Diameter flooding attack detection device and method

A flood attack and detection device technology, applied in the field of communication security, can solve problems such as denial of service, occupation of service and network resources, and decline in service capabilities of related network elements, so as to achieve the effect of improving security

Active Publication Date: 2018-12-18
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, it is more vulnerable to various forms of network attacks, especially flooding attacks using the Diameter protocol
Diameter flooding attack aims to use a large number of Diameter signalin

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Diameter flooding attack detection device and method
  • Diameter flooding attack detection device and method
  • Diameter flooding attack detection device and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the purpose, technical solution and advantages of the present invention more clear and understandable, the present invention will be further described in detail below in conjunction with the accompanying drawings and technical solutions.

[0040] A Diameter message consists of two parts: a header and a message body. The message header is located at the front end of the message, including the protocol version, message length, command code, application ID, hop-by-hop identifier and end-to-end identifier, see the attached Figure 8 As shown; the message body consists of multiple AVPs, and each AVP is composed of AVP Code, AVP Flag, AVP Length, Vendor-ID and Data, see the attached Figure 8 shown. Since the IMS network is based on an all-IP core network, it has the inherent vulnerability of an IP network. Therefore, it is more vulnerable to various forms of network attacks, especially flooding attacks using the Diameter protocol. Diameter flooding attack...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of communication security, in particular to a Diameter flooding attack detection device and method, The device comprises a parameter extracting module, which is used for extracting the signaling message parameters flowing through the signaling, and matching the state machine according to the parameters, wherein the signaling message parameters include the session identification parameters, the source host parameters and the user name parameters, and setting and initializing each signaling message parameter counter, a signaling flow analysis module which is used for early warning analysis of the signaling message parameters in the signaling according to the state machine matching condition and using the counter count value, a detection alarm module which is used for flooding attack alarm according to the warning analysis result of the signaling message parameters. The invention is applicable to an IMS network in a mobile communication network, security detection and early warning of Diameter flooding attacks are implemented, Automatic identification and detection of Diameter flooding attacks are performed based on IMS signaling flows, detection and early warning of Diameter flooding attacks are detected and early warned from signaling flows, thus improving IMS network security and having important guiding significance for the securityof communication networks.

Description

technical field [0001] The invention belongs to the technical field of communication security, and in particular relates to a Diameter flood attack detection device and method, which can be applied to an IMS network in a mobile communication network, and realize safety detection and early warning of Diameter flood attacks. Background technique [0002] IMS (IP Multimedia Subsystem) is a network architecture that provides voice and multimedia services based on IP networks. IMS can realize the integration of fixed user services, mobile user services and Internet services, and multimedia services such as voice, data, and video. It is the core technology of the next-generation network. [0003] In the IMS network architecture, the HSS (Home Subscriber Server, Home Subscriber Server) is an important data center for users in the network, and is responsible for authentication and authentication of all users. The Diameter protocol is the main protocol for interaction between the HS...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24H04L12/26
CPCH04L41/0631H04L43/16H04L63/1416H04L65/1016
Inventor 刘彩霞王凯刘树新吉立新李星冯莉葛东东陈云杰
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products