以作者查詢圖書館館藏 、以作者查詢臺灣博碩士 、以作者查詢全國書目 、勘誤回報 、線上人數:43 、訪客IP:18.224.30.113
姓名 賴永哲(Yung-Che Lai) 查詢紙本館藏 畢業系所 資訊工程學系 論文名稱 SIP服務監聽系統之設計與實作
(Design and Implementation for Lawful Interception of SIP-based Services)相關論文 檔案 [Endnote RIS 格式] [Bibtex 格式] [相關文章] [文章引用] [完整記錄] [館藏目錄] 至系統瀏覽論文 ( 永不開放) 摘要(中) 以往對於多媒體服務連線的建立方式各有一套準則,現今第三代行動電話合作項目(Third Generation Partnership Project,簡稱3GPP) 選擇以會議初始協定 (Session Initiation Protocol,簡稱SIP) 來做為多媒體服務建立連線時的通訊協定,因此可用於建立多方多媒體通訊(Multiparty Multimedia Communications)系統的SIP,受到最為廣泛的注意與討論。當多媒體服務普及時,網路犯罪的考量也日趨顯的重要,目前已有多種關於網路犯罪方面的研究正在進行中,其中關於合法監聽方面為一重要之議題。
目前對於合法監聽方面,已有多項研究正在進行中或已定義出規範,其中對於傳統電話網路的監聽已行之多年。近年來,網際網路多媒體服務發展迅速,由於傳輸方式與架構不同,因此傳統舊有的監聽架構,對於新興的網路多媒體服務,並無法提供相同的監聽效用。本論文針對使用SIP建立連線的多媒體服務,提出合法的監聽系統。而以SIP為連線建立協定之服務,均稱為SIP服務,如:網路電話(Voice over IP,簡稱VoIP)與視訊會議(Video Conference)等。在論文中提及四種監聽策略與架構,分別為分散式整合代理伺服器之監聽(Decentralized Interception on Proxy Server,簡稱DIPS)、集中式整合代理伺服器之監聽(Centralized Interception on Proxy Server,簡稱CIPS)、整合邊界路由器之監聽(Interception on Edge Router,簡稱IER)與整合核心路由器之監聽(Interception on Core Router,簡稱ICR),並分析各項策略的優缺點。最後選擇DIPS來實作,因其於儲存資料與監聽方面的分散式架構,降低了因網路不穩定或其他錯誤情形產生時,會使得監聽系統無法正常運作。文中最後以實驗驗證所提出之DIPS的效能,並分析各項實驗之結果。摘要(英) Flourishing development of the Internet, following Internet users and multimedia services are increased so fast, for instance, Voice over IP, multimedia services and video conferencing, etc. Each of them has a set of criterion on session establishment of multimedia services in the past. Now 3GPP (Third Generation Partnership Project) chooses SIP (Session Initiation Protocol ) as signaling protocol while setting up sessions for multimedia services, hence SIP which can be used to set up Multiparty Multimedia Communications is the most attractive and discussing. As well as multimedia services are popularized, security issues are more and more important, and researches about security are in progress. Lawful interception is one of the most important topics.
To the aspect of lawful interception, has had multiple researches in progress or defined out specifications already, among them the lawful interception of Public Switched Telephone Network has been conducted for many years. With rapid developments of internet multimedia services in recent years, it is more difficult to use traditional methods on monitoring such services. So a thesis proposes the lawful interception system to intercept and collect various forms of communications while using SIP as signaling protocol, and mentions four kinds of interception strategies and structure in the thesis, and analyzes the pluses and minuses of every strategy. As the result of strategy analysis, choose a decentralized lawful interception strategy named Decentralized Interception on Proxy Server to implement. The decentralized architecture of storage and interception reduces the impact of all interception system when network situation is unstable or faults occur. Finally, analyze and prove the performance of proposed decentralized lawful interception system.關鍵字(中) ★ 監聽
★ SIP關鍵字(英) ★ Interception
★ SIP論文目次 第一章 緒論 1
1.1 概要 1
1.2 研究動機 2
1.3 研究目標 3
1.4 論文架構 4
第二章 背景知識與相關研究 5
2.1 SIP 會議初始協定 5
2.1.1 SIP的基本架構 6
2.1.2 SIP基本訊號流程 7
2.2 H.323、MGCP與SIP 9
2.2.1 H.323 9
2.2.2 MGCP 14
2.3 SDP 會議描述協定 16
2.4 網路電話監聽 17
2.4.1 合法的監聽 17
2.4.2 監聽方式 19
第三章 SIP服務監聽之系統設計 24
3.1 網路環境與假設 24
3.2 路由器之監聽策略 27
3.3 代理伺服器之監聽策略 38
3.3.1 集中式代理伺服器之監聽策略 38
3.3.2 分散式代理伺服器之監聽策略 46
3.4 四種監聽架構優缺點比較 52
第四章 分散式代理伺服器監聽系統之實作 57
4.1 分散式代理伺服器監聽系統之實作架構 57
4.2 開發工具與環境 59
4.3 系統功能與展示 61
4.3.1 代理伺服器之功能與展示 61
4.3.2 監聽代理人之功能與展示 64
4.3.3 控制中心之功能與展示 65
第五章 系統之測試與討論 70
5.1 量測參數之定義 70
5.2 監聽系統對於使用者收聽品質的影響 71
5.3 連線數量對於使用者收聽品質的影響(一) 78
5.4 連線數量對於使用者收聽品質的影響(二) 83
5.5 通訊軟體對使用者連線品質的影響 91
第六章 結論及未來研究方向 96
6.1 結論 96
6.2 未來研究方向 97
參考文獻 100參考文獻 [1] J. Rosenberg, et al., “SIP: Session Initiation Protocol,” RFC 3261, http://www.ietf.org/rfc/rfc3261.txt?number=3261, Jun. 2002.
