期刊文献+

基于流量统计实时识别QQ语音通信的方法

Real-time identification of QQ voice communication based on traffic statistics
下载PDF
导出
摘要 针对腾讯QQ语音应用的识别问题,建立了客户源端模型,并对流量进行了离线分析。在此基础上,提出了基于流量统计的两种识别方法:Bayesian识别法和心跳识别法。一方面,利用QQ语音应用的源端编码特点,得出语音数据流量的本质特征,并使用Bayesian理论进行检测。另一方面,针对QQ语音应用中一些非语音数据包的周期性特点,利用卡方检验,提出了心跳识别的方法。实验结果表明,这两种方法综合使用,可以很有效地实时检测QQ语音流量。 This paper establishes the source model of QQ voice and analyzes its traffic offline in order to identify the QQ voice traffic. Based on that, it proposes two identification methods: the Bayesian method and the heartbeat method. On the one hand, the theory of Bayesian is employed to identify the essential character of voice traffic, which is extracted according to the encoding at source. On the other hand, the heartbeat method is presented based on the Chi-square test by identifi- cation of the periodic feature of non-voice traffic. The experiment results show that the integrated deployment of the two methods is very effective for real-time detection of QQ voice traffic flow.
出处 《高技术通讯》 EI CAS CSCD 北大核心 2010年第1期38-44,共7页 Chinese High Technology Letters
基金 863计划(2007AA01Z220) 天津市自然科学基金(08JCYBJC14200)资助项目
关键词 QQ语音 流量统计识别 Bayesian判别 QQ voice, statistic traffic identification, Bayesian class
  • 相关文献

参考文献10

  • 1Goode B.Voice over Internet protocol (VoIP).Proceedings of the IEEE,2002,90(9):1495-1517.
  • 2关志涛,曹元大,祝烈煌,张常有,樊秀梅.混合P2P环境下基于信度模型的激励策略[J].北京理工大学学报,2007,27(7):599-603. 被引量:3
  • 3Roughan M,Sen S,Spatscheck O,et al.Class-of-service mapping for QoS:a statistical signature-based approach to IP traffic classification.In:Proceeedings of the 4th ACM SIGCOMM conference on Internet measurement,Taormina,Sicily,Italy,2004.135-148.
  • 4Moore A W,Zuev D.Internet traffic classification using Bayesian analysis techniques.In:Proceedings of ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems,Banff,Canada,2005.50-60.
  • 5Okabe T,Kitamura T,Shizuno T.Statistical traffic identification method based on flow-level behavior for fair VoIP sevice.In:Proceedings of the 1st IEEE Workshop on VoIP Management and Security,Vancouver,Canada,2006.35-40.
  • 6Perenyi M,Gefferth A,Dinh Dang T,et al.Skype traffic identification.In:Proceedings of Global Telecommunications Conference,Washington,D.C.,USA,2007.399-404.
  • 7Perenyi M,Molnar S.Enhanced Skype traffic identification.In:Proceedings of the 2nd International Conference on Performance Evaluation Methodologies and Tools,Nantes,France,2007.
  • 8Yu Y F,Liu D D,Li J,et al.Traffic identification and overlay measurement of Skype.In:Proceedings of 2006 International Conference on Computational Intelligence and Security,Guangzhou,China,2006.1043-1048.
  • 9金婷,王攀,张顺颐,陆青莲,陈东.基于DPI和会话关联技术的QQ语音业务识别模型和算法[J].重庆邮电学院学报(自然科学版),2006,18(6):789-792. 被引量:10
  • 10Carson M,Santay D.NIST Net:a Linux-based network emulation tool.ACM SIGCOMM Computer Communication Review,2003,33(3):111-126.

二级参考文献11

  • 1董莹,孙桂春,向群.利用腾讯QQ开展网上实时咨询服务的实践[J].上海高校图书情报工作研究,2005,15(2):31-33. 被引量:8
  • 2GAO Li-sha, LUO Jun-zhou. Performance Analysis of a P2P-Based VolP Software[EB/OL]. (2006-03-05)[2006-07-26]. http.//ieeexplore. ieee. org.
  • 3FENG Cao, DAVID A, BRUCE B, et al.Providing Secure Services in Peer-to-Peer Communications Networks with Central Security Servers[EB/OL]. (2006-07-07) [2006-07-26]. http://ieeexplore. ieee. org.
  • 4HANOCH Levy, HAIM Zlatokrilov. The Effect of Packet Dispersion on Voice Applications in IP Networks[EB/OL]. (2006-04-15) [ 2006-07-26 ]. http://ieeexplore. ieee.org.
  • 5SCHULZRINNE H, ROSENBERG J, HANDLEY M. SIP. Session Initiation Protocol[R]. RFC2543,1999, 3.
  • 6Adar E,Huberman B A.Free riding in gnutella[EB/OL].[2000-09-27](2007-05-09).http:∥www.firstmonday.dk/issues/issue5-10/adar/index.html.
  • 7Vishnumurthy V,Chandrakumar S,Sirer E G.KARMA:a secure economic framework for P2P resource sharing[C]∥Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems.Berkeley,CA,USA:[s.n.],2003.
  • 8Buragohain C,Agrawal D,Suri S.A game theoretic framework for incentives in P2P systems[C]∥Proceedings of the Third IEEE International Conference on Peer-to-Peer Computing (P2P2003).Linkoping,Sweden:IEEE Press,2003:48-56.
  • 9Sun Qixiang,Garcia-Molina H.SLIC:a selfish link-based incentive mechanism for unstructured peer-to-peer networks[C]∥Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS2004).Tokyo,Japan:IEEE Press,2004:506-515.
  • 10Fu Jianming,Zhang Lei,Li Weinan.An adaptive service strategy based on user rating in P2P[J].Lecture Notes on Computer Science,2005,3795:860-870.

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部