Abnormal traffic suppression method and abnormal traffic suppression device

An abnormal traffic and abnormal technology, applied in the computer field, can solve problems such as inhibiting VoLTE, avoid deletion and improve accuracy.

Active Publication Date: 2016-11-23
XINYANG BRANCH HENAN CO LTD OF CHINA MOBILE COMM CORP
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a method and device for suppressing abnormal traffic to solve the problem of how to accurately and effectively suppress abnormal sessions in VoLTE

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal traffic suppression method and abnormal traffic suppression device
  • Abnormal traffic suppression method and abnormal traffic suppression device
  • Abnormal traffic suppression method and abnormal traffic suppression device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0091] Such as figure 2 As shown, the first session data suppression flowchart provided by the embodiment of the present invention.

[0092] Step 201, respectively obtaining the first VoLTE signaling data in the S1-U interface of the serving gateway and the second VoLTE signaling data in the Mw interface of the proxy call session control function, and decoding the obtained VoLTE signaling data;

[0093] Step 202, calculating the bandwidth occupied by each session data in the first VoLTE signaling data;

[0094] Step 203, judge whether the bandwidth occupied by the Nth session data in the first VoLTE signaling data is greater than the bandwidth threshold of the Nth session data, if yes, then determine that the session data is the first session data, go to step 205; otherwise go to step 204;

[0095] Step 204, judging whether the call identifier callid of the Nth session data in the first VoLTE signaling data appears in the second VoLTE signaling data, if the call identifier ...

Embodiment 2

[0098] Further, after acquiring the first VoLTE signaling data and the second VoLTE signaling data, it is also possible to first determine whether the bandwidth occupied by the first VoLTE signaling data is greater than the bandwidth of the S1-U interface. If the bandwidth occupied by the first VoLTE signaling data If the bandwidth is greater than the S1-U interface bandwidth, then judge whether the bandwidth occupied by the Nth session data in the first VoLTE signaling data is greater than the preset threshold of the Nth session data bandwidth, if the first VoLTE signaling data occupies If the bandwidth is not greater than the bandwidth of the S1-U interface, it is directly judged whether the call identifier callid of the Nth session data in the first VoLTE signaling data appears in the second VoLTE signaling data. In this way, the recognition efficiency of the first session data can be improved. Specifically, see the following description for details.

[0099] Such as ima...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an abnormal traffic suppression method and an abnormal traffic suppression device. The method comprises the steps as follows: acquiring first VoLTE signaling data in an S1-U interface of a serving gateway and second VoLTE signaling data in an Mw interface of a proxy-call session control function; determining first session data according to the first VoLTE signaling data and the second VoLTE signaling data, wherein the first session data is data in the first VoLTE signaling data; and judging whether the historical abnormal session data contains the first session data, and if the historical abnormal session data contains the first session data, sending a bearer deletion request message to the serving gateway so the serving gateway deletes the bearer of the first session data according to the bearer deletion request message.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and device for suppressing abnormal traffic. Background technique [0002] VoLTE (Voice over LTE) is one of the LTE (Long Term Evolution, long-term evolution) voice solutions stipulated by 3GPP (3rd Generation Partnership Project), and the quality of voice services it provides is expected to reach that of traditional circuit domain The quality of the voice service. However, like the network world, VoLTE will also encounter various troubles, the most important of which is how to suppress abnormal VoLTE traffic. VoLTE abnormal traffic includes two types, one is the maliciously constructed data packet sent by the attacker to the P-CSCF (Proxy-Call Session Control Function) of VoLTE; the other is the large Normal SIP (SessionInitiation Protocol, Session Initiation Protocol) request for traffic. P-CSCF has security risks such as system resource exhaustion, memory leaks, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W28/02
CPCH04W28/0231
Inventor 刘遂江张秀成魏来孙丽君黄梅英苗晓巧曾小立张洪宇
Owner XINYANG BRANCH HENAN CO LTD OF CHINA MOBILE COMM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products