Conference paper

POLČÁK Libor. Designing Lawful Interception System. In: Proceedings of the 17th Conference STUDENT EEICT 2011 Volume 3. Brno: Faculty of Information Technology BUT, 2011, pp. 569-573. ISBN 978-80-214-4273-3. Available from:
Publication language:english
Original title:Designing Lawful Interception System
Title (cs):Návrh systému pro zákonné odposlechy
Proceedings:Proceedings of the 17th Conference STUDENT EEICT 2011 Volume 3
Conference:Student EEICT 2011
Place:Brno, CZ
Publisher:Faculty of Information Technology BUT
Lawful interception, Protocol recognition, User identification, Detection evasion
This paper focuses on issues of lawful interception. Few recommendations how to design a lawful interception system were written since the lawful interception legislative has been adopted. This paper lists several challenges which are not covered by the aforementioned documents. The challenges contain identification of the communication of a suspect, support of new protocols, detection evasion and others. An original architecture of the Intercept Related Information Internal Interception Function that deals with the identified challenges is proposed and described. The presented architecture utilizes both application logs and network traffic captured to detect the communication of a suspect.
   author = {Libor Pol{\v{c}}{\'{a}}k},
   title = {Designing Lawful Interception System},
   pages = {569--573},
   booktitle = {Proceedings of the 17th Conference STUDENT EEICT 2011 Volume
   year = {2011},
   location = {Brno, CZ},
   publisher = {Faculty of Information Technology BUT},
   ISBN = {978-80-214-4273-3},
   language = {english},
   url = {}

Your IPv4 address:
Switch to https