期刊文献+

基于H.323协议的VoIP语音流量识别 被引量:6

Technology for identifying VoIP traffic based on H.323 protocol
在线阅读 下载PDF
导出
摘要 通过分析H.323协议和H.323协议的会话流程,基于H.323协议的VoIP通信过程中出现的会话特征,提取出通信双方的元组信息来识别整个会话流量,设计出相应的流存储、搜索、更新方案和识别VoIP流量的算法。实验表明,该方法能够准确识别基于H.323协议的VoIP语音流量。 The H. 323 protocol and the session process based on H. 323 were analyzed, the session signature in the communication process produced by VoIP based on H. 323 was introduced, the tuples of the communicators were abstracted, and then the whole VoIP traffic was identified. The corresponding scheme for traffic store, search, update and the algorithm for VoIP traffic identification were designed. Experiment indicates that this method can accurately identify the H. 323-based VoIP traffic.
出处 《计算机应用》 CSCD 北大核心 2008年第9期2204-2206,共3页 journal of Computer Applications
基金 国防基础科研"十一五"项目(A1420060162)
关键词 H.323 会话 业务流 流量识别 H.323 session traffic flow traffic identification
  • 相关文献

参考文献8

二级参考文献43

  • 1Subhabrata Sen,Jia Wang.Analyzing Peer-to-Peer Traffic across Large Networks[C].In:IEEE/ACM Transactions on Networking,NJ:IEEE Press,2004:219~232
  • 2IANA[S].http://www.iana.org/assignments/port-numbers
  • 3Myung-Sup Kim,Young J Won,James Won-Ki Hong.Application-Level Traffic Monitoring and an Analysis on IP Networks[J].ETRI Journal,2005;27(11):22~42
  • 4Subhabrata Sen,Oliver Spatscheck,Dongmei Wang.Accurate,Scalable In-Network Identification of P2P Traffic Using Application Signatures[C].In:Proceedings of the 13th international conference on World Wide Web,NY:ACM Press,2004:512~521
  • 5Luca Deri,NETikos,SPA.Improving passive packet capture:beyond device polling.http://jake.unipi.it/Ring.pdf,2004-10/2005-11
  • 6BitTorrent.http://www.bittorrent.com/protocol.html
  • 7Yoram Kulbak,Danny Bickson.The eMule Protocol Specification.http://ftp.citkit.ru/pub/sourceforge/e/em/emule/protocol_guide.pdf,2005 -01/2005-11
  • 8MSN Messenger Protocol.http://www.hypothetic.org/docs/msn/index.php
  • 9R Movva,W Lai.MSN Messenger Service 1.0 Protocol.http://www.hypothetic.org/docs/msn/sitev1/index.php,2003-09-/2005-11
  • 10Simple Mail Transfer Protocol[S].RFC 2821

共引文献88

同被引文献39

  • 1宋明秋,张国权,邓贵仕.入侵检测多模式匹配算法[J].计算机工程,2006,32(5):144-146. 被引量:5
  • 2陈敏,张广兴,毕经平.基于SIP的VoIP流量识别方法研究[J].计算机应用研究,2007,24(4):301-303. 被引量:11
  • 3陈亮,龚俭,徐选.应用层协议识别算法综述[J].计算机科学,2007,34(7):73-75. 被引量:33
  • 4孙海波.基于协议行为特征的协议识别方法[C]//全国网络与信息安全技术研讨会论文集(上册).北京:中国通信学会,2007:245-251.
  • 5Tantawi AN,Towsley D.Optimal static load balancing in distributed computer systems[J].Journal of the ACM,1985,32(2):445-465.
  • 6Gerald Combs.Wireshark[EB/OL].[2009-10-07].http://www.wireshark.org/.
  • 7王芳,李君,张顺颐.Skype流量识别研究[J].广东通信技术,2007,27(8):18-22. 被引量:2
  • 8YILDIRIM T, RADCLIFFE P. VoIP traffic classification in IPSec tunnels [ C ] //Proc of Intemationai Conference on Electronics and Information Engineering. 2010:151-157.
  • 9OKABE T, KITAMURA T, SHIZUNO T. Statistical traffic identification method based on flow-level behavior for fair VoIP service [ C]// Proc of the 1 st IEEE Workshop on VoIP Management and Security. 2006:35-40.
  • 10LI Bing, MA Mao-de, JIN Zhi-gang. A VoIP traffic identification scheme based on host and flow behavior analysis [ J ]. Journal of Network and Systems Management,2010,19(1) :111-129.

引证文献6

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部