Networks",
  booktitle="Security and Protection of Information",
  year="2011",
  pages="114--126",
  publisher="University of Defence in Brno",
  address="Brno",
  isbn="978-80-7231-777-6",
  url="https://www.fit.vut.cz/research/publication/9620/"
}
Soubory
Projekty
Moderní prostředky pro boj s kybernetickou kriminalitou na Internetu nové generace, MV, Program bezpečnostního výzkumu České republiky 2010 - 2015, VG20102015022, zahájení: 2010-10-01, ukončení: 2015-09-30, ukončen
Výzkum informačních technologií z hlediska bezpečnosti, MŠMT, Institucionální prostředky SR ČR (např. VZ, VC), MSM0021630528, zahájení: 2007-01-01, ukončení: 2013-12-31, řešení
Výzkumné skupiny
Pracoviště
Nahoru