A Privacy preserving Approach to Call Detail Records Analysis in VoIP Systems

Attacks on Voice-over-IP calls happen frequently. A specific type of these attacks are toll-fraud attacks. The prevention of these attacks depends on understanding the attack patterns. These can be derived from communication records. However, these records contain privacy relevant information of the call participants. These records are also protected by a number of laws and regulations. To make an analysis privacy compliant, relevant laws and regulations need to be considered. We propose a method for changing communication records in such a way that the forensic analysis in VoIP attacks is possible and the privacy of the call participants is preserved. We define privacy requirements for communication records from laws, regulations and concerns of call participants. We also present patterns of communication records based upon real world examples. We further show a framework for privacy attack identification and privacy data minimisation for a structured analysis of communication records. Moreover, an analysis pattern for toll-fraud attacks states which relations in the communication records have to survive the data minimisation.

[1]  H. P Gassmann,et al.  OECD guidelines governing the protection of privacy and transborder flows of personal data , 1981 .

[2]  Herbert Burkert,et al.  Some Preliminary Comments on the DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. , 1996 .

[3]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[4]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[5]  Dogan Kesdogan,et al.  Privacy enhancing identity management: protection against re-identification and profiling , 2005, DIM '05.

[6]  Daniel Zelterman,et al.  Bayesian Artificial Intelligence , 2005, Technometrics.

[7]  Patrick C. K. Hung,et al.  Security Issues in VOIP Applications , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.

[8]  Costas Lambrinoudakis,et al.  An ontology description for SIP security flaws , 2007, Comput. Commun..

[9]  Eduardo B. Fernández,et al.  Security Patterns for Voice over IP Networks , 2007, 2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07).

[10]  Jinhua Guo,et al.  Security Challenge and Defense in VoIP Infrastructures , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[11]  Stefanos Gritzalis,et al.  Addressing privacy requirements in system design: the PriS method , 2008, Requirements Engineering.

[12]  S. Ehlert,et al.  Specification-Based Denial-of-Service Detection for SIP Voice-over-IP Networks , 2008, 2008 The Third International Conference on Internet Monitoring and Protection.

[13]  Bart De Decker,et al.  Linking Privacy Solutions to Developer Goals , 2009, 2009 International Conference on Availability, Reliability and Security.

[14]  Lorrie Faith Cranor,et al.  Engineering Privacy , 2009, IEEE Transactions on Software Engineering.

[15]  Seda F. Gürses,et al.  A critical review of 10 years of Privacy Technology , 2010 .

[16]  Bernhard C. Witt Datenschutz kompakt und verständlich , 2010 .

[17]  Wouter Joosen,et al.  A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements , 2011, Requirements Engineering.

[18]  Christoph Sorge,et al.  The Legal Ramifications of Call-Filtering Solutions , 2010, IEEE Security & Privacy.

[19]  Gerald Quirchmayr,et al.  CDRAS: An Approach to Dealing with Man-in-the-Middle Attacks in the Context of Voice over IP , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[20]  Lorenzo Servitje If it Looks Like a Duck , 2013 .