Rubbish voice information monitoring method and device

A technology of voice information and monitoring device is applied in the field of network information security to achieve the effect of refining detection granularity

Inactive Publication Date: 2010-12-29
NEUSOFT CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In short, the existing technology lacks a suitable solution for detecting SPIT behavior, and a technical problem that needs to be solved urgently by those skilled in the art is: how to creatively provide a The Solution of Detecting Garbage Voice Message in VoIP Application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Rubbish voice information monitoring method and device
  • Rubbish voice information monitoring method and device
  • Rubbish voice information monitoring method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] Referring to Fig. 1, it shows a kind of garbage voice information detection method embodiment 1 of the present invention, specifically may include:

[0062] Step 101, obtaining SIP transaction signaling;

[0063] Step 102, using the SIP transaction finite state machine to monitor the state of the acquired SIP signaling, the state monitoring includes tracking the state transition of the SIP transaction;

[0064] Step 103, if the monitored SIP transaction undergoes a specific state transition during the state transition process, record the corresponding atomic information; the atomic information is related to spam voice information.

[0065] After the atomic information related to the spam voice information is recorded, it can be used for further data processing, and corresponding preventive measures can also be executed according to the detected atomic information. There are many preventive measures, such as forwarding, alarming or blocking, etc. This part is not the fo...

Embodiment 2

[0105] Referring to FIG. 6 , a second embodiment of a method for detecting spam voice information is shown, which may include:

[0106] Step 601, acquire SIP transaction signaling;

[0107] Step 602, using the SIP transaction finite state machine to monitor the state of the acquired SIP signaling, the state monitoring includes tracking the state transition of the SIP transaction;

[0108] Step 603, if the monitored SIP transaction has a specific state transition during the state transition process, then record the corresponding atomic information; the atomic information is related to spam voice information;

[0109] Step 604: Statistically analyze the detected atomic information according to a preset statistical model, and generate an alarm for confirmed spam voice information.

[0110] After the statistical results and alarm information are obtained, they can be used for further data processing, and corresponding preventive measures can also be executed according to the stat...

Embodiment 3

[0143] Referring to FIG. 7 , it shows Embodiment 3 of a method for detecting spam voice information, which may include:

[0144] Step 701, acquire SIP transaction signaling;

[0145] Step 702, using the SIP transaction finite state machine to monitor the state of the acquired SIP signaling, the state monitoring includes tracking the state transition of the SIP transaction;

[0146] Step 703, if the monitored SIP transaction has a specific state transition during the state transition process, then record the corresponding atomic information; the atomic information is related to spam voice information;

[0147] Step 704, perform statistical analysis on the detected atomic information according to the preset statistical model, and generate an alarm for the confirmed spam voice information;

[0148] Step 705, perform normalization processing on the detected atomic information and alarms obtained through statistical analysis, and obtain corresponding meta-alarms;

[0149] Step 70...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a trash speech information detecting method which comprises that: a SIP transaction signaling is obtained; a SIP transaction finite-state machine is used to have state monitoring on the obtained SIP signaling; the state monitoring comprises that: the state transition of the SIP transaction is tracked; if the monitored SIP transaction produces specific state transition in the process of state transition, corresponding atom information is recorded; the atom information is relevant to trash speech information. The invention deeply analyzes the SPIT behavior property; the behavior property is made to correspond to the property embodying on the type and flow of the SIP signaling, then corresponding state transition is identified from the SIP transaction finite-state machine; the property is detected through monitoring signaling flow, thereby obtaining the atom information SI (SPIT Information) relevant to SPIT. In addition, the invention provides a multilevel SPIT detecting proposal, can have detection and analysis in multilevel, thin detection granularity and can identify complicated multistep SPIT attack.

Description

technical field [0001] The invention relates to the technical field of network information security, in particular to a method and device for monitoring garbage voice information. Background technique [0002] Network convergence can make full use of resources, reduce operating costs, and enrich service styles, so that users can enjoy the same services regardless of whether they are in a fixed or mobile environment. From a global perspective, FMC (FixedMobile Convergence, fixed and mobile network integration) is an inevitable trend and has become a worldwide trend. Under such a general trend, the SIP protocol (Session Initiation Protocol, Session Initiation Protocol), which has the characteristics of simple implementation, good scalability, and strong ability to provide multimedia sessions, has become the mainstream of applications. Standardization organizations such as IETF and 3GPP regard the SIP protocol as the core application layer control protocol, and well-known man...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26H04L29/06H04M7/00H04M3/436
Inventor 赵宏闻英友何光宇陈书义赵博
Owner NEUSOFT CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products