Font Size: a A A

Policy Based VoIP Security Management System Design And Implementation

Posted on:2017-06-14Degree:MasterType:Thesis
Country:ChinaCandidate:B J HanFull Text:PDF
GTID:2348330518995527Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
VoIP(Voice over IP,VoIP)adopts IP technology to transmit voice data.Compared to the traditional telephone network,VoIP has advantages of easy implementation,easy management and multiple services(file transfer,instant message,video,fax and so on)bearing ability.Also because of these excellent features,VoIP is getting more and more attention of private networks,like army networks or networks in departments of high confidentiality.But VoIP faces security problems like SPIT,billing abuse,flooding attack,deny of service and so on.Though it makes VoIP more secure to adopt encryption algorithms,use enhanced authentication mechanisms and introduce intrusion protection systems or firewalls targeting at particular communication protocols,it can not fullfill the demands of private networks in feasibility,security and controllability.Therefore,a policy based VoIP security management system is designed in this paper.The main research work of the paper contains four aspects:(1)Studying and analysing the security problems existed in the public and enterprise VoIP networks,making investigations about the solutions and the overseas and domestic research status of the VoIP security management;(2)Analysizing the core idea of the policy based network management,making comparative analysis of the existing access control models to make both advantages and weaknesses of each model more clear and formulating the management schema for VoIP;(3)Proposing a policy based VoIP security management system.The system adopts the policy based network management and multi-dimension labels to enhance the access control of voice terminal,voice service and voice data under static and dynamic environment in private networks.To verify the feasibility of the proposed scheme,a prototype system is developed.Not only do the use case analysises are done but also function and efficiency tests are performed and the results show that the proposed scheme is applicable.
Keywords/Search Tags:VoIP, PBNM, Security Management, Policy, Label, Voice Communication
PDF Full Text Request
Related items