首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
企业级VoIP媒体网关的设计与实现   总被引:1,自引:0,他引:1  
企业级VoIP媒体网关是企业VoIP电话系统的一种解决方案,本文提出了一个企业级VoIP媒体网关的设计模型,重点描述了系统的功能其系统结构,并对系统各模块进行了详细的介绍,最后举例简要说明了该系统的呼叫流程。  相似文献   

2.
Skype is one of the most popular voice-over-IP (VoIP) service providers. One of the main reasons for the popularity of Skype VoIP services is its unique set of features to protect privacy of VoIP calls such as strong encryption, proprietary protocols, unknown codecs, dynamic path selection, and the constant packet rate. In this paper, we propose a class of passive traffic analysis attacks to compromise privacy of Skype VoIP calls. The proposed attacks are based on application-level features extracted from VoIP call traces. The proposed attacks are evaluated by extensive experiments over different types of networks including commercialized anonymity networks and our campus network. The experiment results show that the proposed traffic analysis attacks can greatly compromise the privacy of Skype calls. Possible countermeasure to mitigate the proposed traffic analysis attacks are analyzed in this paper.  相似文献   

3.
随着VoIP业务的增长,如何及时有效地对网络运行的话务数据进行分析和管理已成了电信运营企业面临的问题.VoIP话务分析系统通过对采集到的原始呼叫数据进行存储、加工、转换,并提供给客户进行展示,满足了这种需求。文章立足于目前网络运行维护的实际需求,阐述了话务分析系统的模块化设计并探讨了其技术特点。  相似文献   

4.
针对目前网格资源调度中忽视信任机制的缺陷,在行为信任模型和能力信任评估的基础上,提出一种信任驱动的资源调度算法TDS。该算法同时兼顾了性能QoS和信任QoS。仿真实验结果表明,TDS算法与传统的基于性能QoS的算法和基于信任QoS的算法相比,在最小完工时间和服务请求提交成功率方面具有较好的性能。  相似文献   

5.
针对基于系统调用序列的入侵检测方法在实际应用中成本偏高的问题,在STIDE方法的基础上提出一种低耗时的入侵检测算法。利用N元语义模型分析系统调用序列规律,计算系统调用的贡献度,抽取最能体现用户正常行为的系统调用,建立正常模式库实现异常检测。实验结果证明,该算法在保证检测率不下降的同时,训练和检测系统调用短序列的规模降低70%。  相似文献   

6.
介绍VoIP的基本知识、VoIP技术的体系结构和基本的传输过程,VOIP网络的设计和Cisco7960IP电话及相关设备的配置.在帧中继广域网环境下,以Cisco路由器的FXS接口连接普通模拟电话机,以Cisco3550交换机连接Cisco IP电话,并通过Cisco Call-Manager的部署实现Voice over IP.Cisco产品对VoIP系统的实现具有很好的支持,该VOIP系统在实验室环境下通过调试.  相似文献   

7.
针对已有VoIP检测方法对协议解析依赖性较大,且检测范围不尽全面的问题,提出基于流统计特征的VoIP媒体网关检测方法.该方法通过对RTP流平均包到达间隔作同流计算与同源多流统计,得出对应网络实体的平均包到达间隔概率分布.根据同一IP地址所对应的平均包到达间隔分布的概率峰值判定媒体网关,从而大幅提高VoIP业务检测效率.  相似文献   

8.
一种VoIP流量识别的新方法*   总被引:1,自引:1,他引:0  
目前传统的基于端口的流量识别方法不适合VoIP流量识别,基于载荷分析的流量识别方法应用于实时监测存在开销过大的问题,基于统计模型的流量识别方法也不适合实时监测。为此,针对VoIP的传输特性,提出并实现了一种新的VoIP流量识别方法。实验表明,只根据传输层信息,该方法的误报率在10%左右。  相似文献   

9.
一种基于SVM的P2P网络流量分类方法   总被引:9,自引:1,他引:9       下载免费PDF全文
提出一种基于SVM的P2P网络流量分类的方法。这种方法利用网络流量的统计特征和基于统计理论的SVM方法,对不同应用类型的P2P网络流量进行分类研究。主要对文件共享中的BitTorrent,流媒体中的PPLive,网络电话中的Skype,即时通讯中的MSN 4种P2P网络流量进行分类研究。介绍了基于SVM的P2P流量分类的整体框架,描述了流量样本的获取及处理方法,并对分类器的构建及实验结果进行了介绍。实验结果验证了提出方法的有效性,平均分类精确率为92.38%。  相似文献   

