Solution method and device for denial of service attack, equipment and medium

A technology for denial of service attacks and solutions, applied in the field of solutions, devices, equipment and media for denial of service attacks, can solve problems such as attacks, mobile communication system inability to serve, denial of service, etc., to achieve the effect of defending DOS attacks

Pending Publication Date: 2021-07-13
TENCENT TECH (SHENZHEN) CO LTD
View PDF9 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the case of a high uplink peak rate, if the UE uses a malicious method to frequently send DNS queries to the EASDF in a short period of time, so that the EASDF frequently sends reports to the SMF and triggers multiple subsequent signaling messages of the control plane, a mobile communication system will be formed. The signaling storm caused by denial of service (Denial Of Service, DOS) attack, causing the mobile communication system to fail to serve all normal UEs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Solution method and device for denial of service attack, equipment and medium
  • Solution method and device for denial of service attack, equipment and medium
  • Solution method and device for denial of service attack, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0040] It should be understood that "several" mentioned herein refers to one or more, and "multiple" refers to two or more. "And / or" describes the association relationship of associated objects, indicating that there may be three types of relationships, for example, A and / or B may indicate: A exists alone, A and B exist simultaneously, and B exists independently. The character " / " gener...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a solution method and device for denial of service attack, equipment and a medium, and belongs to the field of mobile communication. The method comprises the steps: an SMF sends a PDR and a QER to a UPF, the PDR being used for identifying a target data packet sent by a terminal, and the QER being used for limiting the sending of the target data packet, wherein the target data packet is a data packet which triggers a target core network element to initiate the denial of service attack to the SMF. According to the method and the device, the UPF can identify the target data packet and limit the sending of the target data packet, so that the DOS attack or DDOS attack initiated by the abnormal UE is defended, and a mobile communication system is ensured to provide services for more UE as far as possible.

Description

technical field [0001] The embodiments of the present application relate to the field of mobile communications, and in particular to a solution to a denial of service attack, a device, a device, and a medium. Background technique [0002] In an edge computing scenario, a domain name system (DomainName System, DNS) query sent by a user equipment (User Equipment, UE) may be processed by an edge application server discovery function (Edge Application Server Discovery Function, EASDF). [0003] The session management function (Session Management Function, SMF) provides reporting (Reporting) rules and forwarding (Forwarding) rules to EASDF. The report rules provide the rules for EASDF to send reports to SMF, and the forwarding rules provide the rules for EASDF to forward messages. After the UE sends a DNS query to the EASDF, the EASDF will send a report to the SMF according to the reporting rules. [0004] In the case of a high uplink peak rate, if the UE uses a malicious metho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1458H04W12/12H04L63/1425
Inventor 熊春山
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products