期刊文献+

基于VOIP的语音视频流量监控方案设计与实施 被引量:4

Design and Implementation of Voice and Video Flow Identification and Control Scheme based on VOIP
下载PDF
导出
摘要 随着网络技术和协议的发展,基于VOIP协议的语音视频聊天应用逐渐盛行,给运营商和监管部门带来了新的挑战。文章在对前人研究成果进行综述和分析传统识别技术的基础上针对此类应用提出了一种新的深度关联的识别技术,并设计了一种流量识别和控制系统的部署方案。文章最后给出了几个应用的识别结果,结果表明运用本系统能够达到很好的识别和控制效果。 With the development of network technologies and protocols, voice and video chat applications increasingly prevalent based on VOIP, which has brought new challenges for operators and regulators. This paper proposes a new Depth-Association recognition technology according to review of previous research results and traditional recognition technology for such applications, and designed a flow identification and control scheme. Finally, the recognition results of several applications are given, which show that the use of this system can achieve good results to identify and control.
作者 程博 辛阳
出处 《信息网络安全》 2014年第6期53-58,共6页 Netinfo Security
基金 国家科技支撑计划[2012BAH37B05]
关键词 VOIP 深度关联 流量识别 流量控制 语音视频 VOIP depth-association flow identiifcation flow control voice&video
  • 相关文献

参考文献12

  • 1HANS H, KIM M S, JU H T, et al. The Architecture of NG-MON: A Passive Network Monitoring System for High-Speed IP Networks[C]. Management Technologies for E-Commerce and E-Business Applications. Springer 13erlin Heidelberg, 2002: 16-27.
  • 2SEN S, SPATSCHECK O, WANG D. Accurate, scalable in-network identification of p2p traffic using application signatures[C]. Proceedings of the 13tb international conference on World Wide Web. ACM, 2004: 512-521.
  • 3KAt,AGIANNIS T, BROlDO A, FALOUTSOS M. Transport layer identification of P2P traffic[C]. Proceedings of the 4th ACM SIGCOMM conference on Internet measurement. ACM, 2004:121 - 134.
  • 4金婷,王攀,张顺颐,陆青莲,陈东.基于DPI和会话关联技术的QQ语音业务识别模型和算法[J].重庆邮电学院学报(自然科学版),2006,18(6):789-792. 被引量:10
  • 5吴小毛.基于点对点即时信息交换安全通信协议模型研究[J].信息网络安全,2012(4):72-74. 被引量:15
  • 6李城龙,薛一波,汪东升.融合自动化逆向和聚类分析的协议识别方法[J].计算机科学与探索,2012,6(5):397-408. 被引量:2
  • 7CIO时代网.深度包检测(DPI)的典型厂商及其产品[EB/OL].http://wwwciotimes.com/i11frascrumire/svjq/66929.htnfl,2014-04-11.
  • 8万兵,杨阳.VoIP流量监测技术的研究与应用[J].电信快报(网络与通信),2010(2):32-35. 被引量:4
  • 9SIP与H.323协议的比较及其应用[EB/OL].http://wenkubaidu.com/link?url=Teagq3J0327zMNrillA5Qhiwfalq00ZFIO0DZEE61)Ndozmlk50y4LHsMfEKCAwOsoeARSllMjr6HuE-rdTnQBiAxGY8qUFsYjrifgwoXY-4jm,2014-03-12.
  • 10Per 6 nyi M, Moln d r S. Enhanced skype traffic identification[C]. Proceedings of the 2nd international conference on Performance evaluation methodologies and tools. ICST (Institute for Computer Sciences, Social- Informatics and Telecommunications Engineering), 2007: 26.

二级参考文献57

  • 1董莹,孙桂春,向群.利用腾讯QQ开展网上实时咨询服务的实践[J].上海高校图书情报工作研究,2005,15(2):31-33. 被引量:8
  • 2宋明秋,张国权,邓贵仕.入侵检测多模式匹配算法[J].计算机工程,2006,32(5):144-146. 被引量:5
  • 3陈敏,张广兴,毕经平.基于SIP的VoIP流量识别方法研究[J].计算机应用研究,2007,24(4):301-303. 被引量:11
  • 4朱永庆.DPI技术应用场景探讨[J].广东通信技术,2007,27(7):27-29. 被引量:11
  • 5陆魁军.计算机网络工程实践教程[M].北京:清华大学出版社,2007:233-234.
  • 6王芳,李君,张顺颐.Skype流量识别研究[J].广东通信技术,2007,27(8):18-22. 被引量:2
  • 7Karagiannis T, Broido A, Brownlee N, et al. Is P2P dying or just hiding?[C]//Proceedings of the 2004 IEEE Global Telecommunications Conference (GLOBECOM '04), Dallas, TX, USA, Nov 29-Dec 3. Washington, DC, USA: IEEE Computer Society, 2004: 1532-1538.
  • 8Roughan M, Subhabrata S, Spatscheck 0, et al. Class-ofservice mapping for QoS: a statistical signature-based approach to IP traffic classification[C]//Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement (IMC ' 04), Taormina, Sicily, Italy, Oct 25-27, 2004.
  • 9Merwe J, Caceres R, Chu Y, et al. Mmdump: A tool for monitoring Internet multimedia traffic[J]. ACM SIGCOMM Computer Communication Review, 2000, 30(5): 48-59.
  • 10Zander S, Nguyen T, Armitage G. Self-learning IP traffic classification based on statistical flow characteristics[C]// LNCS 3431: Proceedings of the 6th Passive and Active Measurement Workshop (PAM ' 05), Boston, MA, USA, Mar 31-Apr I, 2005. Berlin, Heidelberg: Springer-Ver.

共引文献47

同被引文献27

  • 1Forman G. An extensive empirical study of feature selection metrics for text classification[J].The Journal of Machine Learning Research, 2003:1289 - 1305.
  • 2Auld T, Moore AW, Gull S F.Bayesian neural networks for internet traffic classification[J].Neual Networks,IEEE Transactions on,2007,18(1):223-239.
  • 3Ehlert S,Petgang S,Magedanz T,et al.Analysis and signature of Skype VoIP session traffic[C]//4th IASTED Intermational,2006.
  • 4粱伟.VoIP呼叫分拣关键技术研究与设计[D].郑州:解放军信息工程大学,2012.
  • 5D.Bonfiglio,M.Mellia,M. Meo,et al.,Revealing Skype Traffic:When Randomness Plays with You[C]//ACM SIGCOMM Computer Communication Review,New York, USA, Oct.2007.
  • 6D.Zuev and A.W.Moore,Traffic Classification Using a Statistical Approach[C]//in Proceedings of the 6th International Workshop of Passive Active Measurement(PAM 2005),Boston,MA,USA,Mar./Apr.2005.
  • 7第三十六次中国互联网络发展状况统计报告[R].北京.中国互联网络信息中心.2015.
  • 8Se-Hee Han,James Won-Ki Hong. The Architecture of NG-MON : A Passive Network Monitoring System for High-SpeedIP Networks [J]. Lecture Notes In Computer Science,2002,2506:16-27.
  • 9Sen S,Spatscheck 0,Wang D: Accurate, scalable in -net-work identification of p2p traffic using application signatures.WWW 104[C]//Proceedings of the 13th International Confer-ence on World Wide Web. ACM, New York, 2004:512-521.
  • 10Cascarano N,Este A, Gringoli F,et al. An experimentalevaluation of the computational cost of a DPI traffic classifier[CJ//IEEE Global Telecommunications Conference, 2009.

引证文献4

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部