{"title":"工具标记识别Skype流量","authors":"Da-Yu Kao, Fang-Yu Lu, Fuching Tsai","doi":"10.23919/ICACT48636.2020.9061405","DOIUrl":null,"url":null,"abstract":"Law enforcement agencies (LEAs) face a challenging problem to detect the tool marks of Skype traffic. Analyzing digital packets is an essential job in digital forensics. This study collects these packets, traces their routings, analyzes the relevant information, and explores the tool mark identification of Skype packets. It uses experimental data on a personal computer, investigates the characteristics of Skype traffic, and provides a tool mark analysis of network traffic. The study can assist the investigator in identifying the suspect using a Skype communication application to commit the crime.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Tool Mark Identification of Skype Traffic\",\"authors\":\"Da-Yu Kao, Fang-Yu Lu, Fuching Tsai\",\"doi\":\"10.23919/ICACT48636.2020.9061405\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Law enforcement agencies (LEAs) face a challenging problem to detect the tool marks of Skype traffic. Analyzing digital packets is an essential job in digital forensics. This study collects these packets, traces their routings, analyzes the relevant information, and explores the tool mark identification of Skype packets. It uses experimental data on a personal computer, investigates the characteristics of Skype traffic, and provides a tool mark analysis of network traffic. The study can assist the investigator in identifying the suspect using a Skype communication application to commit the crime.\",\"PeriodicalId\":296763,\"journal\":{\"name\":\"2020 22nd International Conference on Advanced Communication Technology (ICACT)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 22nd International Conference on Advanced Communication Technology (ICACT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/ICACT48636.2020.9061405\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/ICACT48636.2020.9061405","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Law enforcement agencies (LEAs) face a challenging problem to detect the tool marks of Skype traffic. Analyzing digital packets is an essential job in digital forensics. This study collects these packets, traces their routings, analyzes the relevant information, and explores the tool mark identification of Skype packets. It uses experimental data on a personal computer, investigates the characteristics of Skype traffic, and provides a tool mark analysis of network traffic. The study can assist the investigator in identifying the suspect using a Skype communication application to commit the crime.