A method and device for processing abnormal nodes

A normal node, node technology, applied in the computer field, can solve the problem of no flood attack solution.

Active Publication Date: 2022-02-18
ZTE CORP
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for the above new wireless networks, there is no effective solution to deal with flood attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for processing abnormal nodes
  • A method and device for processing abnormal nodes
  • A method and device for processing abnormal nodes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0092] figure 1 A schematic flowchart of a processing method for a node to identify an entity-side abnormal node according to an embodiment of the present invention, such as figure 1 As shown, the processing method of the node identifying the abnormal node on the entity side according to the embodiment of the present invention includes the following steps:

[0093] Step 101: Acquire node data transmitted by an access network element;

[0094] The node data includes at least two kinds of data, one is control plane information, such as resource request messages, and the other is data plane information, such as service messages sent by nodes.

[0095] Step 102: perform feature statistics on the node data to obtain node feature data;

[0096] Wherein, according to the preconfigured node characteristic parameters, statistics are performed on the control plane information and data plane information when the node interacts with the access network element, and the control plane char...

Embodiment 2

[0153] image 3 It is a schematic diagram of the composition structure of the node identification entity according to the embodiment of the present invention, such as image 3 As shown, the composition of the node identification entity in the embodiment of the present invention includes: a receiving module 301, a statistics module 302, a determining module 303, and a sending module 304; wherein,

[0154] A receiving module 301, configured to acquire node data transmitted by an access network element;

[0155] A statistics module 302, configured to perform feature statistics on the node data to obtain node feature data;

[0156] A determination module 303, configured to determine an abnormal node based on the node characteristic data, and generate an identification result including the abnormal node;

[0157] The sending module 304 sends the identification result to the access network element.

[0158] Wherein, the above-mentioned node data at least includes the control plan...

Embodiment 3

[0203] Figure 5 A schematic structural diagram of a processing system for an abnormal node according to an embodiment of the present invention, as shown in Figure 5 As shown, the structure of the abnormal node processing system according to the embodiment of the present invention includes: a node 501, a base station 502, and a node identification entity 503; wherein,

[0204] The node 501 forms an inter-vehicle network with other vehicles in the Internet of Vehicles system, and the inter-vehicle network is connected to the Internet through the base station 502, and the node 501 and the base station 502 are interconnected based on a unified wireless communication protocol. The node identification entity 503 can be set at the edge of the access network in the Internet of Vehicles, so as to reduce the end-to-end delay of mobile service delivery and improve user experience.

[0205]When the node 501 has services to transmit, the node 501 sends a resource request signaling to th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a processing method for an abnormal node, comprising: acquiring node data transmitted by an access network element; performing characteristic statistics on the node data to obtain node characteristic data; determining the abnormal node based on the node characteristic data, and Generate an identification result including at least the abnormal node; and send the identification result to the access network element. The invention also discloses a node identification entity, an access network element and a computer-readable storage medium.

Description

technical field [0001] The present invention relates to computer technology, and in particular, to a method, device and computer-readable storage medium for processing abnormal nodes. Background technique [0002] Typical security problems Denial-of-Service Attack (DoS, Denial-of-Service Attack) is a network attack method commonly used by hackers now. Its purpose is to exhaust the network or system resources of the target machine, temporarily interrupt or stop services, and cause other normal operations. User cannot access. The attack forms can be roughly divided into two types, one is bandwidth consumption type and the other is resource consumption type. Both of these attacks take up a lot of network and system resources through a large number of legitimate or forged requests to paralyze the network. and the purpose of the system. Attackers can be devices directly controlled by hackers or other devices compromised by hackers using malware, and their targets are mostly imp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1416H04L63/1441H04L63/1458
Inventor 李楠李洋李靓侯蓉晖韩志强孙波位宁
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products