Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Network security protection method based on XDR telephone bill data

A network security and bill data technology, applied in the Internet field, can solve the problems of network threats, user perception decline, complex and changeable user behavior, etc., to achieve the effect of purifying network bad behavior, identifying a wide range, and green and safe network environment

Inactive Publication Date: 2020-05-01
SHANGHAI TANGSHENG INFORMATION TECH
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1) Abnormal behaviors are increasingly common: battery attacks, port scans, signaling attacks, resource abuse
[0006] 2) Increased security threats: For example, network security behaviors have increased by 214% since the launch of LTE compared with 2G and 3G eras
[0007] 3) Bringing risks to the network: increased complaints, brand damage; network threats; user perception decline; network performance degradation; wireless resource shortage
[0008] 4) The frequency of occurrence is high: user behavior is complex and changeable, and wireless resources are frequently abused, which requires timely monitoring and discovery; user abnormal behavior events occur frequently, and potential hidden dangers need to be discovered in time by analyzing user online behavior
[0010] For the increasingly serious impact, the prevention measures adopted are relatively poor, such as: no means of discovery, lack of means of discovering network status events, lack of monitoring means for abnormal business behaviors, and lack of end-to-end demarcation and positioning of abnormal network behaviors Tool, uninformed customization can only rely on complaints to find, poor user perception, and can not eradicate the problem
It cannot be completely suppressed. The EPC control strategy can only deal with some network status behaviors, and there is no effective suppression method for battery attacks and signaling attacks.
The response speed is slow, and the period from the discovery of the cause of the problem to the implementation of the suppression measures through manual analysis is too long

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security protection method based on XDR telephone bill data
  • Network security protection method based on XDR telephone bill data
  • Network security protection method based on XDR telephone bill data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] This embodiment is a network security protection method based on XDR bill data. The method identifies abnormal user behaviors according to indicators of the XDR bill data, thereby performing network security protection. Each step is described in detail below.

[0050] 1. Indicators of XDR bill data

[0051] like figure 1 As shown, the indicators of the XDR bill data include the number of signaling connections, air interface time, traffic, destination or source IP, destination or source port number, number of data packets and / or application service type.

[0052] 2. Abnormal user behavior

[0053] Abnormal user behaviors include threatening behaviors of the network to users, threatening behaviors of users to the Internet, and / or abusive behaviors of users to wireless resources.

[0054] 1) Threat behaviors of the network to users include single-source battery attack, distributed battery attack, single-source mobile phone flooding and distributed mobile phone flooding;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network security protection method based on XDR telephone bill data. The method comprises that: abnormal behaviors of users are identified according to XDR telephone bill data, network security protection is performed then, and identification for the abnormal behaviors of the users Specifically comprises, according to the indexes of the XDR telephone bill data, identifying the abnormal behaviors of the users, wherein the indexes comprise signaling connection times, air interface time, flow, destination or source IP, destination or source port number, data packet number and / or application service type, and the user abnormal behaviors comprise threat behaviors of a network to a user, threat behaviors of the user to the Internet and abuse behaviors of the user to wireless resources. Compared with the prior art, the abnormal behaviors of the wireless user network are effectively monitored, then network security protection measures are taken, bad behaviors of thenetwork are purified, a green and safe network environment is achieved, and the method has the advantages of being wide in recognition range, effective and the like.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a network security protection method based on XDR bill data. Background technique [0002] As the application services on wireless mobile user terminals become more and more colorful, the way users use services has also undergone tremendous changes, from basic voice calls and text messages to integrated video, audio, pictures, text, Internet The leader of multi-functional media that integrates interoperability, along with this transformation process, the behavior that threatens users and network security has also changed, from viruses and Trojan horses that originally targeted end users to Internet devices, regional user awareness, For malicious attacks or threats to link elements such as network resources and service provisioning equipment, the corresponding preventive measures have also changed from patching vulnerabilities in the original terminal operating system to sens...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425H04L63/1433
Inventor 褚恩起
Owner SHANGHAI TANGSHENG INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products