Attack testing method, host server and control server

A host server and control server technology, applied in the field of communication applications, can solve problems such as core network business plane attack testing

Active Publication Date: 2021-02-23
DATANG MOBILE COMM EQUIP CO LTD
View PDF8 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide an attack test method, a host server and a master control server, so as to solve the problem of how to perform an attack test on the core network service plane

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack testing method, host server and control server
  • Attack testing method, host server and control server
  • Attack testing method, host server and control server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0086] Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present invention are shown in the drawings, it should be understood that the invention may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present invention and to fully convey the scope of the present invention to those skilled in the art.

[0087] The terms "first", "second" and the like in the specification and claims of the present application are used to distinguish similar objects, and are not necessarily used to describe a specific order or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the application described herein, for example, can be practiced in sequences other than those illustrate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an attack test method, a host server and a control server, and solves a problem of how to carry out an attack test on a core network service surface. The method comprises stepsthat when a distributed denial of service DDoS test is carried out, the first test control information is acquired, and the first test indication information is used for indicating to carry out an attack test; attack traffic is generated according to the first test control information; and the attack traffic is sent to a service plane network element. The method is advantaged in that the virtual host is controlled by the control server, so large-scale DDoS attacks can be safely and effectively simulated, and diffusion threats of backdoor programs and harm caused by botnets do not need to be considered.

Description

technical field [0001] The invention relates to the technical field of communication applications, in particular to an attack testing method, a host server and a control server. Background technique [0002] With the advent of the fifth-generation mobile communication technology (5th-Generation, 5G) commercialization, 5G network security issues are becoming more and more important; for its enhanced mobile broadband, low power consumption and large connection, low latency and high reliability In application scenarios, 5G not only has higher speed and lower latency, but also penetrates into various fields of the Internet of Everything, such as telemedicine, industrial control, smart transportation, etc., and cloud and mobile infrastructure are gradually Become a new platform for botnet activity. Therefore, network security has become particularly important; [0003] In order to test the network security performance, bandwidth, and load capacity of the 5G network infrastructu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1408H04L63/1458
Inventor 何瑞平张卫国
Owner DATANG MOBILE COMM EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products