10.
Miller  Anne  Aswani  Anil  Zhou  Mo  Weinger  Matt  Slagle  Jason  France  Daniel 《Cognition, Technology & Work》2019,21(2):225-236

Patient admissions, discharges, and transfers are high work demand activities that have been associated with 30-day readmissions and increased patient mortality. Most mitigation strategies target peak demand, but variable demand may be more significant. Self-organizing holarchic open systems (SOHOs) and resilience engineering frameworks may explain system behavior, but a few quantitative studies of resilient organizational performance have been published. We used three measures to explore SOHO and resilience engineering constructs. We collected hourly data over 2 years, from five inter-related units in a cardiovascular disease division of a metropolitan teaching hospital. Our results show that information flows (inbound, outbound, answered, and unanswered telephone calls) representing anticipatory management are related to patient flows (patient admissions discharges and transfers) and nurse-staffing levels (nurse-to-patient ratios). We also found overall system stability despite high patient flow effects in lower level units. Unexpectedly, the time to recovery from high patient flow events lasted up to 7 days. We conclude that constructs proposed by resilience engineering can be quantified using simple measures collated within routine operations. The application of nonlinear statistical analyses can uncover important insights about resilient performance that may assist managers in better preparing for managing and recovering from unexpected variation in patient flow.

  相似文献   

11.
多通道电话录音系统的设计与实现   总被引:1,自引:0,他引:1  
为了监控电话通话,传统的方法是使用普通的模拟磁带式录音机,但这种方式不便于对电话录音进行查询和重放,也不利于电话录音数据的保存和管理.针对民航调度指挥中心监听和记录电话通话的需求,给出了一个基于计算机电信集成技术的电话录音系统的系统组成结构和实现方法.该系统可以同时记录多门电话的通话情况,并可以监听这些电话的实时通话.另外,所有电话的通话信息被自动备份到数据磁带上,可以在需要的时候进行恢复和重放.  相似文献   

12.
ABSTRACT

Voice over IP (VoIP) technology is being extensively and rapidly deployed. Flexibility and cost efficiency are the key factors luring enterprises to transition to VoIP. Some security problems may surface with the widespread deployment of VoIP. This article presents an overview of VoIP systems and its security issues. First, we briefly describe basic VoIP architecture and its fundamental differences compared to PSTN. Next, basic VoIP protocols used for signaling and media transport, as well as defense mechanisms are described. Finally, current and potential VoIP attacks along with the approaches that have been adopted to counter the attacks are discussed.  相似文献   

13.
VoIP (Voice over Internet Protocol), which provides voice calls as well as additional services at cheaper prices than PSTN (Public Switched Telephone Network), is gaining ground over the latter, which had been the dominant telephone network in the past. This kind of a VoIP service is evolving into a dedicated mVoIP service for the smartphone which allows calls to be made at cheap prices using a WiFi network, as the number of smartphone users is skyrocketing as of late. While an increase in the user base is expected for mVoIP, a packet network is an open network which means anyone can easily gain access and so there can be various problems. To mitigate this, in this paper an authentication system is designed which has an AA (Attribute Authority) server added to VoIP in order to increase security and discriminate user access. In this paper a system for addressing security vulnerabilities from the increase in the use of VoIP services and providing differentiated services according to user access privileges is designed. This paper is organized as follows: Chapter 1 gives the introduction; Chapter 2 is on related research; Chapter 3 describes the proposed technique and system; Chapter 4 implements the system and analyzes its the performance; and Chapter 5 gives the conclusions.  相似文献   

14.
For commercial VoIP services, billing is crucial to both service providers and their subscribers. One of the most basic requirements of any billing function is that it must be accurate and trustworthy. A reliable VoIP billing mechanism should only charge VoIP subscribers for the calls they have really made and for the durations they have called.Existing VoIP billing is based on the underlying VoIP signaling and media transport protocols. Hence, vulnerabilities in VoIP signaling and media transports can be exploited to compromise the trustworthiness of the billing of VoIP systems. In this paper, we analyze several deployed SIP-based VoIP systems, and present three types of billing attacks: call establishment hijacking, call termination hijacking and call forward hijacking. These billing attacks can result in charges on the calls the subscribers have not made or overcharges on the VoIP calls the subscribers have made. Such billing attacks essentially cause inconsistencies between what the VoIP subscribers have received and what the VoIP service provider has provided, which would create hard to resolve disputes between the VoIP subscribers and service providers. Our empirical results show that VoIP subscribers of Vonage, AT&T and Gizmo are vulnerable to these billing attacks.  相似文献   

