Attack-aware mMTC slice resource allocation method and apparatus, and electronic device

A resource allocation device and attack-aware technology, applied in the field of device and electronic equipment, attack-aware mMTC slice resource allocation method, can solve the problems of single-point attack, low delay sensitivity, difficult to find and take defensive measures, etc. The effect of mitigating DDoS attacks and ensuring network security

Active Publication Date: 2021-04-16
国网甘肃省电力公司信息通信公司 +1
View PDF16 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the inventors found that the DDoS mitigation performance of the current solution is limited by specific machine learning algorithms, and most of them are implemented based on cloud computing platforms. This single defense method has risks such as low delay sensitivity and single-point attacks. , it is difficult to detect and take defensive measures in the early stage of DDoS attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack-aware mMTC slice resource allocation method and apparatus, and electronic device
  • Attack-aware mMTC slice resource allocation method and apparatus, and electronic device
  • Attack-aware mMTC slice resource allocation method and apparatus, and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0073] Such as figure 2 As shown, a group of IoT devices totaling 1,000 are randomly connected to the network through the base station, 300 of which are directly connected to the CO1 node for processing at RRU1, and 700 are directly connected to the CO2 node for processing at RRU4. , the access CO2 node and the access CO2 node belong to the same primary CO. Set the resource utilization thresholds of the access CO and the main CO to 80%, and set the waiting time period to 5s. When some of the 1,000 IoT devices are attacked by DDoS and become controlled zombie devices, the resource utilization rate of access to CO1 nodes becomes 50%, and the resource utilization rate of access to CO2 nodes becomes 90%. The resource utilization rate of the node exceeds the preset threshold. At this time, it is considered that there is a risk of a DDoS attack on the access CO2 node, and the service offloading plan for the access CO2 node is started. First, other available access CO2 nodes on the...

Embodiment 2

[0075] Such as image 3 As shown, a group of 1,000 IoT devices randomly access the network through the base station, 300 of which are directly connected to the CO2 node at RRU4, and 700 are directly connected to the CO4 node at RRU6. Set the resource utilization thresholds of the access CO and the primary CO to 80%. The access CO2 node and the access CO4 node belong to different primary COs, namely primary CO1 and primary CO2. Concentrate on the master CO1 with the lowest comprehensive transmission traffic consumption to implement request processing. Similarly, when it is attacked by DDoS, the resource utilization rate of the master CO1 becomes 90%, which exceeds the preset threshold. In the business offloading scheme, firstly, among other available main CO nodes on the convergence ring, the main CO2 node with the lowest resource utilization rate (its resource utilization rate is 20%) is selected to implement request processing.

[0076] In another case, if no available prim...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

One or more embodiments of the invention provide an attack-aware mMTC slice resource allocation method and apparatus, and an electronic device, an access ring composed of a group of access COs and a main CO and a convergence ring composed of a plurality of main COs and a core CO are constructed between an RRU and the core CO, and resource utilization rate thresholds of the access COs and the main COs are set; the method comprises the following steps: receiving a resource service request sent by an RRU, judging whether the RRU sending the resource service request belongs to the same main CO or not, and selecting a proper access CO or main CO to respond to the service request based on the judgment; searching an access CO with the lowest resource utilization rate on the access ring or a main CO belonging to the same access ring to respond to the resource service request, and carrying out service unloading; and if the main CO does not belong to the same main CO, calling other main COs with the lowest resource utilization rate on the convergence ring to respond to the resource service request to perform service unloading, thereby being beneficial to ensuring network security.

Description

technical field [0001] One or more embodiments of this specification relate to the technical field of resource service request response, and in particular to an attack-aware mMTC slice resource allocation method, device and electronic equipment. Background technique [0002] With the rapid development of 5G technology and the increasingly widespread application of the Internet of Things, massive machine type communication (mMTC) is one of the three typical application scenarios of 5G. The massive and diverse terminals in the 5G era will bring security risks to the 5G network. With the huge Quantified and ubiquitous smart terminals are connected to the Internet of Things. Once these terminals are invaded and used, they will become a new source of high-capacity DDoS attacks. [0003] When a DDoS attack (Distributed Denial of Service, Distributed Denial of Service) occurs, vulnerable IoT terminals are attacked and become zombies. Zombie devices access the network together with ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W4/70H04W28/16
CPCY02D30/70
Inventor 李亚杰张杰牛一凡赵永利张会彬刘超李文辉肖博侯玉婷包正睿王玉亭王克敏
Owner 国网甘肃省电力公司信息通信公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products