期刊文献+

IP网络中的合法监听技术 被引量:2

Lawful Interception in IP Network
下载PDF
导出
摘要 介绍了IP网络中合法监听的相关知识,对比了网路数据流监听的2种方案:简单监听和DECON监听,分析了2种方案的优缺点,提出了一种更优的监听方案,此方案将监听点和数据流转化为二分图的2个集合,多次采用匈牙利算法完成监听点和数据流的匹配。此方案不仅使所用的数据流得到监听,而且使得数据流平均的分配到监听点上,有效解决了前2种方案中某个别监听点负载过重和引起的网络拥塞问题。 The knowledges of Lawful Interception in IP network is described. Two programs of data stream monitoring in network are introduced (the simple monitoring and Decentralized Coordination monitoring), both advantages and disadvantages of the two programs are analyzed, and an optimized monitoring program is presented. Monitor points and data flow are made into two sets of bipartite graphs in this program, and the Hungarian algorithm is used to complete monitoring points and data flow matching. By this, not only all data flow can be monitored but also the data stream is distributed equally to monitor the point, the overloaded of monitoring point and the network congestion problems are solved effectively.
出处 《现代电子技术》 2010年第22期148-151,共4页 Modern Electronics Technique
基金 国家自然科学基金资助项目(60772043)
关键词 合法监听 简单监听 DECON监听 匈牙利算法 lawful interception simple monitoring DECON monitoring Hungarian algorithm
  • 相关文献

参考文献2

二级参考文献14

  • 1林剑柠,吴慧中.基于遗传算法的网格资源调度算法[J].计算机研究与发展,2004,41(12):2195-2199. 被引量:70
  • 2叶志辉,孟旭东,刘明明.软交换网络合法侦听的研究[J].南京邮电学院学报(自然科学版),2005,25(2):40-43. 被引量:3
  • 3孙海长,郝桂英,刘凤,李志勇.Internet网络上合法侦听模型的研究[J].微计算机信息,2006,22(09X):122-124. 被引量:2
  • 4杜晓丽,蒋昌俊,徐国荣,丁志军.一种基于模糊聚类的网格DAG任务图调度算法[J].软件学报,2006,17(11):2277-2288. 被引量:48
  • 5林伟伟,齐德昱,李拥军,王振宇,张志立.树型网格计算环境下的独立任务调度[J].软件学报,2006,17(11):2352-2361. 被引量:29
  • 6BRAUN T D, SIEGEL H J, BECJ N. A comparison of eleven static heuristics for mapping a class of independent tasks onto heterogeneous distributed computing systems[J]. Journal of Parallel and Distributed Computing, 2001,61(6):810-837.
  • 7VINCENZO D M, MARCO M. Sub optimal scheduling in a grid using genetic algorithms[J]. Parallel Computing, 2004, 30(5/6):553-565.
  • 8WEN Dou, YAN Jia, WANG Huaiming. A P2P approach for global computing [C]//Proceedings of International Parallel and Distributed Processing Symposium. Piscataway, N. J. , USA: IEEE Press, 2003:6-11.
  • 9ZU Linan, TIAN Yantao, FU Jiacai. Algorithm of task-allocation based on realizing at the lowest cost in multi mobile robot system[C]//Proceedings of the 3rd International Conference on Machine Learning and Cybernetics. Piscataway, N. J. , USA:IEEE Press, 2004:152-156.
  • 10YANG B, MOLINA H G. Micropayments for peer to peer systems[C]//Proceedings of the 10th ACM Conference on computer and Communications Security. New York, N. Y. , USA: ACM Press, 2003:300-310.

共引文献8

同被引文献14

  • 1郭辉.多线程的效率[J].计算机应用,2008,28(S2):141-143. 被引量:6
  • 2李东晖,肖和平,贺小川,郭长国.实时中间件中高性能线程池的研究与实现[J].湖南农业大学学报(自然科学版),2007,33(3):371-375. 被引量:1
  • 33GPP TS 33.120V4.0.0.3Gsecurity:security principlesand objectives[EB/OL].[2001-03-12].http://ftp.3gpp.org/specs/.
  • 43GPP TS 33.103V4.2.0.3Gsecurity:integration guide-lines[EB/OL].[2001-09-06].http://ftp.3gpp.org/specs/.
  • 53GPP TS 33.102V5.1.0.3Gsecurity:security architec-ture[EB/OL].[2002-12-10].http://ftp.3gpp.org/specs/.
  • 63GPP TR 33.902V4.0.0.3Gsecurity:formal analysis ofthe 3Gauthentication protocol[EB/OL].[2001-09-22].http://ftp.3gpp.org/specs/.
  • 7郑宇.基于自验证公钥方案的3G移动通信系统高效认证体系[C] //中国科协第二届优秀博士生学术年会论文集.苏州:中国计算机学会,2004:180-185.
  • 83G TS 21.133.Security threats and requirements[EB/OL].[2001-11-12].http://www.etsi.org.
  • 9刘廷苍,董华彪.Java多线程机制[J].科技广场,2008(12):222-224. 被引量:1
  • 10邓亚平,付红,谢显中,张玉成,石晶林.基于公钥体制的3GPP认证与密钥协商协议[J].计算机应用,2009,29(11):2936-2938. 被引量:4

引证文献2

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部