共查询到20条相似文献,搜索用时 85 毫秒
1.
2.
杨晓波 《计算机应用与软件》2009,26(2)
采用流量采集和协议分析等方法对非法VoIP进行检测,并在此基础上提出合理的应对策略.实现方法以VoIP核心技术为基础,利用硬件探针方式采集网络流量,并对其进行分析,结合RTP协议分析非法VoIP的流量分布,从而得出最终结论:利用流量采集和协议分析方法可以较为准确地对非法VoIP进行检测,通过采取有效措施,可以限制非法IP地址落地,降低话务量的流失. 相似文献
3.
4.
5.
提出一种SIP信令协议的入侵检测方法,用以加强VoIP业务环境的安全。重点对基于SIP的VoIP业务环境的安全威胁和业务流量分析,利用数据挖掘算法和改进的贝叶斯算法构建针对SIP下的入侵检测模型。实验结果表明,该方法可以对VoIP业务环境下的网络攻击进行有效检测。 相似文献
6.
7.
8.
文章对VoIP的安全问题进行了较深入的研究,首先介绍了VoIP的安全风险,接着对部署VoIP的风险进行了评估,最后对部署安全的IP电话方案进行了探讨。 相似文献
9.
针对VoIP加密负载流量识别的难题,提出一种基于UDP统计指印混合模型的VoIP流量识别方法,以提高VoIP流量的识别精度和分类稳定性.该模型改进了统计指印模型中基于单一的网络流相异度来判定流量类别的方法,将UDP流的统计特征与网络流的统计指印相异度结合以共同训练一个支持向量机分类模型,把基于分类阈值点的分类转换到基于多维特征的高维空间中的分类面的分类,综合运用包层次和流层次统计特征,降低了因网络不稳定造成的统计特征偏差对分类模型精确度的影响.实验结果表明,该模型对VoIP流量的分类精确度达到97%以上,与统计指印模型和支持向量机模型相比分类稳定性更好. 相似文献
10.
11.
分析了区分服务的工作原理和影响VoIP语音质量的主要因素,介绍了一种语音质量的客观评价方法——E模型,运用ns-2仿真器构建网络仿真模型,比较VoIP在区分服务和传统网络中的性能表现,利用E模型对VoIP的性能进行了定量的客观评价,并为区分服务对VoIP的支持能力提供了用户级语音质量的分析。 相似文献
12.
抖动缓冲是解决VoIP系统延时抖动问题的有效方法。为实现抖动缓冲的动态调整,获得更好的VoIP通话质量,提出了一种基于语音质量预测的自适应抖动缓冲算法。算法采用Pareto分布为延时建模,通过E-Model方法预测突发丢包模式下的瞬时语音质量,以最大化语音质量为目标,自适应选择出最优的抖动缓冲区大小。实验仿真结果表明,所提算法明显优于已有算法,能够有效提高VoIP系统的语音质量。 相似文献
13.
VoIP中丢包隐藏技术研究 总被引:2,自引:0,他引:2
由于在“尽力型通信”中不可避免的传输错误(如丢包和时延),VoIP的语音质量会潜在地降低。在许多端对端VoIP系统中,语音的服务质量(QoS)很大部分地取决于丢包率和接收端的丢包隐藏算法(PLC)。文中论述了丢包的原因,对当前普遍采用的几种丢包隐藏技术进行了初步分析并进行了比较。 相似文献
14.
15.
《IEEE transactions on audio, speech, and language processing》2006,14(6):1984-1993
Voice over IP (VoIP) is becoming one of the key technologies for telecommunications. Since IP networks generally do not guarantee transmission quality, it is extremely important to design and manage the quality of service (QoS) properly. To do this, it is desirable to develop an objective quality assessment method that estimates subjective quality based on the physical characteristics of the VoIP system. This paper first proposes a framework of objective models that can be applied not only to quality planning, which is an intended application of the existing standard methodology known as International Telecommunication Union—Telecommunication Standardization Sector (ITU-T) Recommendation G.107, “the E-model,” but also to quality benchmarking and management. Then, it proposes a model that complies with the proposed framework. Experimental results show that the proposed model has sufficient accuracy in the evaluation of practical VoIP systems. In addition, we attempt to integrate the opinion model with other objective quality measures, such as perceptual evaluation of speech quality (PESQ), standardized in Recommendation P.862 in ITU-T. Finally, we examine the task dependence of the performance of the proposed model. 相似文献
16.
《IEEE transactions on audio, speech, and language processing》2006,14(6):1977-1983
Voice-over-IP networks (VoIP) have yet to be universally accepted as a replacement for public switched telephone network services. One of the barriers to this step is the ability to manage the network to ensure the user receives a suitable quality of service during a call. IP networks are nondeterministic, and the impact of network degradations, such as loss and jitter, on the quality perceived by the user is difficult to measure. This paper investigates the role played by the edge-device in the impact of network degradations on user-perceived quality. It shows that all edge-devices are not equal, and proposes calibration as a method of accounting for different devices when monitoring VoIP streams. Finally, it presents results that show the prediction accuracy that can be obtained by using such a method. 相似文献
17.
As one of the most popular real-time services on the Internet, Voice over internet protocol (VoIP) has attracted researchers’ attention in the information security field for its characters of real-time and high flow. To protect data security, a new covert VoIP communications system was proposed in this study to realize secure communications by hiding secret information in VoIP streams. In the proposed algorithm, secret data were divided into blocks after being encrypted with a block cipher, and then each block of secret data was embedded into VoIP streaming packets randomly using a chaotic mapping. The symmetric key was distributed through an efficient and secure channel, and the message digest was implemented to protect the integrity of secret data. The experimental data were collected by comparing audio data between the sender and the receiver. The experimental results indicated that data embedding had little impact on the quality of speech. Besides, statistical analysis could not detect the secret data embedded in VoIP streams using the block cipher and random numbers generated from chaotic mapping. The proposed covert VoIP communications system not only achieved high quality of VoIP and prevented detection of statistical analysis, but also provided integrity for secret data. 相似文献
18.
19.
20.
针对运用国际电联G.107 E模型评估VoIP通话质量时如何准确计算有效设备损伤系数的问题,提出一种基于马尔可夫模型的实时评估算法,通过分别为随机信息包丢失概率和突发比建立三态和二态马尔可夫模型,推导出估算有效设备损伤系数的运算公式和相应统计算法。商用测试结果表明,该评估算法能够在实时环境中较准确地评估VoIP通话质量。 相似文献