Skype Chat Data Forgery Detection

Internet-based communication technologies are very widespread in recent years. Unfortunately, while the number of technologies such as Skype, Windows Live messenger, Yahoo messenger, QQ implicated in crime activities is relevant and growing, the capability to perform forgery detection of such technologies is limited. Skype is a kind of deployed application by using SQLite. Using SQLite database to store voice data, instant messaging, audio conferencing, and file transfer. Nowadays several GUI editors for SQLite database are developed. The main goal of these editor tools is to allow non-technical users to create, modify and edit SQLite database files. This paper presents an analysis of SQLite database features exploited in order to forge data and a method to detect forgery data using these exploits.

[1]  Sushil Jajodia,et al.  Tracking anonymous peer-to-peer VoIP calls on the internet , 2005, CCS '05.

[2]  Ravi Jain,et al.  An Experimental Study of the Skype Peer-to-Peer VoIP System , 2005, IPTPS.

[3]  Henning Schulzrinne,et al.  An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol , 2004, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[4]  Yuen-Yan Chan,et al.  Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics , 2007, 16th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2007).

[5]  Donald F. Towsley,et al.  Characterizing and Detecting Skype-Relayed Traffic , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[6]  A Min Tjoa,et al.  First International Conference on Availability, Reliability and Security (ARES´06) , 2006 .

[7]  Ronald C. Dodge Skype Fingerprint , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).

[8]  Jill Slay,et al.  Enhancement of Forensic Computing Investigations through Memory Forensic Techniques , 2009, 2009 International Conference on Availability, Reliability and Security.

[9]  Hanoch Levy,et al.  Controlling P2P Applications via Address Harvesting: The Skype Story , 2011, 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum.