Font Size: a A A

The Research And Realization Of Junk Communications Identification And Filtering In IMS Network

Posted on:2011-06-25Degree:MasterType:Thesis
Country:ChinaCandidate:M XuFull Text:PDF
GTID:2178360308962073Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
IMS (IP Multimedia Subsystem) is driven by 3GPP (The 3rd Generation Partnership Project) as the 3G core network infrastructure. IMS is based on all IP network. It combines the existing traditional telecommunications technology with the Internet technology. This will allow operators to offer new, innovative services that users are expecting. But the network convergence breaks the closed state of traditional telecommunication networks and has brought a lot of junk communications such as VoIP spam, instant messaging spam, and present spam. The spam reduces the quality of service of IMS network, affecting the users' experience. It is an important issue that affects the security of IMS network. Currently, IMS security research is still in its infancy, and the study of identifying and filtering junk communications in IMS is basically non-existent, thus, it is necessary to propose a set of methods to filter and identify junk communications in IMS.This thesis proposes a set of methods about modeling and analyzing the users'behavior of IMS network based on social network analysis on the basis of doing research on junk communications identifying and filtering of traditional network. Based on these methods, this thesis designs and realizes an IMS junk communications identification and filtering system. It provides a new solution for the vulnerability research of IMS.This thesis begins by expounding the research background, after that, briefly analyzes the research of IMS network security threats and the methods of filtering and identifying junk communications of the existing network; then proposes the core of this article, that is, a system aimed at filtering and identifying junk communications in IMS network. Including introducing and analyzing user relationship analysis model which describes users communication behavior, on this basis, the thesis proposes a social network analysis method to identify junk communications; next, the thesis describes the system of filtering and identifying junk communications which depends on applying the above-mentioned identifying methods in IMS; finally, the future work in this area related to this thesis are discussed.
Keywords/Search Tags:IP Multimedia Subsystem, Junk Communications Identification, Junk Communications Filtering, Social Network Analysis, User Relationship Model
PDF Full Text Request
Related items