Decision Tree Based Rules Redistribution Algorithm for IP Monitoring of Lawful Interception on IPv4 Networks

Article Preview

Abstract:

IP networks were growing rapidly over past decades. Perhaps more significant is the impact that it is also provide a medium to the illicit activities. Therefore, IP monitoring of lawful interception of IPv4 Networks was proposed to combat against those illicit activities over IP Networks. The Law Enforcement Agencies (LEA) can monitor the IP packets as well as capture them for analysis or providing forensics. In order to assist IP Monitoring of lawful interception from technical perspective, we propose a scheme named Decision Tree Based Rules Redistribution Algorithm (DTBRRA) which can be fast applied on IP networks.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 532-533)

Pages:

1384-1388

Citation:

Online since:

June 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Jan Seedof. Concepts of interception in a generic network architecture, IPTCOMM2008 Heidelberg, Germany, 2001. 7.

Google Scholar

[2] Sun, Haichang Hao, Guiying Liu, Feng Li, Zhiyon. A study of legitimately intercepts model in the Internet. Micro-PC Information vo22, (2006).

Google Scholar

[3] Xingye Tan, Yon Zhang, Zhenming Lei. A New Fast Packet Classification Algorithm: RC-FST, High Performance Switching and Routing, pages 462-466, (2005).

DOI: 10.1109/hpsr.2005.1503275

Google Scholar

[4] T Lakshman, D Sti liadis. High Speed Policy-based Packet Forwarding Using Efficient Multi-dimensional Range Matching, ACM SIGCOMM' 98, 1998 . 203- 214.

DOI: 10.1145/285243.285283

Google Scholar

[5] Zhenqiang Li, Shengliang Zhang, Yan Ma, Xiaoyu Zhao. Multiple Decision Tree Algorithm for Packet Classification, Journal of Electronics & Information Technology, 30(4), (2008).

DOI: 10.3724/sp.j.1146.2006.01431

Google Scholar

[6] Y. Qi, L. Xu, B. Yang, Y. Xue, and J. Li. Packet Classification Algorithms: From Theory to Practice. In Proceedings of the 28th IEEE Conference on Computer Communications (INFOCOM'09), pages 648 – 656, (2009).

DOI: 10.1109/infcom.2009.5061972

Google Scholar

[7] Balajee Vamanan, Gwendolyn Voskuilen and T. N. Vijaykumar. EffiCuts: Optimizing Packet Classification for Memoryand Throughput. In Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM , (2010).

DOI: 10.1145/1851182.1851208

Google Scholar

[8] P. Gupta and N. McKeown. Classifying Packets with Hierarchical Intelligent Cuttings. IEEE Micro, 20(1): 34 – 41, (2000).

DOI: 10.1109/40.820051

Google Scholar

[9] Lawful Interception For IP Networks White Paper, Aqsacom Document No. 040451, (2005).

Google Scholar

[10] Cisco Systems,Cisco Architecture for Lawful Interception in IP Networks, 10. (2004).

Google Scholar

[11] Telecommunications security: Lawful Interception (LI), ETSI TR 101 943 V1. 1. 1.

Google Scholar

[12] Lawful Interception Technology White Paper, Hangzhou H3C Technologies Co., Ltd.

Google Scholar