期刊文献+

基于H.323的Voip监听模型的设计与实现 被引量:1

Design and implementation of H.323-based VoIP interception model
在线阅读 下载PDF
导出
摘要 随着Voip的广泛应用,如何对其实施快捷、有效的合法监听已成为当前研究的热点。对H.323协议网络及其协议自身的特点进行了研究和分析,并对基于H.323的Voip流量的识别方法、动态会话的提取算法和网络监听流程作了重点阐述,在此基础上,提出了一个基于H.323的Voip监听模型的设计方案。 With the wide application of VolP, how to implement lawful interception rapidly and effectively has become the focus of present research. The characteristics of H. 323 network and its protocol were analyzed, and the traffic identification methodology based on H. 323, the algorithm of extracting the dynamic conversation and the flow of network interception were expounded in detail. And on such basis, a design of interception model based on H. 323 was put forward.
作者 邹益民 杜江
出处 《计算机应用》 CSCD 北大核心 2008年第6期1401-1403,共3页 journal of Computer Applications
基金 重庆市科委项目(CSTC 2007AB2003)
关键词 H.323 IP电话技术 合法监听 流量识别 H. 323 Voice over Internet Protocol (VolP) lawful interception traffic identification
  • 相关文献

参考文献5

  • 1International Telecommunication Union . ITU - T Recommendation H.323, Packet-based multimedia communications systems [ S]. 2006.
  • 2International Telecommunication Union . ITU - T Recommendation H. 225.0, Call signaling protocols and media stream packetization for packet-based multimedia communication systems [ S]. 2006.
  • 3International Telecommunication Union . ITU - T Recommendation H. 245, Control protocol for multimedia communication [S]. 2006,
  • 4MILANOVIC A, SRBLJIC S, RAZNJEVIC I, et al. Methods for lawful interception in IP telephony networks based on H. 323 [ C]// EUROCON 2003, Computer as a Tool, The IEEE Region 8. Washington: IEEE Press, 2003, 1: 198-202.
  • 5张兆心,方滨兴,宏莉.SIP监听控管系统研究[D].哈尔滨:哈尔滨工业大学,2007.

共引文献1

同被引文献14

  • 1IETF.The Secure Real-Time Transport Protocol(SRTP).[EB/OL].(2004-3-16)[2009-3-15].http:∥www.rfceditor.org/rfc/rfc3711.txt.
  • 2IEIF.RTP:A Transport Protocolfor Real-Time Applications[EB/OL].(2003-7-17)[2009-7-5].http:∥www.ietf.org/rfe/rfc3550.txt.
  • 3IETF.MIKEY:Multimedia Internet Keying[EB/OL].(2004-8-22)[2009-11-3].http:∥www.rfe-editor.org/rfc/rfc3830.txt.
  • 4ARRKO J,LINDHOLM F,NASLUND M,et al.Key Management Extensionsfor Session Description Protoeol(SDP)Andreal Time Streaming Protocol (RTSP)[EB/OL].(2006-7-20)[2009-7-5].http:∥www.ietf.org/rfc/ffc4567.txt.
  • 5ANDREASEN F,BAUGHER M,WING D.Session Description Protocol Security Descriptions for Media Streams,Work inPro-gress[EB/OL].(2006-7-20)[2009-7-5].http:∥www.ietf.org/rfc/rfc4568.txt.
  • 6THOMAS M,VILHUBER J.Kerberized Internet Negotiation of Keys (KINK)[EB/OL].(2001-10-20)[2009-7-5].http:∥www.ietf.org/proceedings/01dee/I-D/draft-ietf-kink-kink-02.txt.
  • 7IETF.The Group Domain of Interpretation[EB/OL].(2003-7-17)[2009-7-5].http:∥www.fie-editor.org/rfc/rfc3547.txt.
  • 8VOVIDA.Vovida Open Communication Application Library (VOCAL)[EB/OL].(2003-4-10)[2009-3-10].http:∥www.vovida.org/.
  • 9万勇兵,刘凯,黄明和,汪浩.一种基于SIP下VoIP身份认证技术的解决方案[J].江西师范大学学报(自然科学版),2008,32(2):237-241. 被引量:5
  • 10赵凯,王永娟.基于SIP的合法监听[J].计算机工程,2008,34(8):243-245. 被引量:3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部