CN114760631B - Interference source identification method and device - Google Patents

Interference source identification method and device Download PDF

Info

Publication number
CN114760631B
CN114760631B CN202011559953.3A CN202011559953A CN114760631B CN 114760631 B CN114760631 B CN 114760631B CN 202011559953 A CN202011559953 A CN 202011559953A CN 114760631 B CN114760631 B CN 114760631B
Authority
CN
China
Prior art keywords
cell
mobile terminal
interfered
mobile
cells
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011559953.3A
Other languages
Chinese (zh)
Other versions
CN114760631A (en
Inventor
黄剑锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ultrapower Software Co ltd
Original Assignee
Ultrapower Software Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ultrapower Software Co ltd filed Critical Ultrapower Software Co ltd
Priority to CN202011559953.3A priority Critical patent/CN114760631B/en
Publication of CN114760631A publication Critical patent/CN114760631A/en
Application granted granted Critical
Publication of CN114760631B publication Critical patent/CN114760631B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/023Services making use of location information using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • H04W64/003Locating users or terminals or network equipment for network management purposes, e.g. mobility management locating network equipment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • H04W64/006Locating users or terminals or network equipment for network management purposes, e.g. mobility management with additional information processing, e.g. for direction or speed determination

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses an interference source identification method and device. The method of the application comprises the following steps: acquiring mobile data of each mobile terminal in a monitoring area, and extracting resident characteristics of the mobile terminals from the mobile data; determining the interfered mobile terminal in the monitoring area according to the residence characteristics of the mobile terminal; and determining the position of the interference source according to the position distribution of the interfered mobile terminal. The application can accurately identify and position the interference source and provide technical support for the treatment of illegal short message sniffing.

