Abnormal node processing method and equipment

A processing method and normal node technology, applied in the computer field, can solve problems such as no solution to flood attacks

Active Publication Date: 2019-09-03
ZTE CORP
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for the above new wireless networks, there is no effective solution to deal with flood attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal node processing method and equipment
  • Abnormal node processing method and equipment
  • Abnormal node processing method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0092] figure 1 It is a schematic flowchart of a processing method for node identification entity-side abnormal nodes according to an embodiment of the present invention, as shown in figure 1 As shown, the embodiment of the present invention node identification entity side abnormal node processing method includes the following steps:

[0093] Step 101: Obtain node data transmitted by the access network element;

[0094] Wherein, the node data includes at least two kinds of data, one is control plane information, such as a resource request message, and the other is data plane information, such as a service message sent by a node.

[0095] Step 102: Perform feature statistics on the node data to obtain node feature data;

[0096] Wherein, according to the pre-configured node characteristic parameters, the control plane information and the data plane information when the node interacts with the access network element are counted, and the control plane characteristic information...

Embodiment 2

[0153] image 3 It is a schematic diagram of the composition structure of the node identification entity in the embodiment of the present invention, such as image 3 As shown, the composition of the node identification entity in the embodiment of the present invention includes: a receiving module 301, a statistics module 302, a determination module 303, and a sending module 304; wherein,

[0154] A receiving module 301, configured to obtain node data transmitted by an access network element;

[0155] A statistics module 302, configured to perform feature statistics on the node data to obtain node feature data;

[0156] A determining module 303, configured to determine an abnormal node based on the node characteristic data, and generate an identification result including the abnormal node;

[0157] The sending module 304 is configured to send the recognition result to the access network element.

[0158] Wherein, the above node data includes at least control plane informatio...

Embodiment 3

[0203] Figure 5 It is a schematic structural diagram of the processing system of the abnormal node in the embodiment of the present invention, such as Figure 5 As shown, the structure of the abnormal node processing system in the embodiment of the present invention includes: a node 501, a base station 502, and a node identification entity 503; wherein,

[0204] The node 501 forms an inter-vehicle network with other vehicles in the Internet of Vehicles system, and the inter-vehicle network is connected to the Internet through the base station 502, and the node 501 and the base station 502 are interconnected based on a unified wireless communication protocol, so The above-mentioned node identification entity 503 can be set at the edge of the access network in the Internet of Vehicles, so as to reduce the end-to-end delay of mobile service delivery and improve user experience.

[0205]When node 501 has business to transmit, node 501 sends resource request signaling to base sta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an abnormal node processing method. The method comprises the following steps: obtaining node data transmitted by an access network element; performing feature statistics on thenode data to obtain node feature data; determining an abnormal node based on the node feature data, and generating an identification result at least comprising the abnormal node; and sending the identification result to the access network element. The invention also discloses a node identification entity, an access network element and a computer readable storage medium.

Description

technical field [0001] The present invention relates to computer technology, in particular to a processing method, equipment and computer-readable storage medium for abnormal nodes. Background technique [0002] Typical security issues Denial-of-Service Attack (DoS, Denial-of-Service Attack) is a network attack method commonly used by hackers. Its purpose is to exhaust the network or system resources of the target machine, temporarily interrupt or stop the service, and cause other normal Users cannot access. Its attack forms can be roughly divided into two types, one is bandwidth consumption, and the other is resource consumption. Both of these attacks occupy a large amount of network and system resources through a large number of legal or forged requests to paralyze the network. and system purpose. Attackers can be devices directly controlled by hackers, or other devices compromised by hackers using malware. Most of the attack targets are some important services and well-...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1441H04L63/1458
Inventor 李楠李洋李靓侯蓉晖韩志强孙波位宁
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products