Method for detecting superlong signaling message based text code

A signaling message and message technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve problems such as inability to provide ultra-long malformed messages, network marginal security risks, and reduced network efficiency, and achieve malicious attacks. Significant, guaranteed uptime, protection against attack and sabotage

Inactive Publication Date: 2006-10-25
HUAWEI TECH CO LTD
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] Among them, the underlined part is the super-long part of this signaling. There is no doubt that this kind of super-long message signaling may cause the network efficiency to decrease and fail to work normally after entering the system, and the incoming signaling message can be effectivel...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting superlong signaling message based text code
  • Method for detecting superlong signaling message based text code
  • Method for detecting superlong signaling message based text code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] For any feature separator in the received text, check whether the character directly adjacent to it is a feature separator, and if it is a feature separator, then judge whether the two feature separators belong to the feature separator. Adjacency is not allowed in the constraint relationship table If it is, it means that the current text is detected as an overlong message; for any feature delimiter in the received text, check whether the distance between another feature delimiter with the closest interval exceeds the maximum specified in the feature distance table If it is, it means that the current text is detected as an overlong message.

[0057] In order to realize the rapid detection of the input signaling message, the method of the present invention has utilized a five-tuple (S1, F1, D, S2, F2) as data association, and this five-tuple can be figure 1 The result of the preprocessing of the input data packet 5 by the middle filter engine 1 is the basis for quickly ju...

Embodiment 2

[0065] Each quintuple (S1, F1, D, S2, F2) formed according to the input signaling message is detected as follows: if F1 is a feature separator and whether S1 and F1 satisfy the prohibition of connection in the feature separator constraint relationship table For example, if F2 is a feature separator and whether S2 and f2 meet the prohibition of connection in the feature separator constraint relationship table; whether the feature distance D satisfies the feature distance between S1 and S2 defined in the feature distance table. If any point satisfies the condition of an overlong message, the message is filtered out.

[0066] As mentioned above, the quintuple (S1, F1, D1, S2, F2) of any text segment has three detection points, and three points are detected at the same time during detection, if one point meets the condition of an ultra-long message, it is considered that the text segment contains an ultra-long message. Long messages can be filtered out. The above-mentioned detect...

Embodiment 3

[0068] Utilize the method of the present invention to the detection of superlong signaling message, can adopt the detection method that inter-row detection and intra-row detection combine, namely, such as figure 2 As shown, first judge whether the length of each line in the signaling message is within the normal range, as long as one line is not satisfied, the message will be filtered out; if each line is satisfied, a line distribution position table will be generated to guide the in-line detection, Determine whether the feature spacing between each feature separator in each line meets the requirements.

[0069] combine figure 2 , look at the whole detection process, start to input signaling message in frame 201, start interline detection in frame 202, judge the interline detection result in frame 203, if it belongs to super long message, then filter it in frame 204 Otherwise, in frame 205, generate row position distribution table, start detection in row; In frame 206, dete...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Based on text coding, the method for detecting message of ultra long signaling includes steps: (1) based on signaling protocol of text coding to construct function for identifying ultra long message; (2) using the identifying function to identify whether the received signaling message is a ultra long message or not; (3) if yes, filtering it out; otherwise, continuing other processes. The identifying function includes character interval table, which denotes allowed maximal interval between two character separators, and constraint relation table for character separators, which denotes whether two character separators are allowed to appear continuously and repeatedly. Being implemented by software or hardware, the method is in use for detecting ultra long message at network entry. Replacing or adjusting corresponding parameters in the said two tables, the method is suitable to all text typed signaling message. The method prevents attack and destruction from hijacker.

Description

technical field [0001] The invention relates to network information processing technology, in particular to a method for detecting super-long signaling messages based on text coding. Background technique [0002] With the increasing trend of network convergence, the next-generation network technology with IMS (abbreviation for IP Multimedia Subsystem, referring to IP Multimedia Subsystem) as the core will bring flexible and convenient network services to people. It has become the focus of the industry's attention. The security of the network border is the foundation of the entire network security. The next-generation network is a converged network that supports users' access anytime and anywhere, so border security is particularly important. Since the next-generation network appears relatively late, there is no special next-generation network intrusion detection tool, especially for the detection of signaling packets. In next-generation networks, signaling protocols such ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/26
Inventor 刘利锋郑志彬赵凯
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products