Description

Interference source identification method and device
Technical Field
The application relates to the technical field of information security, in particular to an interference source identification method and device.
Background
The pseudo base station system is a system for simulating the wireless base station and background management of mobile communication, which utilizes the network number, frequency resource and the like of a mobile network to set a simulated mobile base station at an information acquisition point, adopts high-power wireless signal transmission to force a user terminal (such as a mobile phone and other terminals) to register on the simulated base station, and acquires the information of the IMSI (International Mobile Subscriber Identity ), IMEI (International Mobile Equipment Identity, international mobile equipment identity) and the like of a user. The system is originally a monitoring instrument developed by related departments for safety factors, but in recent years, a large number of lawbreakers utilize a pseudo base station to adsorb mobile users near commercial areas and forcibly push commercial messages, even fraud messages, so that harassment and loss are caused to the mobile users, the mobile users cannot normally communicate for a period of time, and serious interference is caused to a mobile communication system.
In view of the technical principle of the working of the pseudo base station equipment, criminals can send various short message contents to affected mobile users in various numbers, develop fraud means and steal personal privacy, and can steal user verification codes through illegal short message sniffing, steal and pay APP, so that huge economic losses are brought to the mobile users.
The current interference source represented by illegal short message sniffing equipment has the characteristics of small volume, low cost, high liquidity, strong concealment, wide influence range and the like, has certain difficulty in prevention and treatment, and effectively prevents and treats the influence of the interference source is still a blank in the industry.
Disclosure of Invention
The application provides an interference source identification method and device, which are used for identifying an interference source and providing powerful technical support for treating illegal interference attack of a wireless network.
In one aspect, the present application provides a method for identifying an interference source, including:
acquiring mobile data of each mobile terminal in a monitoring area, and extracting resident characteristics of the mobile terminals from the mobile data;
Determining the interfered mobile terminal in the monitoring area according to the residence characteristics of the mobile terminal;
the location of the interference source is identified based on the location profile of the interfered mobile terminal.
In another aspect, the present application provides an apparatus for identifying an interference source, the apparatus comprising:
The acquisition unit is used for acquiring the mobile data of each mobile terminal in the monitoring area and extracting the resident characteristics of the mobile terminal from the mobile data;
the analysis unit is used for determining the interfered mobile terminal in the monitoring area according to the residence characteristics of the mobile terminal;
And the identification unit is used for identifying the position of the interference source according to the position distribution of the interfered mobile terminal.
In yet another aspect, the present application provides an electronic device including a memory, a processor;
A memory storing computer-executable instructions;
And the processor executes the interference source identification method according to the computer executable instructions.
In yet another aspect, the present application provides a computer-readable storage medium having one or more computer programs stored thereon, which when executed implement a method of interferer identification.
The beneficial effects of the application are as follows: the application analyzes the mobile data of each mobile terminal in the monitoring area to obtain the residence characteristics of each mobile terminal, determines the interfered mobile terminal according to the residence characteristics, further can obtain the position distribution of the interfered mobile terminal, and determines the position of the interference source according to the position distribution of the mobile terminal so as to accurately identify and position the interference source and provide technical support for the management of illegal short message sniffing.
Drawings
FIG. 1 is a schematic diagram illustrating a region division model according to one embodiment of the present application;
FIG. 2 is a flow chart of an interferer identification method according to one embodiment of the present application;
FIG. 3 is a schematic diagram of a key flow of an interferer identification process according to one embodiment of the present application;
FIG. 4 is a functional block diagram of an interferer identification device shown in one embodiment of the present application;
fig. 5 is a block diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the application. Rather, they are merely examples of apparatus and methods consistent with aspects of the application as detailed in the accompanying claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any or all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the application. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "in response to a determination" depending on the context.
With the large-scale construction and mature commercial of 5G networks, the risk of the attack of the 5G wireless network by a pseudo base station or other interference sources is increased, and the current industry lacks effective means for effectively monitoring, preventing, controlling and treating the pseudo base station and the novel interference sources of the 5G wireless network in real time. Through research and analysis, in the process of illegal interference by utilizing an interference source (such as illegal short message sniffing equipment and pseudo base station equipment), the network of the mobile terminal in the coverage area of the interference source is maliciously down-converted, and obvious residence characteristics of collective fallback from a 5G network to a 2G network can appear.
Based on the above, the peripheral area is divided into an inhalation area, an interference area and a position correlation area in turn based on the propagation characteristics of the wireless signal with the position of the interference source as the center, and an area differentiation model is formed, where the area differentiation model further includes a first screening rule corresponding to the position correlation area and a second screening rule corresponding to the interference area (or a third screening rule corresponding to the interference area). To facilitate the explanation of the roles of the first screening rule and the second screening rule, both screening rules will be explained in detail below.
As shown in fig. 1, three concentric circles are determined with an interference source as a center, and the areas where the three concentric circles are located are respectively a suction area, an interference area and a position association area according to the sequence from inside to outside, wherein the position association radius R L of the outermost circle is determined according to the signal intensity of the interference source, for example, the signal intensity of a plurality of interference sources is counted, the signal intensity average value of the statistics is taken for a plurality of times, the corresponding physical distance is determined based on the signal intensity average value, the physical distance is taken as the interference distance, the interference distance is also the position association radius R L shown in fig. 1, and an example of the position association radius R L is 1000 meters.
After the regional division model is built, the interference source is identified and positioned based on the regional division model and combined with the resident characteristics of the mobile terminal. Fig. 2 is a flowchart of an interference source identification method according to an embodiment of the present application, including the following steps:
step S210, mobile data of each mobile terminal in the monitoring area are acquired, and resident characteristics of the mobile terminals are extracted from the mobile data.
In a mobile communication network, a mobile terminal reports updated mobile data to a data server of the mobile communication network under the conditions of position update or network update and the like.
When the interference source is illegally interfered, the phenomenon that the mobile terminals around the interference source fall back from the second system network (namely, high-frequency networks such as 3G, 4G or 5G networks) to the first system network (namely, low-frequency networks such as 2G networks) in a short time can be caused. Therefore, the monitoring time period may be set, for example, a time period of 30 seconds is taken as one monitoring time period, mobile data of each mobile terminal in the monitoring area is acquired in each monitoring time period, and the residence characteristic of the mobile terminal is extracted from the mobile data, where the residence characteristic includes the characteristic that the mobile terminal falls back from the second system network to the first system network and resides in the first system network.
After obtaining the camping characteristics of the mobile terminal, the degradation characteristics of the cell to which the mobile terminal belongs may also be obtained. For example, a network quality index of a cell is obtained from a mobile base station on a network side, a network quality degradation characteristic of the cell is obtained based on the network quality index, and a service quality index of the cell is obtained from a terminal side, a service quality degradation characteristic of the cell is obtained based on the service quality index, and then a degradation characteristic is obtained from the network quality degradation characteristic and the service quality degradation characteristic.
Step S220, the interfered mobile terminals in the monitoring area are determined according to the residence characteristics of the mobile terminals.
Because the interfered mobile terminal falls back to the first system network from the second system network and resides in the first system network for a preset time, the step determines the interfered mobile terminal in the monitoring area according to the residence characteristic of the second system network falling back to the first system network.
In order to improve the accuracy of the monitoring, the mobile terminal interfered in the monitoring area can be determined by combining the residence characteristic of the mobile terminal and the degradation characteristic of the cell to which the mobile terminal belongs.
Step S230, identifying the location of the interference source according to the location distribution of the interfered mobile terminal.
Since the number of interfered mobile terminals is larger as the position of the interfered mobile terminals is closer to the position of the interference source, the position of the interference source can be identified based on the position distribution of the interfered mobile terminals in the step.
As can be seen from fig. 2, in this embodiment, the mobile data of each mobile terminal in the monitoring area is analyzed to obtain residence characteristics of each mobile terminal, and the interfered mobile terminal is determined according to the residence characteristics, so that the position distribution of the interfered mobile terminal can be obtained, and the position of the interference source is determined according to the position distribution of the mobile terminal, so as to accurately identify and locate the interference source, and provide technical support for the management of illegal short message sniffing.
In one embodiment, the step S210 specifically includes obtaining movement data of each mobile terminal at the current time and a previous time adjacent to the current time; and obtaining the residence characteristics of each mobile terminal according to the network change relation between the target cell carried by the mobile data at the current moment and the target cell carried by the mobile data at the previous moment.
In a mobile communication network, mobile terminals automatically report updated mobile data each time a location is updated or a network is updated, wherein the mobile data generally comprises information such as an original cell, a target cell, a network of the original cell, a network of the target cell, a terminal identifier and the like. According to the method, the mobile terminal, which changes the target cell from the second system network to the first system network, is screened out by acquiring the mobile data at the adjacent time and analyzing the network change of the target cell carried by the mobile data at the adjacent time, so that the network change characteristic of the target cell, which changes the target cell from the second system network to the first system network and resides in the first system network for a preset time, is used as the residence characteristic of the mobile terminal.
It should be noted that, here, the target cell where the mobile terminal resides at the adjacent time belongs to the same location or a neighboring area in the physical location, but the network system of the target cell where the mobile terminal resides changes.
After the residence characteristic of the mobile terminal is obtained, the network quality index and the service quality index of the cell of the mobile terminal at the current moment are obtained, and the degradation characteristic of the cell of the mobile terminal is obtained according to the network quality index and the service quality index of the cell of the mobile terminal at the current moment.
The network quality index includes, but is not limited to, SSB RSRP and SSB SINR, and the service quality index includes, but is not limited to, downlink throughput, uplink throughput, ping delay, and the degradation characteristics include a network quality degradation characteristic, a service quality degradation characteristic, and an integrated degradation characteristic.
After obtaining the resident characteristics of the mobile terminal, obtaining the interfered mobile terminal by the following method:
S1, screening out all the reference mobile terminals which enter the first system network after being interfered from the mobile terminals according to the network change relation.
Acquiring a mobile terminal indicated by a network change relation from the mobile terminal, wherein the mobile terminal falls back to the first system network from the second system network, so as to obtain a plurality of mobile terminals newly entering the first system network; the obtained mobile terminals comprise the mobile terminals illegally interfered by the interference source and entering the first system network and the mobile terminals reasonably entering the first system network. For example, when a mobile terminal calls, because the mobile terminal does not support VoLTE voice call, the mobile terminal automatically falls back to the first system network from the second system network to ensure that the voice call function is normally performed, and the mobile terminal obtained based on the network change relation of the resident network system is the mobile terminal reasonably entering the first system network. Therefore, the mobile terminals newly entering the first system network need to be removed as the mobile terminals reasonably entering the first system network.
After the mobile terminals newly entering the first system network are obtained, historical movement data of each mobile terminal newly entering the first system network are obtained, the mobile terminals reasonably entering the first system network are screened out of the mobile terminals newly entering the first system network according to the historical movement data, and the mobile terminals which are not screened out in the new first system network are reference mobile terminals.
The method comprises the steps of determining a cell cluster where a mobile terminal newly entering a first system network is located, acquiring a historical data set of the cell cluster, and if the historical data set of one or some cells in the cell cluster indicates that the one or some cells have a reasonable fallback event that the second system network falls back to the first system network, indicating that the mobile terminal in the cell is quite likely to fall back to the first system network from the second system network reasonably, but not fall back to the first system network due to interference of an interference source. Therefore, the reference mobile terminal which falls back to the first system network from the second system network due to interference of the interference source can be obtained by eliminating the mobile terminal in the cell from the mobile terminal which newly enters the first system network.
S2, determining N cells to be processed according to the cells where the reference mobile terminals are located, wherein N is a natural number larger than 1.
After obtaining the reference mobile terminals, determining the cells in which the reference mobile terminals are located according to the mobile data of the reference mobile terminals, assuming that 5000 reference mobile terminals are distributed in10 different cells, at this time, the number of the reference mobile terminals in each cell can be calculated, namely, the number of the reference mobile terminals in each cell in the 10 cells is calculated, and N cells with the largest number of the reference mobile terminals are used as the cells to be processed.
The value of N here can be obtained statistically. For example, through several interference source positioning experiments, the minimum value of the number of reference mobile terminals of the interfered cells in the location correlation zone is obtained. Assuming that the location association area includes 3 interfered CELLs CELL1, CELL2 and CELL3, and the number of reference mobile terminals in the CELL1 is smaller than the number of reference mobile terminals in the CELL2 and CELL3, the number of reference mobile terminals in the CELL1 is the minimum value. The average value of the minimum values obtained by the experiments can be used as the screening condition of the cells to be processed, namely N cells with the number of the reference mobile terminals being larger than the average value are used as the cells to be processed.
And S3, calculating a position association cell cluster corresponding to each cell to be processed according to a pre-constructed area division model, and obtaining an interfered cell cluster according to the position association cell cluster, wherein a reference mobile terminal positioned in the interfered cell cluster is an interfered mobile terminal.
After obtaining N cells to be processed, taking a circular area which takes the central position of each cell to be processed as a circle center and takes the interference distance as a radius as a position association area of each cell to be processed, namely the position association area shown in fig. 1, and obtaining N initial position association cell clusters corresponding to each cell to be processed according to a first screening rule; and carrying out cell de-duplication treatment on the N initial position associated cell clusters, and carrying out classification treatment on the initial position associated cell clusters after de-duplication to obtain one or more position associated cell clusters, wherein the position associated cell clusters are cell clusters of all cell groups suspected to be influenced by interference sources. At this time, to determine the interference source, the location-associated cell cluster should be screened, that is, the location-associated cell cluster is screened by using the second screening rule or the third screening rule, so as to obtain the interfered mobile terminal located in the suction area in fig. 1, so that the location of the interference source can be accurately located through the location distribution of the interfered mobile terminal.
The first screening rule indicates that a cell that satisfies a first interfered condition and is located in the location association zone is a location association cell of the location association zone, and the first interfered condition includes: the increment of the reference mobile terminal is greater than the first increment threshold and/or the increment duty cycle of the reference mobile terminal is greater than the first duty cycle threshold. The increment of the reference mobile terminal may be understood as a difference between the number of reference mobile terminals at the current time in the CELL and the number of reference mobile terminals at the previous time, and the increment ratio of the reference mobile terminal may be understood as a ratio of the difference to the number of reference mobile terminals at the current time.
And assuming that 8 cells are in the position association region of one cell to be processed, respectively screening the 8 cells by using a first screening rule, and if the increment of the reference mobile terminal in one cell is larger than a first increment threshold value and the increment duty ratio is larger than a first duty ratio threshold value, determining the cell as the initial position association cell of the cell to be processed. If 6 cells in the 8 cells meet the first interfered condition, and the other 2 cells do not meet the first interfered condition, the cell cluster formed by the 6 cells meeting the first interfered condition is the initial position associated cell cluster of the cell to be processed, and at this time, the 2 cells not meeting the first interfered condition can be updated into the historical data set, so that the mobile terminal of the first system network reasonably entering from the mobile terminals of the first system network based on the historical data set in the previous step S1 can be removed.
