Hidden DoS attack method and system based on violent cracking

A violent, targeted user technology, used in transmission systems, security devices, electrical components, etc., to solve problems such as difficulty in obtaining user IMSIs

Inactive Publication Date: 2020-04-10
CHONGQING UNIV OF POSTS & TELECOMM
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the problem that it is difficult to obtain the user IMSI due to two-way authentication and encryption in the LTE network, the present invention proposes a method and system for concealing DoS attacks based on brute force cracking, such as figure 1 , the method includes:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hidden DoS attack method and system based on violent cracking
  • Hidden DoS attack method and system based on violent cracking
  • Hidden DoS attack method and system based on violent cracking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0035] The present invention proposes a concealed DoS attack method based on brute force cracking, such as figure 1 ,include:

[0036] S1. Obtain the paging frame index and temporary mobile user identification code of the target user;

[0037] S2. Find the country code of the mobile device and the network code of the mobile device according to the mobile phone number of the target user;

[0038] S3. Obtain the range of the target user's International Mobile ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of mobile communication safety, and relates to a hidden DoS attack method and system based on violent cracking. The method comprises the following steps: obtaining user information, and obtaining the international mobile subscriber recognition code range of a target user according to the user information; a malicious base station is used for constructing fake paging, and the international mobile subscriber recognition code range of a target user is narrowed; replacing the temporary mobile subscriber recognition number of the user, constructing forged paging, and determining an international mobile subscriber recognition number of the user; the malicious base station injects a forged paging message at the paging opportunity of the target user, wherein the forged paging message comprises an international mobile subscriber recognition number of the target user; after the target user is separated from the network, the target user re-initiates the ATTACH request; according to the novel hidden DoS attack disclosed by the invention, plaintext information propagated in an air interface is used, and encrypted information is not involved, so thatan existing LTE network cannot take effective measures to fight against the attack, and an operator and a user cannot perceive the attack.

Description

technical field [0001] The invention belongs to the technical field of mobile communication security, in particular to a method and system for concealing DoS attack based on brute force cracking. Background technique [0002] In recent years, the world has vigorously developed 4G, and the number of 4G users has reached an unprecedented scale. According to Gartner, by 2020, there will be 26 billion devices using LTE. Therefore, any impact on the security of the LTE system will have a serious impact on a large number of devices that rely on the LTE system. In this context, we are also facing more and more severe security issues. [0003] The International Mobile Subscriber Identity (IMSI) is a number assigned internationally to uniquely identify a mobile subscriber. IMSI is represented by 15 binary-coded decimal numbers. Among the 15 decimal numbers, the first 3 digits represent the mobile device country code (MCC for short), and the next 2 or 3 digits represent the mobile ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/12H04W68/00H04W12/122H04W12/126
CPCH04L63/1458H04W68/00H04W12/122
Inventor 谭钦红吴晓龙陈发堂王华华王丹郑焕平杨黎明
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products