Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and system blocking charging attack

A billing overflow and mobile terminal technology, applied in the field of communication, can solve the problems that firewalls cannot stop and billing overflow attacks cannot be solved, and achieve the effect of simple and feasible operation

Inactive Publication Date: 2009-02-11
HUAWEI DIGITAL TECH (CHENGDU) CO LTD
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] In the process of realizing the present invention, the inventor finds that at least the following problems exist in the prior art: an attacker can use a normal MS device, and after careful design, establish a session on the firewall and deactivate it, and continuously send messages from the PDN host Sending traffic to the firewall keeps the MS session record of the firewall in an active state. Once the IP used by the attacker MS is used by a new user, the firewall will forward data to the new user based on this session, and the new user will charge for the forwarded data. attack will succeed
Similarly, the billing overflow attack initiated from the MS side can also be carried out in the above-mentioned manner, and the firewall cannot stop it, so the prior art cannot solve the billing overflow attack problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system blocking charging attack
  • Method and system blocking charging attack
  • Method and system blocking charging attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] Such as figure 1 As shown, it is embodiment one of the present invention's method for preventing billing overflow attack, including:

[0057] 101. Perform status monitoring on the mobile terminal, and obtain identification information of the mobile terminal;

[0058] The status monitoring of the mobile terminal specifically refers to unpacking and checking the past GTP messages; for the messages that pass the security check, a mobile terminal status monitoring mechanism is established according to the status mechanism stipulated in the GTP protocol. In order to monitor the state of the mobile terminal; the session information of the mobile terminal is usually displayed as a GTP message, so obtaining the session information of the mobile terminal can be obtained by directly intercepting the GTP message or intercepting the GTP message sent by the GSN.

[0059] Wherein, the state monitoring of the mobile terminal is performed in the GTP protocol domain, that is, it can be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The inventive embodiment discloses a method for preventing charging overflow attack. The method comprises the following steps: acquiring the identification information of a mobile station; transmitting the identification information of the mobile station to an entity for preventing the attack; and transmitting a deactivation action message to the entity after monitoring the deactivation action of the mobile station, wherein the deactivation action message is used for informing the entity of setting the session table corresponding to the identification information of the mobile station to invalid. The invention also discloses a system for preventing charging overflow. The method and the system can prevent charging overflow attack under the condition of less system change.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a method and system for preventing charging attacks. Background technique [0002] GPRS (General Packet Radio Service, General Wireless Packet Service) is used to transmit packet data in the traditional mobile network GSM (Global System for Mobile communication, Global System for Mobile Communications), for which a series of functions have been added on the basis of the original GSM network Entities, mainly including PCU (Packet Control Unit, packet control unit), GSN (GPRS Supporting Node, GPRS support node), CG (Charging Gateway, charging gateway) and other network elements, and upgrade the network entities of the GSM network to support Group business. GSN includes SGSN (Service GPRSSupport Node, service GPRS support node) and GGSN (Gateway GPRS Support Node, gateway GPRS support node). The PCU of the GPRS network in the 3G standard is integrated on the access network s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L12/56H04L29/06H04L29/08H04Q7/22H04L12/743
Inventor 贺书琦
Owner HUAWEI DIGITAL TECH (CHENGDU) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products