15.
基于SIP协议的VoIP中的威胁、风险和控制   总被引:2,自引:0,他引:2  
IP语音技术(VoIP)的来临和推动有极大改变电信面貌的潜力。然而,作为一个相对较新的技术,VoIP仍然面临着来自技术和社会的各种安全困扰。在本文中,提出了基于SIP协议的VoIP技术中存在的主要威胁和弱点。此外,将讨论一些应该在企业VoIP系统中实施的安全规定、政策和健全做法。  相似文献   

16.
Global telecommunication services create an enormous volume of real time data. Long distance voice networks, for example, can complete more than 250 million calls a day; wide area data networks can support many hundreds of thousands of virtual circuits and millions of Internet protocol (IP) flows and Web server sessions. Unlike terabyte databases, which typically contain images or multimedia streams, telecommunication databases mainly contain numerous small records describing transactions and network status events. The data processing involved therefore differs markedly, both in the number of records and the data items interpreted. To efficiently configure and operate these networks, as well as manage performance and reliability for the user, these vast data sets must be understandable. Increasingly, visualization proves key to achieving this goal. AT&T Infolab is an interdisciplinary project created in 1996 to explore how software, data management and analysis, and visualization can combine to attack information problems involving large scale networks. The data Infolab collects daily reaches tens of gigabytes. The Infolab project Swift-3D uses interactive 3D maps with statistical widgets, topology diagrams, and pixel oriented displays to abstract network data and let users interact with it. We have implemented a full scale Swift-3D prototype, which generated the examples presented  相似文献   

17.
Several factors have spurred the explosive growth of VoIP phone use in China, including customer incentives such as improved voice quality and lower cost per call, and provider incentives such as higher profits and upgrade paths to next-generation technologies. The voice over Internet protocol, also called IP telephony, offers a new type of service that uses the Internet protocol, intranets, and extranets to deliver voice information. In contrast to traditional telephone services, which operate through a circuit-switched network, VoIP uses a packet-switched network. This distinction results in differences in implementation, quality of service (QoS), and operating costs. Since the service was introduced to the public in China in April 1999, VoIP toll telephone traffic has increased with astonishing speed. By the end of 2002, VoIP toll telephone traffic had surpassed traditional toll telephone traffic in China in both domestic longdistance and international call areas, including phone calls to and from Hong Kong, Macao, and Taiwan.  相似文献   

18.
As one of the most popular real-time services on the Internet, Voice over internet protocol (VoIP) has attracted researchers’ attention in the information security field for its characters of real-time and high flow. To protect data security, a new covert VoIP communications system was proposed in this study to realize secure communications by hiding secret information in VoIP streams. In the proposed algorithm, secret data were divided into blocks after being encrypted with a block cipher, and then each block of secret data was embedded into VoIP streaming packets randomly using a chaotic mapping. The symmetric key was distributed through an efficient and secure channel, and the message digest was implemented to protect the integrity of secret data. The experimental data were collected by comparing audio data between the sender and the receiver. The experimental results indicated that data embedding had little impact on the quality of speech. Besides, statistical analysis could not detect the secret data embedded in VoIP streams using the block cipher and random numbers generated from chaotic mapping. The proposed covert VoIP communications system not only achieved high quality of VoIP and prevented detection of statistical analysis, but also provided integrity for secret data.  相似文献   

19.
VoIP普遍采用H.323体系标准,在网关的实现过程中,会涉及到多路呼叫的资源分配与维护、多线程的处理与同步、呼叫状态的迁移与超时处理,以及协议栈版本前后兼容等问题,这些问题的处理好坏对网关的系统效率以及互通性方面会有很大的影响。文章针对上述问题进行分析,提出了自己独特的解决方法,有效地优化了网关系统性能,并给出了网关的测试结果。  相似文献   

20.
传统媒体服务器仅能处理PSTN网络内的呼叫,通信处理能力弱,而且不易有效管理通信线路.IP媒体服务器继承PSTN网络上的业务,且能很好地处理IP网和PSTN网间的相互呼叫和通信,可提供多种业务,如全局交互式语音应答系统、会议、IP语音与传真、分布式呼叫中心等.结合专用板卡,采用C++设计了一个开放性、可扩展的平台.作为下一代网络的重刎要组成部分,IP媒体服务器将促进新的增值业务的发展.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号