When a plurality of interference sources exist in the monitoring area, the initial position associated cell cluster after the duplication removal can be classified to obtain a position associated cell cluster, and when a plurality of interference sources exist in the monitoring area, the initial position associated cell cluster after the duplication removal can be classified to obtain a plurality of position associated cell clusters. In this embodiment, an existing classification method may be used to classify the initial position-associated cell cluster after the duplication removal, for example, classification is performed by using a K-means, which is not limited in this embodiment.
After one or more position-related cell clusters are obtained, the number of reference mobile terminals in each position-related cell cluster is obtained, M position-related cell clusters with the largest number of reference mobile terminals are used as pre-judging cell clusters, and M is a natural number smaller than N; the area formed by the obtained pre-judgment cell cluster is the interference area shown in fig. 1. Since the range of the interference area in fig. 1 cannot be known before the location of the interference source is not located, the location-associated cell cluster is screened based on the number of the reference mobile terminals in this embodiment, and the area formed by the pre-determined cell cluster obtained after the screening is the interference area. Through verification, if the positioning of the interference source is directly performed based on the position distribution of the reference mobile terminal in the interference area, the accuracy of the positioning result is poor, so that the pre-judgment cell cluster in the interference area is further screened again by using the second screening rule or the third screening rule in the embodiment.
In one embodiment, cell screening is performed on the M pre-determined cell clusters based on a second screening rule, so as to obtain an interfered cell cluster.
The second filtering rule indicates that the cell satisfying the second interfered condition is an interfered cell, where the second interference condition includes: the increment of the mobile terminal is greater than a second increment threshold and/or the increment duty cycle of the reference mobile terminal is greater than a second duty cycle threshold, wherein the second increment threshold is greater than the first increment threshold and the second duty cycle threshold is greater than the first duty cycle threshold.
Assuming that 3 position-related cell clusters are obtained after a first screening rule and cell de-duplication processing, wherein one position-related cell cluster comprises 6 initial position-related cells after de-duplication, calculating the sum of the number of reference mobile terminals in the 6 initial position-related cells after de-duplication, taking the sum as the number of reference mobile terminals of the position-related cell cluster, and assuming that at the moment, M=2, namely, two position-related cell clusters with the largest number of reference mobile terminals are taken as pre-judgment cell clusters, and screening cells in the two pre-judgment cell clusters respectively by utilizing a second screening rule.
Taking one of the pre-judgment cell clusters as an example, assuming that the pre-judgment cell cluster comprises 6 cells, if the increment of the reference mobile terminal in one cell is larger than a second increment threshold value and the increment duty ratio is larger than a second duty ratio threshold value, the cell is an interfered cell; thus, if all the 6 cells meet the second interfered condition, the pre-determined cell cluster is an interfered cell cluster, and if more than one cell in the 6 cells does not meet the second interfered condition, the pre-determined cell cluster is an undisturbed cell cluster. When the pre-determined cell cluster is determined as an undisturbed cell cluster, the cells in the cell cluster which do not meet the second disturbed condition can be updated into the historical data set, so that the mobile terminals of the first system network which reasonably enter are removed from the mobile terminals of the first system network which newly enter based on the historical data set in the previous step S1.
In another embodiment, the mobile terminal that is interfered in S3 may be further determined by combining the degradation characteristics of the cell to which the mobile terminal belongs, that is, cell screening is performed on the M pre-determined cell clusters based on the third screening rule, so as to obtain the interfered cell cluster.
Specifically, after obtaining one or more position-associated cell clusters, acquiring the number of reference mobile terminals in each position-associated cell cluster, and taking M position-associated cell clusters with the largest number of reference mobile terminals as pre-judgment cell clusters, wherein M is a natural number smaller than N; at this time, acquiring a reference cell associated with each pre-judgment cell in a pre-judgment cell cluster, and obtaining degradation characteristics of the reference cell, wherein the reference cell is all non-pre-judgment cells in a range taking the pre-judgment cell as a center and the interference distance as a radius; and then carrying out cell screening on the M pre-judgment cell clusters according to a third screening rule to obtain an interfered cell cluster.
The third filtering rule indicates that the cell satisfying both the second interfered condition and the third interfered condition is an interfered cell, and the third interfered condition includes: the increment of the reference cell of which the network quality degradation characteristic associated with the pre-judgment cell is reduced to the network quality degradation threshold is larger than a third increment threshold, and/or the increment duty ratio of the reference cell of which the service quality degradation characteristic is reduced to the service quality degradation threshold is larger than a third increment duty ratio threshold, and/or the increment of the reference cell of which the comprehensive degradation characteristic is reduced to the comprehensive degradation threshold is larger than a fourth increment threshold.
It should be noted that, performing cell screening on M pre-determined cell clusters according to the third screening rule, to obtain the interfered cell cluster may be understood as: for each pre-judgment cell cluster, judging whether the increment of the reference mobile terminal of each pre-judgment cell of the pre-judgment cell cluster is larger than a second increment threshold value, and/or judging whether the increment duty ratio of the reference mobile terminal is larger than a second duty ratio threshold value, and judging whether the increment of the reference cell of which the network quality cracking characteristic associated with each pre-judgment cell is reduced to the network quality degradation threshold value is larger than a third increment threshold value, whether the increment duty ratio of the reference cell of which the service quality degradation characteristic is reduced to the service quality degradation threshold value is larger than a third increment duty ratio threshold value, and whether the increment of the reference cell of which the comprehensive degradation characteristic is reduced to the comprehensive degradation threshold value is larger than a fourth increment threshold value.
And judging the pre-judging cell cluster as an interfered cell cluster under the condition that the increment of the reference mobile terminal of each pre-judging cell of the pre-judging cell cluster is larger than a second increment threshold and/or the increment duty ratio of the reference mobile terminal is larger than a second duty ratio threshold, and the increment of the reference cell of which the network quality degradation characteristic is reduced to the network quality degradation threshold associated with each pre-judging cell is larger than a third increment threshold, the increment duty ratio of the reference cell of which the service quality cracking characteristic is reduced to the service quality degradation threshold is larger than a third increment duty ratio threshold, and the increment of the reference cell of which the comprehensive degradation characteristic is reduced to the comprehensive degradation threshold is larger than a fourth increment threshold.
For example, assume that after a first filtering rule and cell deduplication process, 3 location-related cell clusters are obtained in total, where one location-related cell cluster includes 6 initial location-related cells after deduplication, a sum of the numbers of reference mobile terminals in the 6 initial location-related cells after deduplication is calculated, the sum is used as the number of reference mobile terminals in the location-related cell cluster, and at this time, it is assumed that m=2, that is, two location-related cell clusters with the largest number of reference mobile terminals are used as pre-judgment cell clusters, and a third filtering rule is used to filter pre-judgment cells in the two pre-judgment cell clusters and reference cells associated with the pre-judgment cells respectively.
Taking one of the pre-judgment cell clusters as an example, assuming that the pre-judgment cell cluster comprises 6 pre-judgment cells, wherein each pre-judgment cell is associated with 10 reference cells, if the increment of a reference mobile terminal in one pre-judgment cell is larger than a second increment threshold, the increment duty ratio is larger than a second duty ratio threshold, the increment of a reference cell in 10 reference cells associated with the pre-judgment cell, in which the network quality cracking characteristic is reduced to the network quality degradation threshold, is larger than a third increment threshold, the increment duty ratio of the reference cell in which the service quality cracking characteristic is reduced to the service quality degradation threshold is larger than a third increment duty ratio threshold, and the increment of the reference cell in which the comprehensive degradation characteristic is reduced to the comprehensive degradation threshold is larger than a fourth increment threshold, the cell is an interfered cell; thus, if the 6 pre-judgment cells and the reference cells thereof meet the second and third interfered conditions, the pre-judgment cell cluster is an interfered cell cluster, otherwise, if more than one pre-judgment cells and the reference cells thereof do not meet the second and third interfered conditions, the pre-judgment cell cluster is an undisturbed cell cluster. When the pre-determined cell cluster is an undisturbed cell cluster, the cells which do not meet the second or third disturbed conditions can be updated into the historical data set, so that the mobile terminals of the first system network which reasonably enter are removed from the mobile terminals of the first system network which newly enter based on the historical data set in the previous step S1.
