Abnormal traffic processing method and system based on combination of TR069 protocol and log analysis

A technology of abnormal traffic and processing method, applied in the field of abnormal traffic, can solve the problems of lack of timeliness and low accuracy of analysis and filtering

Pending Publication Date: 2022-04-12
CHINA TELECOM DIGITAL INTELLIGENCE TECH CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The technical problem to be solved by the present invention is to provide a method and system for dealing with abnormal traffic based on the TR069 protocol combined with log analysis, which solves the lack of timeliness in analysis and filtering when abnormal traffic occurs in the existing network. , flexibility, and complex problems with low accuracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal traffic processing method and system based on combination of TR069 protocol and log analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Embodiments of the present invention will be described in further detail below in conjunction with the accompanying drawings.

[0044] see figure 1 , the present invention is based on the TR069 protocol combined with log analysis method for dealing with abnormal traffic, including:

[0045] Step 1. The device verification module performs communication verification on the server and network device based on the TR069 protocol. If the communication verification is successful, enter step 2, specifically:

[0046] Manage and monitor network devices that support TR069 protocol based on TR069 protocol;

[0047] The program deployed by the network management server ACS in the TR069 protocol is actively executed to complete the communication authentication configuration operation for the CPE. If the communication authentication is successful, go to step 2.

[0048] In TR-069, the network management server is called ACS (Auto Configuration Server).

[0049] Step 2. The traffic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an abnormal traffic processing method and system based on a TR069 protocol in combination with log analysis, and the method comprises the steps: 1, carrying out the communication authentication of a server and network equipment based on the TR069 protocol, and entering a step 2 if the communication authentication is successful; step 2, monitoring CPE port traffic through an ACS, and when abnormal traffic occurs, positioning the abnormal traffic and shielding corresponding message traffic; and step 3, carrying out log analysis on the shielded message flow, judging whether the message flow is an abnormal message or not, if so, carrying out abnormal identification, otherwise, normally issuing the flow. According to the method, the complex problems of lack of timeliness and flexibility and low accuracy of analysis and filtering when abnormal traffic occurs in the existing networking are solved.

Description

technical field [0001] The invention belongs to the technical field of network abnormality analysis, and in particular relates to a method and system for dealing with abnormal traffic based on TR069 protocol combined with log analysis. Background technique [0002] With the development and application of digital networking technology, the number of equipment in operation on the network is gradually increasing, which is 10 to 100 times higher than that of ten years ago. However, it is still unable to meet the current super-large network, server, and application requirements for O&M monitoring. [0003] At the same time, software systems are becoming larger and more complex, often containing hundreds of services deployed on thousands or even hundreds of thousands of servers, and supporting a large number of concurrent users. A particular challenge faced by large software systems is exception diagnosis. That is, how to quickly diagnose problems when they occur, and how quickl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L67/133H04L41/0213H04L41/0631H04L43/028H04L43/0876H04L43/106H04L43/16
Inventor 钱文倩
Owner CHINA TELECOM DIGITAL INTELLIGENCE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products