Network attack detection control method and device, base station and computer storage medium

A detection control, network attack technology, applied in the field of communication, can solve the problems of increasing terminal service delay, terminal scheduling delay, unable to filter, etc., to achieve the effect of shortening service delay, increasing access probability, and improving network quality

Pending Publication Date: 2021-11-26
ZTE CORP
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The NPRACH detection algorithm in the related art can only filter out the external interference noise that does not have specific rules, and it is basically impossible to filter out this kind of external interference
In the end, real terminal scheduling delays or even inability to access for a long time will increase the service delay of the terminal, and also greatly waste the battery power of the real terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack detection control method and device, base station and computer storage medium
  • Network attack detection control method and device, base station and computer storage medium
  • Network attack detection control method and device, base station and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] For a real terminal in an idle state, when there is uplink data to be sent or a paging message is received, a random access request will be initiated. However, due to network attacks initiated by malicious terminals, a large number of uplink and downlink air interface resources are occupied, resulting in a waste of channel resources and an increase in the probability of base station NPRACH false detection, exacerbating the shortage of air interface resources. The real NPRACH false detection is caused by the noise of the wireless environment, the interference of the business on the NPUSCH of the local cell on the NPRACH on the adjacent subcarrier, the business interference of the adjacent cell, and the interference of the same frequency network, all of which will interfere with the NPRACH and cause NPRACH of false positives. However, these interferences are all occasional, and are significantly different from this intentional attack in terms of frequency of occurrence. ...

Embodiment 2

[0059] In order to facilitate understanding, the embodiment of the present invention uses a more specific example to illustrate the network attack detection and control method, as shown in image 3 As shown, the network attack detection and control method includes:

[0060] S301: When the access performance parameter value of the access network is less than a preset threshold value, determine that the access network is abnormal.

[0061] In the embodiment of the present invention, when the base station compares the number of times of NPRACH access with the number of times of actual access, the base station self-inspection system finds that the proportion of real access is less than a certain threshold value, such as when the proportion of real access is lower than 40 % of the threshold value, a rough judgment may be an access attack initiated by a malicious terminal, and it is determined that the access network is abnormal.

[0062] S302: Obtain location information of each t...

Embodiment 3

[0074] The embodiment of the present invention also provides a network attack detection and control device, which is used to implement the network attack detection and control method in the above-mentioned embodiments, such as Figure 4 As shown, the device for network attack detection and control includes: an acquisition module 401 , a joint decision condition module 402 , and a detection control module 403 .

[0075] An acquisition module 401, configured to acquire location information and real-time characteristic parameters of each terminal that initiates an access request;

[0076] The joint decision condition module 402 is used to determine the number of matching items for each terminal that does not meet the joint decision condition corresponding to the preset joint probability density according to the preset joint probability density jointly formed by the real feature parameters and the real-time feature parameters;

[0077] The detection control module 403 is configure...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network attack detection control method and device, a base station and a computer storage medium, and the method comprises the steps: obtaining the position information and real-time feature parameters of each terminal which initiates an access request when an access network is abnormal; according to a preset joint probability density formed jointly by real feature parameters and the real-time feature parameters, determining the number of matching items of each terminal which does not conform to a joint judgment condition corresponding to the preset joint probability density; detecting each terminal according to the number of matching items and the position information, and controlling an access request of each terminal according to a detection result. In some implementation processes, the real-time feature parameters of the terminal are measured according to the positions of the terminals and the terminals are detected in combination with the joint probability density of a base station, so that whether the terminal is a malicious terminal or not is intelligently determined, and the access request of the terminal is controlled. According to the invention, malicious attacks can be determined, and the access probability of a real terminal is improved by controlling the access request, so that the service time delay is shortened, and the network quality is improved.

Description

technical field [0001] The present invention relates to the communication field, specifically, but not limited to, a network attack detection and control method, device, base station, and computer storage medium. Background technique [0002] Narrow Band Internet of Things (NB-IoT) is a cellular-based narrowband Internet of Things technology that supports cellular data connections of low-power devices in wide area networks, also known as low-power wide area networks (LPWAN). The application of NB-IoT technology in the Internet of Things is becoming more and more extensive. Due to the large number of end users and various services, it faces many network security problems. [0003] The real NB-IoT terminal resides in a suitable cell through the cell search process according to the frequency band and working mode it supports. When the terminal needs to send uplink data, it will initiate a random access process to obtain an uplink authorization. According to relevant agreements...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425H04L9/40H04L63/1408
Inventor 葛冉浩吴风云
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products