Mobile network honeypot system for 5G independent networking

A mobile network and networking technology, applied in transmission systems, electrical components, etc., can solve problems such as penetration attacks and exploit attacks, signaling attacks, network security attacks, etc., and achieve the effect of reducing the risk of attacks

Pending Publication Date: 2021-07-13
EVERSEC BEIJING TECH
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The security of the 5G core network mainly involves issues such as signaling attacks caused by mobile network-oriented edge application connections. At the same time, the virtualization of network elements in the 5G SA core network, as IT equipment, can be accessed, which is easy to cause penetration attacks and exploit attacks, so the network faces various risks of security attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile network honeypot system for 5G independent networking
  • Mobile network honeypot system for 5G independent networking
  • Mobile network honeypot system for 5G independent networking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] figure 1 It is a schematic structural diagram of a 5G independent networking mobile network honeypot system provided by Embodiment 1 of the present invention. The system specifically includes: a service processing module 14, a 5G independent networking simulation module 12 connected to the service processing module 14, and a port monitoring module 11 and a security event communication management module 15.

[0025] Among them, the 5G independent networking simulation module 12 is used to provide different types of simulated network elements; the port monitoring module 11 is used to monitor the port of each simulated network element to obtain the signaling message sent by the attacking client, and The signaling message is transmitted to the service processing module; the service processing module 14 is used to generate a corresponding security event according to the signaling message, and transmits the security event to the security event communication management module;...

Embodiment 2

[0141] image 3 It is a sequence diagram of the response message corresponding to the signaling message generated by the simulation network element based on the simulation network element in the 5G independent networking simulation module provided by the second embodiment of the present invention. This embodiment specifically describes the working principle of the 5G independent networking simulation module illustrate.

[0142] Optionally, the service processing module is also used to transmit the signaling message to the 5G independent networking simulation module; the 5G independent networking simulation module is used to generate a response message corresponding to the signaling message based on the simulation network element, and send The response message is fed back to the attacking client.

[0143] Optionally, the response message includes a registration response message, an authentication authentication response message, an encrypted secure channel establishment respon...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a mobile network honeypot system for 5G independent networking, and the system comprises a 5G independent networking simulation module which is used for providing different types of simulation network elements; a port monitoring module which is used for monitoring the port of each simulation network element to obtain a signaling message sent by an attack client and transmitting the signaling message to the service processing module; a service processing module which is used for generating a corresponding security event according to the signaling message and transmitting the security event to the security event communication management module; and a security event communication management module which is used for issuing the security event on the security analysis platform. A mobile network honeypot system of a 5G independent network is disguised as a normally running network element to decoy an attacker to invade, network information of the attacker is obtained, a security event is generated according to a signaling message of the attacker and is published to a security analysis platform, so the characteristics of the attacker are analyzed, and the user can conveniently take corresponding security defense measures according to the analysis result.

Description

technical field [0001] The embodiment of the present invention relates to the field of 5G communication, in particular to a mobile network honeypot system for 5G independent networking. Background technique [0002] With the 5G independent networking, that is, the construction and commercialization of the 5G SA core network, the virtualization of network elements of the 5G SA core network and the direct connection and access of users, the 5G SA core network faces new security risks, including: signaling security, user Issues such as access security and cloud security for 5G deployment. [0003] The security of the 5G core network mainly involves issues such as signaling attacks caused by mobile network-oriented edge application connections. At the same time, the virtualization of network elements in the 5G SA core network, as IT equipment, can be accessed, which is easy to cause penetration attacks and Therefore, the network is facing various risks of security attacks. Co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1491
Inventor 马洪彬傅强袁林刘道林邸学锋贾立军窦晶米胜山范晓波张赫男阿曼太梁彧周忠义蔡琳杨满智王杰田野金红陈晓光
Owner EVERSEC BEIJING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products