Referring to fig. 1, after the first screening rule and the second screening rule (or the first screening rule and the third screening rule) are processed, the obtained position-associated cell cluster corresponds to a cell cluster in the position-associated region in fig. 1, the obtained pre-determined cell cluster corresponds to a cell cluster in the interference region in fig. 1, and the obtained interfered cell cluster corresponds to a cell cluster in the suction region in fig. 1.
As can be seen from fig. 1, the determined center position of the cell can be identified as the position of the interference source by determining the cell with the largest number of interfered mobile terminals in each interfered cell cluster.
It is assumed that there are two interfered cell clusters in total, wherein one interfered cell cluster includes 4 cells, and the central position of the cell with the largest number of reference mobile terminals among the 4 cells is taken as the position of the first interference source. And similarly, taking the central position of the cell with the largest reference mobile terminal number in the other interfered cell cluster as the position of the second interference source, thereby realizing the positioning of the two interference sources in the monitoring area.
In order to more specifically describe the positioning of the interference source according to the present application, a positioning short message sniffer is taken as an example, and the implementation steps of identifying and positioning the short message sniffer are specifically described with reference to fig. 3.
As shown in fig. 3, the present embodiment requires the pre-construction of a historical data set including non-5G network (abbreviated as 5G-) resident feature data of a reasonably resident 2G, 3G, or 4G network. After the history data set is built, the identification and positioning of the short message sniffer can be started, and the identification and positioning of the short message sniffer are realized through the following steps S301-S310.
S301, acquiring residence characteristics of each mobile terminal in a monitoring area, wherein the residence characteristics are expressed as network change relations of target cells of the mobile terminals at adjacent moments.
In the present embodiment, it is assumed that in a mobile communication network, mobile data stored in a data server by a mobile terminal k can be expressed as: Or (b)
Here the number of the elements is the number,And/>The mobile data sets of the mobile terminal k are respectively, the IMSI k is the international mobile subscriber identity of the mobile terminal k,/>The number of the target cell of the mobile terminal k is p, the network of the cell is a 2G, 3G or 4G network, and the network is abbreviated as 5G- (/ >The number of the target cell of the mobile terminal k is q, the network of the cell is a 5G network, which is abbreviated as 5G), and the number of the target cell is/>For n times when mobile terminal k is in a 2G, 3G or 4G network,N times for mobile terminal k to be in the 5G network.
Assuming that the one-time monitoring period is 30 seconds, the number of mobile terminals in the monitoring area is K, and the mobile data of each mobile terminal at the current time t i isThe mobile data of each mobile terminal at the last moment is/>Wherein/>And/>Respectively, mobile data of the mobile terminal k at the time t i.
Obviously, the mobile data of each mobile terminal at the current time t i may also beCorrespondingly, the mobile data of each mobile terminal at the previous moment may also be/>
If the mobile data of the kth mobile terminal at the current time isThe moving data at the previous moment isThe camping feature is that the target cell falls back from the 5G network to the 2G, 3G or 4G network.
S302, each mobile terminal newly entering the 2G, 3G or 4G network is screened out from the mobile terminals according to the resident characteristics.
And S303, removing the mobile terminals reasonably entering the 2G, 3G or 4G network to obtain the reference mobile terminal.
Here, the mobile terminals reasonably entering the 2G, 3G or 4G network can be removed from the mobile terminals newly entering the 2G, 3G or 4G network by means of the historical data set, namely, the cell distributed by the mobile terminals newly entering the 2G, 3G or 4G network is determined first, and if the cell has the data recorded in the historical data set, the mobile terminals distributed in the cell are removed.
In one embodiment, the network Update of the mobile terminal is generally based on LAU (Routing Area Update ), TAU (TRACKING AREA Update) or a joint Update of LAU/TAU, wherein the time difference between the initiation of the LAU Update and the TAU Update is within a specified time difference, e.g. within 3s or 5s, and can be determined as a joint Update.
If the mobile terminal k is before the LAU, the original cell is a 5G cell, and the target cell after the LAU is a 2G, 3G or 4G cell, recording a fallback event of the mobile terminal k, and if the fallback event is judged to be fallback caused by non-sniffing, updating a historical data set based on the fallback event, and determining the resident characteristic of the mobile terminal k in the period2G/3G/4G, [ T 1,T2,...,Ti ] ] is added to the historical dataset.
Correspondingly, if the mobile terminal k is in TAU or in LAU/TAU joint update, the same judgment strategy as that of LAU update can be adopted to judge, and whether to update the historical database is determined based on the corresponding judgment result.
S304, determining N cells to be processed.
The method comprises the steps of determining the cells where the reference mobile terminals are located, calculating the number of the reference mobile terminals of each cell, and taking N cells with the largest number of the reference mobile terminals as cells to be processed.
S305, determining a position-associated cell cluster based on the first screening rule.
The circular area with the position center of each cell to be processed as the center and the R L as the radius is used as the position association area of each cell to be processed, and N initial position association cell clusters corresponding to each cell to be processed are obtained according to a first screening rule; cell de-duplication processing is carried out on the N initial position associated cell clusters, and classification processing is carried out on the initial position associated cell clusters after de-duplication, so as to obtain one or more position associated cell clusters, wherein the h position associated cell cluster can be expressed asWherein/>And (3) associating the H th cell in the cell cluster with the 2G, 3G or 4G cell meeting the first interfered condition for the H position.
S306, the position related cell clusters are screened based on the second screening rule and the third screening rule, step S307 is executed for the screened cells which do not meet the second or third interfered conditions, and step S308 is executed for the screened cells which meet the second or third interfered conditions.
The number of reference mobile terminals in each location-associated cell cluster is obtained here, whereIn the position-associated cell cluster, the reference mobile terminal cluster at the current time is/> Is thatThe S (t i) th reference mobile terminal in the position-associated cell cluster, the reference mobile terminal cluster at the last moment is that For/>S' (t i) th reference mobile terminal in the position-related cell cluster.
And taking M position-associated cell clusters with the largest number of the reference mobile terminals as pre-judging cell clusters, and acquiring reference cells associated with each pre-judging cell in the pre-judging cell clusters to obtain degradation characteristics of the reference cells.
Here, the degradation characteristics include a network quality degradation characteristic, a service quality degradation characteristic, and an integrated degradation characteristic, which are calculated by the following methods, respectively:
network quality degradation feature Q N:
the network quality index X 1,X2,...,Xm of each reference cell is obtained from the network side, for example, a measured duty ratio index with SSB RSRP larger than-75 dBm and a measured point duty ratio index with SSB SINR larger than 18DB are obtained, the network quality degradation characteristic Q N is obtained according to the network quality index X 1,X2,...,Xm, namely, the network quality degradation characteristic Q N and f (·) are obtained according to a formula Q N=f(X1,X2,...,Xm), and the mapping relation from the network quality index to the network quality degradation characteristic is obtained.
Quality of service degradation feature Q S:
And obtaining the service quality index S ij of each reference cell from the terminal side, wherein the service quality index S ij is the j-th service quality index of the i-th network service. For example, a ping delay <10ms test point duty ratio is a quality index of a ping service, a downlink throughput >240M test point duty ratio is a quality index of a downlink data service, an uplink throughput >25M test point duty ratio is an uplink data service quality index, a network quality degradation characteristic Q Si of an i-th type network service is obtained according to the quality index S ij, a mapping relationship from the quality index to the network quality degradation characteristic Q Si,gi (·) of the i-th type network service is obtained according to a formula Q Si=gi(Si1,Si2,...,Sij), the mapping relationship is defined as a weight ratio of the i-th type network service, and the mapping relationship is constrained Such quality of service degradation features
Thus, the network quality degradation characteristic Q N and the service quality degradation characteristic Q S can be obtained by the above-described method, so that the integrated degradation characteristic q=q N×QS can be obtained by the network quality degradation characteristic Q N and the service quality degradation characteristic Q S.
And after the degradation characteristics of each reference cell are obtained, cell screening is carried out on one or more pre-judging cell clusters and the reference cells thereof according to the second screening rule and the third screening rule, so as to obtain the interfered cell clusters.
Here, the increment of the reference mobile terminal may be expressed as: v (t i-1→ti)=S(ti)-S′(ti-1), the incremental duty cycle of the reference mobile terminal can be expressed as: lambda L→G(ti-1→ti)=V(ti-1→ti)/S(ti).
And S307, the mobile data corresponding to the cell is updated to the historical data set.
S308, determining that the current position associated cell cluster has suspected illegal short message sniffing, and continuing to execute the step S309 at the moment.
S309, judging whether all the position-related cell clusters are screened, if not, returning to step S306 to screen the next position-related cell cluster, and if so, executing step S310.
