姓名:刘峻霖班级:通信143班学号:2014101108
附录
一、英文原文:
Detecting Anomaly Traffic using Flow Data in the real work
I. INTRODUCTION
Recently, many SIP[3]/RTP[4]-based VoIP applications and services have appeared and their ration ratio is gradually increasing due to the free or cheap call charge and the easy subscription method. Thus, some of the subscribers to the PSTN service tend to change their home telephone services to VoIP products. For example, companies in Korea such as LG , - works, and KT have begun to deploy SIP/RTP-based VoIP services. It is reported that more than five million users have subscribed mercial VoIP services and 50% of all the users are joined in 2009 in Korea [1]. According to IDC, it is expected that the number of VoIP users in US will increase to 27 millions in 2009 [2]. Hence, as the VoIP service es popular, it is not surprising that a lot of VoIP anomaly traffic has been already known [5]. So, mercial service such as VoIP services should provide essential security functions regarding privacy, authentication, integrity and non-repudiation for preventing malicious traffic. Particu- larly, most of current SIP/RTP-based VoIP services supply the minimal security function related with authentication. Though secure transport-layer protocols such as Transport Layer Security (TLS) [6] or Secure RTP (SRTP) [7] have been standardized, they have not been fully implemented and
通信类英文文献及翻译 来自淘豆网m.daumloan.com转载请标明出处.