Network attack solution method and device, equipment and medium

A network attack and solution technology, applied in the field of network attack solutions, equipment and media, and devices, can solve problems such as attacks, denial of service, and mobile communication systems cannot serve, to avoid DOS attacks or DDOS attacks, and defend against DOS. Effects of an attack or DDOS attack

Pending Publication Date: 2021-07-13
TENCENT TECH (SHENZHEN) CO LTD
View PDF11 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the case of a high uplink peak rate, if the UE frequently sends DNS queries to the EASDF in a short period of time in a malicious manner, so that the EASDF frequently sends reports to the SMF and triggers multiple signaling messages on the control plane, which will form a problem in the mobile communication system. Signaling storms cause denial of service (Denial Of Service, DOS) attacks, causing the mobile communication system to fail to serve all normal UEs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack solution method and device, equipment and medium
  • Network attack solution method and device, equipment and medium
  • Network attack solution method and device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0039] It should be understood that "several" mentioned herein refers to one or more, and "multiple" refers to two or more. "And / or" describes the association relationship of associated objects, indicating that there may be three types of relationships, for example, A and / or B may indicate: A exists alone, A and B exist simultaneously, and B exists independently. The character " / " gener...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network attack solution method and device, equipment and a medium, and belongs to the field of mobile communication. The method comprises the following steps: limiting the use of a terminal on a target protocol data unit (PDU) session under the condition that the SMF identifies a network attack of the terminal, wherein the target PDU session carries a target message, and the target message is a message for triggering a network element of a core network to initiate the network attack to the SMF. According to the method and the device, the UE cannot send the target message with the network attack capability to the core network without limitation, so that the DOS attack initiated by the abnormal UE is defended, and a mobile communication system is ensured to provide services for more UE as much as possible.

Description

technical field [0001] The embodiments of the present application relate to the field of mobile communications, and in particular to a network attack solution, device, device and medium. Background technique [0002] In an edge computing scenario, a domain name system (DomainName System, DNS) query sent by a user equipment (User Equipment, UE) may be processed by an edge application server discovery function (Edge Application Server Discovery Function, EASDF). [0003] The session management function (Session Management Function, SMF) provides reporting (Reporting) rules and forwarding (Forwarding) rules to EASDF. The report rules provide the rules for EASDF to send reports to SMF, and the forwarding rules provide the rules for EASDF to forward messages. After the UE sends a DNS query to the EASDF, the EASDF will send a report to the SMF according to the reporting rules. [0004] In the case of a high uplink peak rate, if the UE frequently sends DNS queries to the EASDF in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1458H04W12/082H04W12/122H04W12/121
Inventor 熊春山
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products