And S310, determining the cell with the most number of interfered mobile terminals in each interfered cell cluster, and identifying the central position of the determined cell as the position of the short message sniffing equipment.
The central location of the cell may be understood as a forward predetermined distance (e.g. 150 meters) of the cell sector, and if the cell is a cell, longitude and latitude information of the cell is taken as the location of the short message sniffing device.
Based on the positioning scheme of the short message sniffing equipment of S301-S310, the accuracy can reach over 96% after verification, the reliability of the positioning result can be determined, and the technology support is provided for illegal short message sniffing treatment.
Corresponding to the foregoing method, the present application further provides an apparatus for identifying an interference source, and fig. 4 is a functional block diagram of an apparatus for identifying an interference source according to an embodiment of the present application, as shown in fig. 4, an apparatus 400 of this embodiment includes:
an obtaining unit 410, configured to obtain mobile data of each mobile terminal in the monitoring area, and extract residence characteristics of the mobile terminal from the mobile data;
An analysis unit 420, configured to determine, according to the residence characteristics of the mobile terminal, a mobile terminal that is interfered in the monitoring area;
and an identifying unit 430 for identifying the location of the interference source according to the location distribution of the interfered mobile terminal.
In one embodiment, the obtaining unit 410 is further configured to obtain mobile data of each mobile terminal at a current time and a previous time adjacent to the current time, and obtain the residence characteristic of each mobile terminal according to a network change relationship between a target cell carried by the mobile data at the current time and a target cell carried by the mobile data at the previous time.
Correspondingly, the analysis unit 420 is configured to screen each reference mobile terminal that enters the first system network after being interfered from the mobile terminals according to the network change relationship; determining N cells to be processed according to the cells in which each reference mobile terminal is located, wherein N is a natural number greater than 1; and calculating a position associated cell cluster corresponding to each cell to be processed according to a pre-constructed area division model, and obtaining an interfered cell cluster according to the position associated cell cluster, wherein a reference mobile terminal positioned in the interfered cell cluster is an interfered mobile terminal.
In one embodiment, the regional division model includes a location association region and a first screening rule corresponding to the location association region, the first screening rule indicating that a cell that satisfies a first interfered condition and is located within the location association region is a location association cell of the location association region;
Correspondingly, the analysis unit 420 is further configured to use a circular area determined by taking the center position of each cell to be processed as a center and the interference distance as a radius as a position association area of each cell to be processed, and obtain an initial position association cell cluster corresponding to each cell to be processed according to the first screening rule; and carrying out cell de-duplication treatment on the initial position associated cell clusters corresponding to the N cells to be treated, and carrying out classification treatment on the initial position associated cell clusters after de-duplication to obtain one or more position associated cell clusters.
In one embodiment, the region division model further includes a second screening rule indicating that a cell satisfying a second interfered condition is an interfered cell;
correspondingly, the analysis unit 420 is further configured to obtain the number of reference mobile terminals in each location-associated cell cluster, and take, as the pre-determined cell cluster, M, which is a natural number smaller than N, of the M location-associated cell clusters with the largest number of reference mobile terminals; and carrying out cell screening on M pre-judgment cell clusters according to the second screening rule to obtain interfered cell clusters.
Here, the first interfered condition includes that an increment of the reference mobile terminal is greater than a first increment threshold, and/or that an increment duty cycle of the reference mobile terminal is greater than a first duty cycle threshold; the second interfered condition includes that the increment of the reference mobile terminal in the pre-judging cell is larger than a second increment threshold value, and/or the increment duty ratio of the reference mobile terminal is larger than a second duty ratio threshold value.
In one embodiment, the analyzing unit 420 is further configured to obtain, from the mobile terminals, a mobile terminal indicated by the network change relationship and falling back to the first system network from the second system network, so as to obtain a plurality of mobile terminals newly entering the first system network; and acquiring historical movement data of each mobile terminal newly entering the first system network, screening mobile terminals reasonably entering the first system network from the mobile terminals newly entering the first system network according to the historical movement data, wherein the mobile terminals which are not screened in the new first system network are reference mobile terminals.
In one embodiment, the analyzing unit 420 is further configured to determine, according to the movement data of each reference mobile terminal, a cell in which each reference mobile terminal is located; and calculating the number of the reference mobile terminals in each cell, and taking N cells with the largest number of the reference mobile terminals as cells to be processed.
In one embodiment, the identifying unit 430 is further configured to determine a cell with the largest number of interfered mobile terminals in each interfered cell cluster, and identify the determined center position of the cell as the position of the interference source.
It should be noted that:
the algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose devices may also be used with the teachings herein. The required structure for the construction of such devices is apparent from the description above. In addition, the present application is not directed to any particular programming language. It will be appreciated that the teachings of the present application described herein may be implemented in a variety of programming languages, and the above description of specific languages is provided for disclosure of enablement and best mode of the present application.
In the description provided herein, numerous specific details are set forth. However, it is understood that embodiments of the application may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the above description of exemplary embodiments of the application, various features of the application are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be construed as reflecting the intention that: i.e., the claimed application requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this application.
Those skilled in the art will appreciate that the modules in the apparatus of the embodiments may be adaptively changed and disposed in one or more apparatuses different from the embodiments. The modules or units or components of the embodiments may be combined into one module or unit or component and, furthermore, they may be divided into a plurality of sub-modules or sub-units or sub-components. Any combination of all features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or units of any method or apparatus so disclosed, may be used in combination, except insofar as at least some of such features and/or processes or units are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings), may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features but not others included in other embodiments, combinations of features of different embodiments are meant to be within the scope of the application and form different embodiments. For example, in the following claims, any of the claimed embodiments can be used in any combination.
Various component embodiments of the application may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that some or all of the functions of some or all of the components in an interferer location device according to embodiments of the present application may be implemented in practice using a microprocessor or Digital Signal Processor (DSP). The present application can also be implemented as an apparatus or device program (e.g., a computer program and a computer program product) for performing a portion or all of the methods described herein. Such a program embodying the present application may be stored on a computer readable medium, or may have the form of one or more signals. Such signals may be downloaded from an internet website, provided on a carrier signal, or provided in any other form.
For example, FIG. 5 is a block diagram of an electronic device, shown as one embodiment of the application, the electronic device 500 comprising a processor 510 and a memory 520 arranged to store computer executable instructions (computer readable program code). The memory 520 may be an electronic memory such as a flash memory, an EEPROM (electrically erasable programmable read only memory), an EPROM, a hard disk, or a ROM. The memory 520 has a memory space 530 storing computer readable program code 531 for performing any of the method steps described above. For example, the memory space 530 for storing computer readable program code may include respective computer readable program code 531 for implementing the respective steps in the above method, respectively. The computer readable program code 531 may be read from or written to one or more computer program products. These computer program products comprise a program code carrier such as a hard disk, a Compact Disc (CD), a memory card or a floppy disk.
The computer readable storage medium stores computer readable program code 531 for performing the steps of the method according to the present application, readable by the processor 510 of the electronic device 500, which computer readable program code 531, when executed by the electronic device 500, causes the electronic device 500 to perform the steps of the method described above, in particular, the computer readable program code 531 stored in the computer readable storage medium can perform the method shown in any of the embodiments described above. The computer readable program code 531 may be compressed in a suitable form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the application, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The application may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The use of the words first, second, third, etc. do not denote any order. These words may be interpreted as names.

