Mobile communication inter-network honeypot system and method

A mobile communication network and honeypot technology, applied in transmission systems, electrical components, etc., can solve the problems that the signaling originator cannot receive the signaling response, the user's security is immediately damaged, and the trace protection method is implemented. Convenience, satisfying high reliability, and maintaining integrity

Active Publication Date: 2016-05-25
THE PLA INFORMATION ENG UNIV
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. Due to the need to intercept abnormal signaling, the protective equipment connected in series generally maintains the following figure 2 In the two sections of signaling links shown, in this way, once the protective equipment fails, the signaling access equipment will enter the straight-through state, and the two sections of signaling links it maintains become physically direct. For a link connecting STP devices at both ends, the signa

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile communication inter-network honeypot system and method
  • Mobile communication inter-network honeypot system and method
  • Mobile communication inter-network honeypot system and method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0026] Example 1: Combining figure 1 , a kind of mobile communication network honeypot method, this method comprises the following steps:

[0027] Step 1: The underlying access device receives the signaling message and forwards it to the monitoring server; Step 2: The monitoring server detects the abnormality of the signaling; Step 3: The honeypot device processes the abnormal information.

[0028] The underlying access device receives the signaling message and forwards it to the monitoring server. The underlying device forwards the signaling that needs to be protected to the monitoring server according to the configuration; the signaling that does not need protection is directly forwarded to the STP of the internal network. The message is forwarded according to the destination address.

[0029] The monitoring server performs anomaly detection on the signaling, mainly for the received signaling message, the monitoring server selects an anomaly detection algorithm by looking ...

Example Embodiment

[0035] Example 2: Combining figure 1 , image 3 , a honeypot method between mobile communication networks, specifically comprising the following steps:

[0036] Step 1. The underlying access device receives the signaling message and forwards it to the monitoring server; the underlying access device forwards the signaling message to be detected to the server according to the configuration policy, and forwards other signaling messages directly to the destination device; the monitoring server returns The message is forwarded directly to the destination device.

[0037] Step 2: The monitoring server detects the abnormality of the signaling; in order to ensure the safety of the protected equipment, the monitoring server has the planning information of the protective network, and can adopt different detection methods according to the destination device type and message type of the signaling. The legal and normal signaling is not processed, and is directly forwarded through the un...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mobile communication inter-network honeypot system and method. According to the method and the device, various external security threat problems faced by mobile communication 2G and 3G signaling networks can be solved. A bottom layer access device is deployed at the front part of the STP at the access of a network to be protected; an access mode of noninductive tandem connection is adopted; the device forwards a signaling to be protected to a monitoring server; the monitoring server carries out abnormity detection to the signaling; a normal message is directly returned to the bottom layer access device for forwarding; with respect to the abnormal signaling, the destination address is modified; the abnormal signaling is forwarded to a honeypot device for processing at the back end of the network through the bottom layer device; and the honeypot device sends a corresponding response message according to a configured processing rule. By means of the technical solution of the invention, security detection is carried out to the signaling message entering the internal network; the abnormal signaling message is intercepted and responded; the malicious interference behaviors of the external network are actively defended; the noninductive tandem connection mode is adopted in the device; and the normal communication of the network cannot be influenced under the downtime condition of the device.

Description

technical field [0001] The invention belongs to the technical field of mobile communication security, and in particular relates to a mobile communication inter-network honeypot system and method. Background technique [0002] The global mobile communication network is an interconnected network. my country's mobile operators have signed international roaming agreements with hundreds of foreign mobile operators. According to the roaming agreement, foreign mobile operators can access some user information of the other party through the international signaling network, but the security mechanism of the 2G / 3G mobile signaling network is not perfect, and the mobile network and users are faced with network element equipment interference and user information leakage. threaten. In addition, there are various private mobile communication networks in China, generally with proprietary core network element equipment, combined with public mobile communication networks to provide services...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0227H04L63/10H04L63/1466H04L63/1491
Inventor 汤红波赵宇朱可云赵星王晓雷俞定玖柏溢王领伟杨梅樾
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products