Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for locating the attack source of multimedia subsystem network, system and anti-attack system

A multimedia subsystem and network attack technology, applied in the field of communication, can solve the problems of being unable to eliminate the attack from the root cause, and unable to locate the physical location of the user by IP address, so as to achieve the effect of solving network attack

Inactive Publication Date: 2007-08-08
HUAWEI TECH CO LTD
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to overcome the shortcomings in the prior art that the physical location of the user cannot be located by the IP address, thereby preventing the occurrence of the attack from the root cause, the embodiment of the present invention proposes a method, device and attack defense system for locating the source of an IMS network attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for locating the attack source of multimedia subsystem network, system and anti-attack system
  • Method for locating the attack source of multimedia subsystem network, system and anti-attack system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] Referring to FIG. 1 , the embodiment of the present invention proposes a method for locating the source of an attack in an IMS network. Implement the E4 interface on the anti-attack device, and realize the physical location of the attacker through the interaction between the anti-attack device and the CLF. The method is as follows:

[0028] Step 101: the anti-attack device starts the attack detection function, if the anti-attack device detects an attack, obtains the source IP address of the attacker through the source IP address of the attack message, and records the source IP address of the attacker;

[0029] Step 102: the anti-attack device sends a query request to the CLF through the E4 interface, that is, constructs a query request message according to the requirements of the ETSI ES 282 035 standard, and the content of the request includes at least the attacker's source IP address information recorded in step 101;

[0030] Step 103: After the CLF receives the quer...

Embodiment 2

[0036] Referring to FIG. 2 , an embodiment of the present invention provides a system for locating the source of an IMS network attack. The system includes a query module 201 , a response module 202 , and a location module 203 . The output signal of the query module 201 is input to the response module 202 , and the output signal of the response module 202 is input to the positioning module 203 .

[0037] The query module 201 is configured to send a query request to the CLF when the attack prevention device detects that an attack occurs, and the content of the request includes at least source IP address information of the attacker.

[0038] The response module 202 is used for searching the address information corresponding to the source IP address information of the attacker in the database after the CLF receives the query request sent by the query module 201, and sending a response message to the attack defense device, which includes the above address information.

[0039] The ...

Embodiment 3

[0048] Referring to FIG. 3 , the present embodiment provides an attack prevention system, the system includes an attack prevention device and a CLF, the attack prevention device includes a query module 201 and a positioning module 203, and the CLF includes a response module 202;

[0049] The query module 201 is configured to send a query request to the CLF when the attack prevention device detects that an attack occurs, and the content of the request includes at least source IP address information of the attacker.

[0050] The response module 202 is used to search the database for the address information corresponding to the source IP address information of the attacker when the CLF receives the query request sent by the query module 201, and send a response message to the anti-attack device, the response message includes above address information.

[0051] The response module may specifically be a physical address response module or a logical address response module.

[0052...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides one method, device and anti-attack system of one position IMS network attack source, which comprises the following steps: the anti-attack device tests attacks and sends require to CLF with require content composed of attacker source IP address information, CLF attacker source IP address information and sends the response information to the attack device; anti-attack device gets address information and positions attacker physical position.

Description

technical field [0001] The invention relates to the communication field, in particular to a method, device and attack defense system for locating an IMS (IP Multimedia System, IP Multimedia Subsystem) network attack source. Background technique [0002] With the popularity of the Internet, IP technology has been more and more widely used. In the field of wireless communication, 3G, as the expansion of the Internet in the wireless field, has received more and more attention. The 3G standard maker 3GPP (3rd Generation Partnership Project, 3rd Generation Partnership Project) proposed the concept of IMS in Release 5, and officially determined IP as the bearer network of the 3G future core network. On this basis, ETSI (European Telecommunications Standards Institute, European Telecommunications Standards Institute) and other organizations have proposed the concept of FMC (Fixed Mobile Convergence, fixed and mobile convergence), which unifies the fixed and mobile core networks on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04Q7/38H04L9/00
CPCH04L63/1433H04L63/1408
Inventor 张瑞
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products