Claims (8)

1. A method for identifying an interference source, comprising:
Acquiring mobile data of each mobile terminal in a monitoring area, and extracting resident characteristics of the mobile terminal from the mobile data, wherein the resident characteristics are expressed as network change relations of target cells of the mobile terminal at adjacent moments;
Determining the interfered mobile terminal in the monitoring area according to the residence characteristics of the mobile terminal;
Identifying the position of an interference source according to the position distribution of the interfered mobile terminal;
Determining the interfered mobile terminal in the monitoring area according to the residence characteristics of the mobile terminal comprises the following steps:
Screening out each reference mobile terminal which enters the first system network after being interfered from the mobile terminals according to the network change relation; determining N cells to be processed according to the cells in which each reference mobile terminal is located, wherein N is a natural number greater than 1; calculating a position associated cell cluster corresponding to each cell to be processed according to a pre-constructed regional division model, and obtaining an interfered cell cluster according to the position associated cell cluster, wherein a reference mobile terminal positioned in the interfered cell cluster is an interfered mobile terminal;
The regional division model comprises a position association region and a first screening rule corresponding to the position association region, wherein the first screening rule indicates that a cell which meets a first interfered condition and is positioned in the position association region is a position association cell of the position association region;
Calculating a position associated cell cluster corresponding to each cell to be processed according to a pre-constructed regional division model, wherein the method comprises the following steps:
Taking the central position of each cell to be processed as a circle center, taking a circular area with the interference distance as a radius to determine as a position association area of each cell to be processed, and obtaining an initial position association cell cluster corresponding to each cell to be processed according to the first screening rule; and carrying out cell de-duplication treatment on the initial position associated cell clusters corresponding to the N cells to be treated, and carrying out classification treatment on the initial position associated cell clusters after de-duplication to obtain one or more position associated cell clusters.
2. The method of claim 1, wherein obtaining movement data for each mobile terminal in the monitored area, extracting resident features of the mobile terminal from the movement data, comprises:
acquiring mobile data of each mobile terminal at the current moment and the last moment adjacent to the current moment;
And obtaining the residence characteristics of each mobile terminal according to the network change relation between the target cell carried by the mobile data at the current moment and the target cell carried by the mobile data at the previous moment.
3. The method of claim 1, wherein the region division model further comprises a second screening rule indicating that cells that satisfy a second interfered condition are interfered cells;
obtaining an interfered cell cluster according to the position-associated cell cluster, including:
Acquiring the number of reference mobile terminals in each position-associated cell cluster, and taking M position-associated cell clusters with the largest number of reference mobile terminals as pre-judging cell clusters, wherein M is a natural number smaller than N;
And carrying out cell screening on M pre-judgment cell clusters according to the second screening rule to obtain interfered cell clusters.
4. The method of claim 3, wherein,
The first interfered condition comprises that the increment of the reference mobile terminal is larger than a first increment threshold value, and/or the increment duty ratio of the reference mobile terminal is larger than a first duty ratio threshold value;
The second interfered condition includes that the increment of the reference mobile terminal in the pre-judging cell is larger than a second increment threshold value, and/or the increment duty ratio of the reference mobile terminal is larger than a second duty ratio threshold value.
5. The method of claim 2, wherein screening each reference mobile terminal from the mobile terminals that enters the first system network after being interfered according to the network change relation comprises:
acquiring a mobile terminal indicated by the network change relation from the mobile terminal, wherein the mobile terminal falls back to the first system network from the second system network, so as to obtain a plurality of mobile terminals newly entering the first system network;
And acquiring historical movement data of each mobile terminal newly entering the first system network, screening mobile terminals reasonably entering the first system network from the mobile terminals newly entering the first system network according to the historical movement data, wherein the mobile terminals which are not screened in the new first system network are reference mobile terminals.
6. The method of claim 1, wherein determining N pending cells from the cells in which each reference mobile terminal is located comprises:
Determining a cell where each reference mobile terminal is located according to the mobile data of each reference mobile terminal;
and calculating the number of the reference mobile terminals in each cell, and taking N cells with the largest number of the reference mobile terminals as cells to be processed.
7. The method of claim 3, wherein identifying the location of the interference source based on the location profile of the interfered mobile terminal comprises:
And determining the cell with the most number of interfered mobile terminals in each interfered cell cluster, and identifying the central position of the determined cell as the position of an interference source.
8. An interference source recognition apparatus, comprising:
The acquisition unit is used for acquiring mobile data of each mobile terminal in the monitoring area, extracting resident characteristics of the mobile terminal from the mobile data, wherein the resident characteristics are expressed as network change relations of target cells of the mobile terminal at adjacent moments;
the analysis unit is used for determining the interfered mobile terminal in the monitoring area according to the residence characteristics of the mobile terminal;
An identification unit for identifying the position of the interference source according to the position distribution of the interfered mobile terminal;
The analysis unit is specifically configured to screen each reference mobile terminal that enters the first system network after being interfered from the mobile terminals according to the network change relationship; determining N cells to be processed according to the cells in which each reference mobile terminal is located, wherein N is a natural number greater than 1; calculating a position associated cell cluster corresponding to each cell to be processed according to a pre-constructed regional division model, and obtaining an interfered cell cluster according to the position associated cell cluster, wherein a reference mobile terminal positioned in the interfered cell cluster is an interfered mobile terminal;
The regional division model comprises a position association region and a first screening rule corresponding to the position association region, wherein the first screening rule indicates that a cell which meets a first interfered condition and is positioned in the position association region is a position association cell of the position association region;
The analysis unit is further configured to obtain an initial position associated cell cluster corresponding to each cell to be processed according to the first screening rule, where the center position of each cell to be processed is used as a circle center, and a circular area determined by using the interference distance as a radius is used as a position associated area of each cell to be processed; and carrying out cell de-duplication treatment on the initial position associated cell clusters corresponding to the N cells to be treated, and carrying out classification treatment on the initial position associated cell clusters after de-duplication to obtain one or more position associated cell clusters.
CN202011559953.3A 2020-12-25 2020-12-25 Interference source identification method and device Active CN114760631B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011559953.3A CN114760631B (en) 2020-12-25 2020-12-25 Interference source identification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011559953.3A CN114760631B (en) 2020-12-25 2020-12-25 Interference source identification method and device

