Font Size: a A A

Research And Implementation Of Lawful Interception Rules In IP Network

Posted on:2012-08-11Degree:MasterType:Thesis
Country:ChinaCandidate:C F JiaFull Text:PDF
GTID:2178330332975400Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the globalization of information level increasing, the network and information security show more and more important. One hand, people was enjoying the convenient from information society, on the other hand, same people are using communication tools do many things of illegal activities. In order to meet the needs of safety aspects, and do better to crack down on all illegal activities, lawful intercept, which has caused national government departments concerned. At present, lawful intercept function have a clear specification in fixed network, wireless etc voice network, but lawful intercept of IP network is complicated and immature relatively. Now, public IP network (such as MAN, Internet) has become the important way for people to transfer public and private information, so the lawful intercept for public IP networks is a inevitable demand while is also a huge market. This paper designs and implements the rules of IP network lawful intercept. The main works and achievements:First, The author had taken part in the development of IP network lawful interception. According to the idea of software engineering, the structural of monitor rules, the rules based on Multi-core, the rules of distributed system are processed or designed.Second, the lawful intercept rules are realized on Multi-core system in H3C, codes are tested which including unit testing and system testing. Unit tests are based on code of testing in order to ensure effectiveness and correctness of internal data operation. System testing is based on two modes which include message monitor and non-message monitor. Then the results are analyzed.Last, in order to solve the allocation problem of large-scale data stream, Hungarian matching algorithms are adopted, and the problem of monitor point overburdened which because some monitoring point surveillance rule uneven.
Keywords/Search Tags:Lawful interception, IP network, Hungary algorithm, SNMPv3, Load distribution, Multi-core System
PDF Full Text Request
Related items