[2] Communication Assistance for Law Enforcement Act, “Communications Assistance for Law Enforcement Act of 1994 (CALEA),” Pub. L. No.103~414, 108 Stat. 4279, Congress of the United States of America.
[3] Internet Engineering Steering Group, Internet Architecture Board, “IETF Policy on Wiretapping,” RFC 2804, http://www.ietf.org/rfc/rfc2804.txt?number=2804, May 2000.
[4] OpenH323 Project, http://www.openh323.org/standards.html.
[5] 3GPP TS 23.202, v.6.0.1, “Network architecture,” http://www.3gpp.org/ftp /Specs/html-info/23-series.htm, Mar. 2003.
[6] 3GPP TS 23.228, v.6.1.0, “IP Multimedia Subsystem (IMS),” http://www.3gpp.org/Specs/html-info/23-series.htm, Mar. 2003.
[7] 3GPP TS 24.228, v.5.6.0, “Signaling flows for the IP Multimedia call control based on SIP and SDP,” http://www.3gpp.org/ftp/Specs/html-info/ 24-series.htm, Sep. 2003.
[8] ITU-T Recommendation H.323, “Packet Based Multimedia Communications Systems,” http://www.itu.int/rec/recommendation.asp?type=products&lang=e& parent=T-REC-H, Jul. 2003.
[9] 3GPP, “A Comparison of H.323v4 and SIP,” Nortel Network, http://research.ihets.org/PDF/nortel1.pdf, Jan. 2000.
[10] Wind River, http://www.windriver.com/whitepapers/sip.pdf.
[11] M. Arango, et al., “Media Gateway Control Protocol (MGCP),” RFC 2705, http://www.ietf.org/rfc/rfc2705.txt?number=2705, Oct. 1999.
[12] SIP Center, http://www.sipcenter.com/sip.nsf/html/Protocol+Comparison.
[13] M. Handley and V. Jacobson, “SDP: Session Description Protocol,” RFC 2327, http://www.ietf.org/rfc/rfc2327.txt?number=2327, Apr. 1998.
[14] Kutscher, “Session Description and Capability Negotiation,” Internet Draft, http://www.ietf.org/internet-drafts/draft-ietf-mmusic-sdpng-07.txt, Oct. 2003.
[15] Telecommunications Industry Association, “Lawfully Authorized Electronic Surveillance for traditional voice telephony,” http://ftp.tiaonline.org/tr-45/ TR452/Incoming/LAES/J-STD-025A.pdf, Apr. 2000.
[16] International Packet Communication Consortium, “Lawfully Authorized Electronic Surveillance For Softwitch-based Networks,” http://www.soft switch.org, Jul. 2003.
[17] F. Baker, B. Foster, C. Sharp, “Cisco Architecture for Lawful Intercept in IP Networks,” Internet Draft, http://www.ietf.org/internet-drafts/draft-baker-slem -architecture-02.txt, Oct. 2003.
[18] ETSI ES 201 671 V2.1.1, “Telecommunication Security; Lawful Interception (LI); Handover interface for the lawful interception of telecommunication traffic,”http://webapp.etsi.org/exchangefolder/es_201671v020101p.pdf, Sep. 2001.
[19] ETSI TS 133 107 V5.6.0, “Universal Telecommunication System (UMTS); 3G Security; Lawful interception architecture and functions,” http://webapp.etsi.org/ exchangefolder/ts_133107v050600p.pdf, Sep. 2003.
[20] Tia Co, “CALEA Packet Surveillance JEM Final Report,” http://www. tiaonline.org/standards/CALEA_JEM, Aug. 20, 2000.
[21] N. Maloku, T. Aljaz, F. Dolenc, “Legal Call Interception in Next Generation Networks.”, Proceedings of the 7th International Conference on Telecommunications, Zagreb, Croatia, vol.1, Jun. 11-13, 2003.
[22] A. Milanovic, S. Srbljic, I. Raznjevic, D. Sladden, D. Skrobo, I. Matosevic, “Distributed System for Lawful Interception in VoIP Networks,” IEEE Computer as a Tool, vol.1, pp.203-207, Sep.22-24, 2003.
[23] A. Milanovic, S. Srbljic, I. Raznjevic, D. Sladden, D. Skrobo, I. Matosevic, “Methods for Lawful Interception in IP Telephony Networks Based on H.323,” IEEE Computer as a Tool, vol.1, pp.198-202, Sep.22-24, 2003.
[24] IP Telephony, http://www.iptel.org/ser/.
[25] H. Handley, et al., “RTP: A Transport Protocol for Real-Time Applications,” RFC 1889, http://www.ietf.org/rfc/rfc1889.txt?number=1889, Jan. 1996.
[26] ITU-T Recommendation G.114, “One way transmission delay,” Sep. 2002.
[27] Ubiquity, http://www.ubiquity.net/products/SIP/SIP_User_Agent.php.指導教授 周立德(Li-Der Chou) 審核日期 2004-7-19 推文 facebook plurk twitter funp google live udn HD myshare reddit netvibes friend youpush delicious baidu 網路書籤 Google bookmarks del.icio.us hemidemi myshare