Publications (2)

Publication Number Publication Date
CN114760631A CN114760631A (en) 2022-07-15
CN114760631B true CN114760631B (en) 2024-06-04

Family

ID=82324476

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011559953.3A Active CN114760631B (en) 2020-12-25 2020-12-25 Interference source identification method and device

Country Status (1)

Country Link
CN (1) CN114760631B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6332076B1 (en) * 1999-06-28 2001-12-18 Ericsson Inc. Method and system for identifying and analyzing downlink interference sources in a telecommunications network
CN104144423A (en) * 2014-08-08 2014-11-12 中国联合网络通信集团有限公司 False base station positioning method and network server
CN104661204A (en) * 2015-01-05 2015-05-27 中国联合网络通信集团有限公司 Positioning method and device for pseudo base station
CN107659939A (en) * 2016-07-26 2018-02-02 中兴通讯股份有限公司 Identify method and device, the system of pseudo-base station
CN108012271A (en) * 2016-10-28 2018-05-08 中国移动通信有限公司研究院 A kind of pseudo-base station finds method and device
CN109792661A (en) * 2017-09-30 2019-05-21 深圳市云中飞网络科技有限公司 A kind of falling result detection method and device, the computer storage medium of CSFB
CN111163488A (en) * 2018-11-07 2020-05-15 中国移动通信集团四川有限公司 Method, device and equipment for positioning cell interference source and computer storage medium
WO2020113522A1 (en) * 2018-12-06 2020-06-11 深圳市欢太科技有限公司 Pseudo base station identification method, device, mobile terminal and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6332076B1 (en) * 1999-06-28 2001-12-18 Ericsson Inc. Method and system for identifying and analyzing downlink interference sources in a telecommunications network
CN104144423A (en) * 2014-08-08 2014-11-12 中国联合网络通信集团有限公司 False base station positioning method and network server
CN104661204A (en) * 2015-01-05 2015-05-27 中国联合网络通信集团有限公司 Positioning method and device for pseudo base station
CN107659939A (en) * 2016-07-26 2018-02-02 中兴通讯股份有限公司 Identify method and device, the system of pseudo-base station
CN108012271A (en) * 2016-10-28 2018-05-08 中国移动通信有限公司研究院 A kind of pseudo-base station finds method and device
CN109792661A (en) * 2017-09-30 2019-05-21 深圳市云中飞网络科技有限公司 A kind of falling result detection method and device, the computer storage medium of CSFB
CN111163488A (en) * 2018-11-07 2020-05-15 中国移动通信集团四川有限公司 Method, device and equipment for positioning cell interference source and computer storage medium
WO2020113522A1 (en) * 2018-12-06 2020-06-11 深圳市欢太科技有限公司 Pseudo base station identification method, device, mobile terminal and storage medium

Also Published As

Publication number Publication date
CN114760631A (en) 2022-07-15

Similar Documents

Publication Publication Date Title
CN103997757B (en) Pseudo-base station localization method, equipment and information uploading method, equipment
CN103648096A (en) Method for rapidly detecting and positioning illegal base station intrusion
CN104661204B (en) The localization method and device of a kind of pseudo-base station
CN105451232A (en) Pseudo base station detection method and system, terminal and server
CN108462966B (en) 2G network-based high-speed rail cell RRU positioning and identifying method and system
CN108271157B (en) Pseudo base station identification method and device
CN108513301B (en) Illegal user identification method and device
CN108924759B (en) Method, device and system for identifying mobile generator
CN106817712B (en) Positioning method and device and server
CN108243421A (en) Pseudo-base station recognition methods and system
CN104540138B (en) A method of positioning pseudo-base station
CN103079221A (en) Method for conjoint analysis of mobile network condition by using sweep generator and testing mobile phone
CN104427532B (en) The acquisition methods and device of interference in frequency band
CN114697969B (en) Interference source positioning method and device
CN107172622B (en) Method, device and system for identifying and analyzing pseudo base station short message
CN108235323B (en) Big data-based pseudo base station early warning method and system
CN113645625B (en) Pseudo base station positioning method, pseudo base station positioning device, electronic equipment and readable medium
CN110178395A (en) Pseudo-base station recognition methods and terminal
CN114760631B (en) Interference source identification method and device
CN105992214A (en) Method and apparatus for identifying pseudo base station
CN113691483A (en) Method, device and equipment for detecting abnormal user equipment and storage medium
CN107071778A (en) Pseudo-base station recognition methods and data analysing method
CN109982392B (en) Method, device, equipment and medium for configuring adjacent cell of base station cell
CN112911702B (en) Wireless base station positioning method and system
CN107517474B (en) Network analysis optimization method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant