CN117319556A - Network call circulation prevention method, system, electronic equipment and storage medium - Google Patents

Network call circulation prevention method, system, electronic equipment and storage medium Download PDF

Info

Publication number
CN117319556A
CN117319556A CN202311376968.XA CN202311376968A CN117319556A CN 117319556 A CN117319556 A CN 117319556A CN 202311376968 A CN202311376968 A CN 202311376968A CN 117319556 A CN117319556 A CN 117319556A
Authority
CN
China
Prior art keywords
call
network element
network
circulation
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311376968.XA
Other languages
Chinese (zh)
Inventor
陈亮
恽宝霞
张越然
邵剑
张维义
张贺
郎睿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202311376968.XA priority Critical patent/CN117319556A/en
Publication of CN117319556A publication Critical patent/CN117319556A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1016IP multimedia subsystem [IMS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the application provides a method, a system, electronic equipment and a storage medium for preventing call circulation in a network, and belongs to the technical field of network security. The method comprises the following steps: acquiring a call Request, wherein the call Request comprises Request-line, from and To information; when the first network element is determined to continuously receive a plurality of identical call requests from the same network domain at a set time interval, generating a blacklist according to the call requests, and controlling the first network element to intercept the call requests according to the blacklist; reporting the information of the first network element and the call request and carrying out the alarm prompt of the cyclic call. The method and the device can timely monitor the generation of the circulating call and intercept and report the alarm, thereby effectively inhibiting the circulating call of the Internet protocol multimedia subsystem network and ensuring the normal communication of the Internet protocol multimedia subsystem network.

Description

Network call circulation prevention method, system, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of network security technologies, and in particular, to a method, a system, an electronic device, and a storage medium for preventing call circulation in a network.
Background
Call looping has been a very serious network hazard for voice networks. When a call cycle occurs in the network, a large number of call shocks can be caused to each network element in the network when the call cycle is serious, and a network disaster is caused.
The common standard protocol used by current internet protocol multimedia subsystem networks, the SIP protocol, defines message headers Max-Forwards, which define the maximum value of the transfer stations through which a request is allowed to reach its destination address. This value is decremented by 1 each time the request is forwarded. If the request has not reached its destination address at a value of 0, the server will send back a "483" (Too Many Hops) response and terminate the request. The purpose of this header is mainly to not always consume proxy server resources when a loop occurs. The mechanism can only terminate the call cycle after the call has been cycled a number of times when the Max-Forwards value reaches 0.
Thus, when there are a large number of looped calls, the looped calls may still impact the network load; and call loops suppressed in this way cannot be easily found. In addition, this approach fails to suppress the looped call when there is a SIP terminated node in the call route or a scenario in which there is an exception handling Max-Forwards assignment in the call route (refresh Max-Forwards to initial value).
Therefore, the above technical problems are to be solved in industry.
Disclosure of Invention
The embodiment of the application mainly aims to provide a network call circulation prevention method, a system, electronic equipment and a storage medium, so as to overcome the defects in the prior art.
The embodiment of the application discloses the following technical scheme:
in one aspect, an embodiment of the present application provides a method for preventing call looping in a network, which is applied to an internet protocol multimedia subsystem network, and the method includes:
acquiring a call Request, wherein the call Request comprises Request-line, from and To information;
when a first network element is determined to continuously receive a plurality of identical call requests from the same network domain at a set time interval, generating a blacklist according to the call requests, and controlling the first network element to intercept the call requests according to the blacklist;
reporting the information of the first network element and the call request and carrying out the alarm prompt of the cyclic call.
In one embodiment, the internet protocol multimedia subsystem network includes an anti-loop acquisition module, and the acquiring the call request includes:
acquiring a call request through the anti-circulation acquisition module
In one embodiment, the determining that the first network element continuously receives a plurality of identical call requests from the same network domain at a set time interval includes:
And determining, by the anti-circulation acquisition module, that the first network element continuously receives a plurality of identical call requests from the same network domain at a set time interval.
In one embodiment, the internet protocol multimedia subsystem network further includes an anti-loop storage module, and the determining, by the anti-loop acquisition module, that the first network element continuously receives a plurality of identical call requests from the same network domain at a set time interval includes:
judging whether the first network element continuously receives a plurality of identical call requests from the same network domain at a set time interval or not through the anti-circulation acquisition module;
if the judgment result is that the first network element continuously receives a plurality of identical call requests from the same network domain at a set time interval, the anti-circulation acquisition module sends the information of the first network element and the call requests to the anti-circulation storage module;
and controlling the anti-circulation storage module to store the information of the first network element and the call request.
In one embodiment, the internet protocol multimedia subsystem network includes an anti-loop storage module and an anti-loop execution module, the generating a blacklist according to the call request, and controlling the first network element to intercept the call request according to the blacklist includes:
Transmitting the information of the first network element and the call request to the anti-circulation executing module through the anti-circulation storage module;
generating a blacklist according to the call request through the anti-circulation execution module;
and controlling the first network element to intercept the call request according to the blacklist through the anti-circulation execution module.
In one embodiment, the internet protocol multimedia subsystem network includes an anti-circulation storage module and an anti-circulation alarm module, and the reporting the information of the first network element and the call request and the alarm prompt for performing the circulation call include:
transmitting the information of the first network element and the call request to the anti-circulation alarm module through the anti-circulation storage module;
and outputting an alarm prompt according to the information of the first network element and the call request through the anti-circulation alarm module.
In one embodiment, when determining that the first network element continuously receives a plurality of identical call requests from the same network domain at a set time interval, generating a blacklist according to the call requests includes:
and when the first network element is determined To continuously receive a plurality of call requests with the same From information and To information From the same network domain at set time intervals, generating a blacklist according To Request-line information of the call requests.
In one embodiment, the method further comprises:
and sending the information of the first network element and the call request to a service system through the anti-circulation storage module so that the service system returns the information of a second network element causing circulation call.
In another aspect, an embodiment of the present application provides a network anti-call circulation system, applied to an internet protocol multimedia subsystem network, including:
a first unit configured To obtain a call Request, where the call Request includes Request-line, from, and To information;
a second unit, configured to, when determining that a first network element continuously receives a plurality of identical call requests from a same network domain at a set time interval, generate a blacklist according to the call requests, and control the first network element to intercept the call requests according to the blacklist;
and the third unit is used for reporting the information of the first network element and the call request and carrying out the alarm prompt of the cyclic call.
In another aspect, an embodiment of the present application provides a network anti-call circulation system, where the system includes:
the anti-circulation acquisition module is used for acquiring call requests and determining whether a first network element continuously receives a plurality of identical call requests from the same network domain at a set time interval;
The anti-circulation storage module is used for continuously receiving a plurality of identical call requests from the same network domain at a set time interval by a first network element, storing the information of the first network element and the call requests, sending the information of the first network element and the call requests to the anti-circulation execution module, and sending the information of the first network element and the call requests to the anti-circulation alarm module;
the anti-circulation execution module is used for generating a blacklist according to the call request and controlling the first network element to intercept the call request according to the blacklist;
and the anti-circulation alarm module is used for outputting an alarm prompt according to the information of the first network element and the call request.
On the other hand, the embodiment of the application provides electronic equipment, which comprises a memory and a processor, wherein the memory stores a computer program, and the processor realizes the network call circulation prevention method when executing the computer program.
In another aspect, an embodiment of the present application provides a computer readable storage medium, where a computer program is stored, where the computer program is executed by a processor to implement the above-mentioned network anti-call circulation method.
According to the network anti-call circulation method, system, electronic equipment and storage medium, through acquiring call requests, when a first network element is determined to continuously receive a plurality of identical call requests from the same network domain at a set time interval, a blacklist is generated according to the call requests, the first network element is controlled to intercept the call requests according to the blacklist, the generation of circulation calls is monitored in time, the circulation calls are intercepted, information of the first network element and the call requests are reported, and an alarm prompt for the circulation calls is conducted, so that the circulation calls are intercepted and reported in time.
Drawings
Fig. 1 is a flowchart of a method for preventing call circulation in a network according to an embodiment of the present application;
fig. 2 is a flowchart of another method for preventing call circulation in a network according to an embodiment of the present application;
fig. 3 is a flowchart of another method for preventing call circulation in a network according to an embodiment of the present application;
fig. 4 is a flowchart of another method for preventing call circulation in a network according to an embodiment of the present application;
Fig. 5 is a flowchart of step S203 in fig. 2;
FIG. 6 is a flow diagram of a call looping service scenario;
FIG. 7 is a schematic diagram of a call looping business scenario in which the method of the present application is applied;
fig. 8 is a schematic structural diagram of a network anti-call circulation system according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of another network anti-call circulation system according to an embodiment of the present application;
fig. 10 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
It should be noted that although functional block division is performed in a device diagram and a logic sequence is shown in a flowchart, in some cases, the steps shown or described may be performed in a different order than the block division in the device, or in the flowchart. The terms first, second and the like in the description and in the claims and in the above-described figures, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein is for the purpose of describing embodiments of the present application only and is not intended to be limiting of the present application.
First, several nouns referred to in this application are parsed:
loop Call (Loop Call): an abnormal situation occurring in a communication system, i.e. a call forms a closed loop in the network, causes the call to be continuously and circularly forwarded on the same path, and cannot be successfully connected or terminated.
Internet protocol multimedia subsystem (IP Multimedia Subsystem, IMS): is a multimedia communication system based on IP technology that provides a flexible, scalable and interoperable service architecture. Internet protocol multimedia subsystem networks are widely used in modern communication networks, including fixed networks and mobile networks, to support voice calls, video calls, messaging, and other multimedia services.
Network Element (Network Element): refers to a device or node in a telecommunications network that assumes a particular function. They may be hardware devices, software programs or a combination of both. The network elements play a role in connecting and transmitting data in the telecommunication network and are the basic building blocks in the network.
UAC: on behalf of the user agent client or terminal device, is the party initiating the call and is responsible for initiating SIP requests to establish a communication session.
PROXY: refers to a proxy server that acts as an intermediary in network communications, serving to forward and route data. In the SIP protocol, PROXY servers are used to relay and process call requests.
Request line (Request-line) the Request line contains the method of the Request and Uniform Resource Identifier (uniform resource identifier). In a call request, a common method is INVITE, which means that a new call is initiated.
Source (From field) the From field indicates the source of the call, i.e. the source address of the call. It contains the identity information of the initiator, usually in the form of a SIP URI.
The destination (To field) To field indicates the destination recipient of the call, i.e., the destination address of the call.
Session initiation protocol (Session Initiation Protocol, SIP): is an IP-based communication protocol for establishing, modifying and terminating multimedia sessions such as voice calls, video calls, and real-time messages.
Max-Forwards: is a header field in SIP for controlling the number of hops of a SIP message. It represents the maximum number of hops a message can traverse during delivery.
Call looping has been a very serious network hazard for voice networks. When a call cycle occurs in the network, a large number of call shocks can be caused to each network element in the network when the call cycle is serious, and a network disaster is caused.
The common standard protocol used by current internet protocol multimedia subsystem networks, the SIP protocol, defines message headers Max-Forwards, which define the maximum value of the transfer stations through which a request is allowed to reach its destination address. This value is decremented by 1 each time the request is forwarded. If the request has not reached its destination address at a value of 0, the server will send back a "483" (Too Many Hops) response and terminate the request. The purpose of this header is mainly to not always consume proxy server resources when a loop occurs. The mechanism can only go through multiple loops for one call, and the call is terminated after the value of Max-Forwards reaches 0.
Thus, when there are a large number of looped calls, the looped calls may still impact the network load; and call loops suppressed in this way cannot be easily found. In addition, this approach fails to suppress the looped call when there is a SIP terminated node in the call route or a scenario in which there is an exception handling Max-Forwards assignment in the call route (refresh Max-Forwards to initial value).
Based on this, the embodiment of the application provides a method, a system, electronic equipment and a storage medium for preventing call circulation of a network, which aim to monitor generation of circulation calls in time, intercept and report alarms, inhibit circulation calls of an internet protocol multimedia subsystem network and ensure normal communication of the internet protocol multimedia subsystem network.
The method, system, electronic device and storage medium for preventing call circulation in a network according to the embodiments of the present application are specifically described by the following embodiments, and the method for preventing call circulation in a network according to the embodiments of the present application is described first.
The embodiment of the application provides a network call circulation prevention method, which relates to the technical field of network security. The network call circulation prevention method provided by the embodiment of the application can be applied to a terminal, a server side and software running in the terminal or the server side. In some embodiments, the terminal may be a smart phone, tablet, notebook, desktop, etc.; the server side can be configured as an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, and a cloud server for providing cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDNs, basic cloud computing services such as big data and artificial intelligent platforms and the like; the software may be an application or the like that implements the network anti-call circulation method, but is not limited to the above form.
The subject application is operational with numerous general purpose or special purpose computer system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like. The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
Fig. 1 is an optional flowchart of a network anti-call circulation method provided in an embodiment of the present application, where the method in fig. 1 may include, but is not limited to, steps S101 to S103, and the method in fig. 1 is not limited to an execution body.
Step S101, obtaining a call request;
specifically, in an internet protocol multimedia subsystem network, a call Request is transmitted using the SIP protocol, and the call Request includes Request-line, from and To information.
The method for acquiring the call request is not particularly limited, and can be flexibly selected according to actual acquisition requirements. The call request may be obtained by using a network analyzer (e.g., wireshark), or by using a dedicated SIP packet-grabbing tool, for example.
In this embodiment, the acquisition of the call request provides for subsequent call cycle interception and reporting of the alert.
Step S102, when it is determined that the first network element continuously receives a plurality of identical call requests from the same network domain at a set time interval, a blacklist is generated according to the call requests, and the first network element is controlled to intercept the call requests according to the blacklist.
Specifically, the first network element is a network element that receives a call request.
The time interval is not particularly limited, and the time interval can be flexibly selected according to actual requirements. Illustratively, since a single cycle of field packet capture using a SIP packet capture tool is typically 100-150ms, a set time interval of 200ms may be used, or a set time interval of 250ms may be used.
In some embodiments, the same call request is determined by From, to information in the call request.
Optionally, a blacklist is generated according to the Request-line field information in the call Request, the blacklist is issued to the first network element, and the first network element is controlled to intercept the call Request according to the blacklist.
It should be noted that, when each call cycle ends, the blacklist needs to be cleared.
In this embodiment, when it is determined that the first network element continuously receives multiple identical call requests from the same network domain at a set time interval, a blacklist is generated according to the call requests, and the first network element is controlled to intercept the call requests according to the blacklist, so that generation of a cyclic call can be monitored in time and intercepted, the cyclic call of the internet protocol multimedia subsystem network can be effectively suppressed, normal communication of the internet protocol multimedia subsystem network is ensured, unnecessary network resource consumption is reduced, and communication security is improved.
Step S103, reporting the information of the first network element and the call request and carrying out the alarm prompt of the cyclic call.
Specifically, the alert prompt includes information of the first network element and Request-line, from, to field information in the call Request. The alert prompts are used to prompt the user or the operator for the generation of a call cycle and to assist the user in handling the call cycle.
In this embodiment, the information of the first network element and the call request are reported and the alarm prompt of the cyclic call is performed, so that real-time monitoring and diagnosis of the network state can be realized. Users or operation and maintenance personnel can know the running condition of the network, detect potential problems and timely take corresponding measures to conduct fault elimination or optimization adjustment according to the information, and the network safety is improved.
Step S101 to step S103 illustrated in the embodiment of the present application, by obtaining a call request, when it is determined that a first network element continuously receives a plurality of identical call requests from the same network domain at a set time interval, a blacklist is generated according to the call request, and the first network element is controlled to intercept the call request according to the blacklist; the information of the first network element and the call request are reported and the alarm prompt of the circulating call is carried out, so that the generation of the circulating call is monitored in time, interception and alarm reporting are carried out, the circulating call of the Internet protocol multimedia subsystem network is effectively restrained, and the normal communication of the Internet protocol multimedia subsystem network is ensured.
Fig. 2 is an optional flowchart of a method for preventing call looping in a network according to an embodiment of the present application, where the method in fig. 2 may include, but is not limited to, steps S201 to S204, and the method in fig. 2 is advantageous for fault determination.
Step S201, a call request is acquired.
Step S202, when it is determined that the first network element continuously receives a plurality of identical call requests from the same network domain at a set time interval, a blacklist is generated according to the call requests, and the first network element is controlled to intercept the call requests according to the blacklist.
Step S203, the information of the first network element and the call request are sent to the service system, so that the service system returns the information of the second network element that causes the looped call.
In particular, the second network element is a network element that may send a call cycle, and the service system is a system for estimating the second network element.
The number of the second network elements is not particularly limited, and the second network elements can be flexibly selected according to actual requirements. The second network element may comprise a plurality of network elements, or may comprise a single network element.
The service system is not particularly limited, and the service system can be flexibly selected according to actual requirements. The business system may illustratively employ an autopilot system, as well as other analysis systems.
In some embodiments, the service system obtains the second network element through data analysis.
In some embodiments, the user or the operation staff performs troubleshooting according to the information of the second network element.
In this embodiment, the information of the first network element and the call request are sent to the service system, so that the service system returns the information of the second network element that causes the cyclic call, which is beneficial to the user or the operation and maintenance personnel to reduce the investigation range and to determine the fault.
Step S204, reporting the information of the first network element and the call request and carrying out the alarm prompt of the cyclic call.
In some embodiments, the service system reports information of the second network element.
In some embodiments, the alert hint includes information of the first network element, information of the second network element, and Request-line, from, to field information in the call Request.
In this embodiment, the information of the first network element and the call request are reported and the alarm prompt of the cyclic call is performed, which is beneficial to the user or the operation and maintenance personnel to reduce the investigation range and to fault judgment.
Step S201 to step S204 illustrated in the embodiment of the present application, by obtaining a call request, when it is determined that a first network element continuously receives a plurality of identical call requests from the same network domain at a set time interval, a blacklist is generated according to the call request, and the first network element is controlled to intercept the call request according to the blacklist; transmitting the information of the first network element and the call request to a service system so that the service system returns the information of a second network element which causes the cyclic call; the information of the first network element and the call request are reported and the alarm prompt of the circulating call is carried out, so that the generation of the circulating call is monitored in time, interception and alarm reporting are carried out, the circulating call of the Internet protocol multimedia subsystem network is effectively restrained, the normal communication of the Internet protocol multimedia subsystem network is ensured, the reduction of the investigation range of a user or operation and maintenance personnel is facilitated, and the fault judgment is facilitated.
Fig. 3 is an optional flowchart of a method for preventing call looping in a network according to an embodiment of the present application, where the method in fig. 3 may include, but is not limited to, steps S301 to S305, and the method in fig. 3 is based on a network structure.
Step S301, a call request is acquired through an anti-circulation acquisition module.
Unlike step S101, in particular, the internet protocol multimedia subsystem network includes an anti-loop acquisition module, which is used to obtain a call request.
In this embodiment, the anti-cycle acquisition module acquires the call request to prepare for call cycle interception of the subsequent cycle execution module and reporting alarm of the anti-cycle alarm module.
Step S302, judging whether the first network element continuously receives a plurality of identical call requests from the same network domain at a set time interval through an anti-circulation acquisition module, if so, executing step S303; otherwise, the process is ended.
Specifically, the anti-loop acquisition module is further configured to determine that the first network element continuously receives a plurality of identical call requests from the same network domain at a set time interval.
In some embodiments, the anti-loop acquisition module determines the same call request From the From, to information of the call request.
In some embodiments, the monitoring frequency of the anti-cycle acquisition module is adjustable, and since a single cycle of on-site packet capture is typically 100-150ms, it is recommended to use 5 times per second or 8 times per second as the monitoring frequency.
In this embodiment, the anti-circulation acquisition module determines whether the first network element continuously receives a plurality of identical call requests from the same network domain at a set time interval, so as to determine whether a circulation call is generated, and prepare for call circulation interception of the subsequent circulation execution module and report alarm of the anti-circulation alarm module.
Step S303, when it is determined that the first network element continuously receives a plurality of identical call requests from the same network domain at a set time interval, a blacklist is generated according to the call requests through the anti-loop execution module.
Specifically, the internet protocol multimedia subsystem network further comprises an anti-loop execution module, and the anti-loop execution module is used for generating a blacklist according to the call request.
Optionally, the anti-loop execution module generates a blacklist according to the Request-line field information in the call Request.
In some embodiments, after the anti-loop execution module generates the blacklist according to the call request, the anti-loop execution module issues the blacklist to the first network element.
In this embodiment, the anti-loop execution module generates a blacklist according to the call request, so as to prepare for subsequent interception of the call request according to the blacklist.
Step S304, the first network element is controlled by the anti-circulation execution module to intercept the call request according to the blacklist.
Specifically, the anti-circulation execution module is further configured to control the first network element to intercept the call request according to the blacklist.
In some embodiments, the anti-loop execution module controls the first network element to intercept the call Request according to the Request-line information in the blacklist.
It should be noted that, when each call cycle is ended, the blacklist of the anti-cycle execution module and the first network element needs to be cleared.
In this embodiment, the anti-circulation execution module controls the first network element to intercept the call request according to the blacklist, so that the circulation call of the internet protocol multimedia subsystem network is effectively restrained, and the normal communication of the internet protocol multimedia subsystem network is ensured.
Step S305, outputting an alarm prompt according to the information of the first network element and the call request through the anti-circulation alarm module.
Specifically, the internet protocol multimedia subsystem network further comprises an anti-circulation alarm module, and the anti-circulation alarm module is used for outputting alarm prompts.
In this embodiment, the anti-circulation alarm module outputs an alarm prompt according to the information of the first network element and the call request, so that a user or an operation and maintenance person can know the running condition of the network, detect potential problems and timely take corresponding measures to perform fault elimination or optimization adjustment according to the information, thereby being beneficial to improving the security of the network.
In the steps S301 to S305 illustrated in the embodiments of the present application, the anti-circulation acquisition module is used to acquire a call request, the anti-circulation acquisition module is used to determine that the first network element continuously receives multiple identical call requests from the same network domain at a set time interval, the anti-circulation execution module is used to generate a blacklist according to the call request, the anti-circulation execution module is used to control the first network element to intercept the call request according to the blacklist, and the anti-circulation alarm module is used to output an alarm prompt according to the information of the first network element and the call request, so that the generation of a circulation call is monitored in time, interception and alarm reporting are performed, the circulation call of the internet protocol multimedia subsystem network is effectively suppressed, and the normal communication of the internet protocol multimedia subsystem network is ensured.
Fig. 4 is an optional flowchart of a method for preventing call looping in a network according to an embodiment of the present application, where the method in fig. 4 may include, but is not limited to, steps S401 to S409.
Step S401, a call request is acquired through an anti-circulation acquisition module.
Step S402, judging whether the first network element continuously receives a plurality of identical call requests from the same network domain at a set time interval by an anti-circulation acquisition module, if so, executing step S403; otherwise, the process is ended.
Specifically, the anti-circulation acquisition module judges whether the first network element continuously receives a plurality of identical call requests From the same network domain at a set time interval or not according To the From and To information of the call requests.
In this embodiment, the anti-circulation acquisition module determines whether the first network element continuously receives a plurality of identical call requests from the same network domain at a set time interval, if yes, step S403 is executed; otherwise, the process is ended.
Step S403, when it is determined that the first network element continuously receives a plurality of identical call requests from the same network domain at the set time interval, the anti-cycle acquisition module sends the information of the first network element and the call requests to the anti-cycle storage module.
In some embodiments, if the determining result is that the first network element continuously receives the plurality of identical call requests from the same network domain at the set time interval, the anti-circulation acquisition module sends the information of the first network element and the call requests to the anti-circulation storage module.
In this embodiment, the anti-circulation acquisition module sends the information of the first network element and the call request to the anti-circulation storage module, so as to prepare for the subsequent anti-circulation storage module to store the information of the first network element and the call request.
Step S404, the control anti-circulation storage module stores the information of the first network element and the call request.
Specifically, the internet protocol multimedia subsystem network further comprises an anti-circulation storage module, wherein the anti-circulation storage module is used for storing the information of the first network element and the call request, and sending and receiving the information of the first network element and the call request.
In this embodiment, the anti-circulation storage module is controlled to store the information of the first network element and the call request, so as to prepare for subsequent call request interception and reporting.
Step S405, the anti-loop storage module sends the information of the first network element and the call request to the anti-loop execution module.
In some embodiments, the anti-loop storage module is further configured to send the information of the first network element and the call request.
In this embodiment, the anti-loop storage module sends the information of the first network element and the call request to the anti-loop execution module to prepare for subsequent call request interception.
In step S406, a blacklist is generated by the anti-loop execution module according to the call request.
In some embodiments, the anti-loop execution module sends the blacklist to the first network element according to the information of the first network element.
Step S407, the first network element is controlled by the anti-circulation execution module to intercept the call request according to the blacklist.
In step S408, the information of the first network element and the call request are sent to the anti-circulation alarm module through the anti-circulation storage module.
In some embodiments, the anti-loop storage module is further configured to send the information of the first network element and the call request to the anti-loop alarm module.
In this embodiment, the anti-circulation storage module sends the information of the first network element and the call request to the anti-circulation alarm module, so as to prepare for subsequent output alarm prompts.
Step S409, outputting alarm prompt according to the information of the first network element and the call request by the anti-circulation alarm module.
In the steps S401 to S409 illustrated in the embodiment of the present application, the anti-circulation acquisition module is used to acquire a call request, the anti-circulation acquisition module is used to determine whether the first network element continuously receives multiple identical call requests from the same network domain at a set time interval, if the determination result is that the first network element continuously receives multiple identical call requests from the same network domain at the set time interval, the anti-circulation acquisition module sends the information of the first network element and the call request to the anti-circulation storage module, controls the anti-circulation storage module to store the information of the first network element and the call request, sends the information of the first network element and the call request to the anti-circulation execution module, and controls the first network element to intercept the call request according to the blacklist through the anti-circulation execution module, and sends the information of the first network element and the call request to the anti-circulation alarm module through the anti-circulation alarm module, thereby timely monitoring the generation of the circulation call and the alarm report according to the information of the first network element and the call request, and effectively suppressing the generation of the alarm report, and the normal communication of the multimedia subsystem of the internet protocol subsystem is guaranteed.
Referring to fig. 5, in some embodiments, step S203 may include, but is not limited to, steps S501 to S503:
in step S501, the information of the first network element and the call request are sent to the service system through the anti-loop storage module.
In some embodiments, the anti-loop storage module sends the information of the first network element and the call request to the service system through the interface.
Step S502, data analysis is carried out through the service system to obtain information of a second network element which leads to the cyclic call.
The number of the second network elements is not particularly limited, and the second network elements can be flexibly selected according to actual requirements. The second network element may comprise a plurality of network elements, or may comprise a single network element.
In step S503, the information of the second network element is returned through the service system.
In the steps S501 to S503 illustrated in the embodiments of the present application, the information of the first network element and the call request are sent to the service system through the anti-circulation storage module, the service system performs data analysis to obtain the information of the second network element that causes the circulation call, and the service system returns the information of the second network element, so that the user or the operation and maintenance personnel can reduce the investigation range, and the fault judgment is facilitated.
Referring to fig. 6, fig. 6 is a flow chart of a call circulation service scenario.
Specifically, the call circulation service scenario includes UAC, PROXY1, UAS and non-SIP networks.
The UAC is responsible for initiating a SIP request, and the UAC sends the SIP request to PROXY1, wherein the SIP request is a call request of the application.
PROXY1 receives the SIP request from the UAC and processes PROXY1 to send the request to the UAS (SIP termination).
The UAS is configured to receive and process the SIP request.
The non-SIP network is responsible for forwarding and security control of network data, but does not directly participate in the processing of the SIP protocol.
In some embodiments, max-Forwards resets to an initial value when a UAC (SIP Start point) initiates a SIP request.
Referring to fig. 7, fig. 7 is a schematic diagram of a call cycle service scenario in which the method of the present application is applied.
The flow of the application method applied to the call circulation service scene is as follows:
the anti-circulation acquisition module acquires call signaling in real time, and when a certain network element (namely a first network element) is found To continuously receive a plurality of calls with the same From and To information From the same office within 1 second, an anti-circulation processing mechanism is started, network element node information is recorded, and Request-line information in a call Request is received.
The anti-loop storage module stores the network element (i.e. the first network element) which discovers the loop call and the Request-line, from, to information in the call Request.
The anti-circulation execution module sends the content of the Request-line as a blacklist to a corresponding network element (namely the first network element) to require the first network element to do blacklist interception.
The anti-circulation alarm module reports the alarm and reports the recorded network element information To the alarm module by sucking the information of the Request-line, from and To fields in the call Request.
In some embodiments, the first network element of the present application may include, but is not limited to, a UAS (SIP termination).
Referring to fig. 8, an embodiment of the present application further provides a network anti-call circulation system, which is applied to an internet protocol multimedia subsystem network. The above network anti-call circulation method can be implemented, and the anti-call circulation system comprises:
a first unit 801, configured To obtain a call Request, where the call Request includes Request-line, from, and To information;
a second unit 802, configured to, when determining that the first network element continuously receives a plurality of identical call requests from the same network domain at a set time interval, generate a blacklist according to the call requests, and control the first network element to intercept the call requests according to the blacklist;
and a third unit 803, configured to report the information of the first network element and the call request and perform an alarm prompt for the cyclic call.
The content of the method embodiment of the invention is suitable for the system embodiment, the specific function of the system embodiment is the same as that of the method embodiment, and the achieved beneficial effects are the same as those of the method.
Referring to fig. 9, an embodiment of the present application further provides a network anti-call circulation system, which may implement the above network anti-call circulation method, where the system includes:
the anti-circulation acquisition module 901 is configured to acquire a call request, and determine whether a first network element continuously receives a plurality of identical call requests from the same network domain at a set time interval;
an anti-circulation storage module 902, configured to, when determining that a first network element continuously receives a plurality of identical call requests from the same network domain at a set time interval, save information of the first network element and the call requests, send the information of the first network element and the call requests to the anti-circulation execution module, and send the information of the first network element and the call requests to the anti-circulation alarm module;
the anti-circulation execution module 903 is configured to generate a blacklist according to the call request, and control the first network element to intercept the call request according to the blacklist;
and the anti-circulation alarm module 904 is configured to output an alarm prompt according to the information of the first network element and the call request.
The content of the method embodiment of the invention is suitable for the system embodiment, the specific function of the system embodiment is the same as that of the method embodiment, and the achieved beneficial effects are the same as those of the method.
The embodiment of the application also provides electronic equipment, which comprises a memory and a processor, wherein the memory stores a computer program, and the processor realizes the network call circulation prevention method when executing the computer program. The electronic equipment can be any intelligent terminal including a tablet personal computer, a vehicle-mounted computer and the like.
The content of the method embodiment of the invention is suitable for the electronic equipment embodiment, the functions of the electronic equipment embodiment are the same as those of the method embodiment, and the achieved beneficial effects are the same as those of the method.
Referring to fig. 10, fig. 10 illustrates a hardware structure of an electronic device according to another embodiment, the electronic device includes:
the processor 1001 may be implemented by using a general-purpose CPU (central processing unit), a microprocessor, an application-specific integrated circuit (ApplicationSpecificIntegratedCircuit, ASIC), or one or more integrated circuits, etc. to execute related programs to implement the technical solutions provided by the embodiments of the present application;
the memory 1002 may be implemented in the form of read-only memory (ReadOnlyMemory, ROM), static storage, dynamic storage, or random access memory (RandomAccessMemory, RAM). The memory 1002 may store an operating system and other application programs, and when the technical solutions provided in the embodiments of the present application are implemented by software or firmware, relevant program codes are stored in the memory 1002, and the processor 1001 invokes a method for executing the network anti-call circulation method in the embodiments of the present application;
An input/output interface 1003 for implementing information input and output;
the communication interface 1004 is configured to implement communication interaction between the present device and other devices, and may implement communication in a wired manner (e.g. USB, network cable, etc.), or may implement communication in a wireless manner (e.g. mobile network, WIFI, bluetooth, etc.);
a bus 1005 for transferring information between the various components of the device (e.g., the processor 1001, memory 1002, input/output interface 1003, and communication interface 1004);
wherein the processor 1001, the memory 1002, the input/output interface 1003, and the communication interface 1004 realize communication connection between each other inside the device through the bus 1005.
The embodiment of the application also provides a computer readable storage medium, wherein the computer readable storage medium stores a computer program, and the computer program realizes the network call circulation prevention method when being executed by a processor.
The content of the method embodiment of the invention is applicable to the storage medium embodiment, the specific function of the storage medium embodiment is the same as that of the method embodiment, and the achieved beneficial effects are the same as those of the method.
The memory, as a non-transitory computer readable storage medium, may be used to store non-transitory software programs as well as non-transitory computer executable programs. In addition, the memory may include high-speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory optionally includes memory remotely located relative to the processor, the remote memory being connectable to the processor through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
According to the network anti-call circulation method, the system, the electronic equipment and the storage medium, call requests are acquired, when a first network element is determined to continuously receive a plurality of same call requests from the same network domain at a set time interval, a blacklist is generated according to the call requests, and the first network element is controlled to intercept the call requests according to the blacklist; the information of the first network element and the call request are reported and the alarm prompt of the circulating call is carried out, so that the generation of the circulating call is monitored in time, interception and alarm reporting are carried out, the circulating call of the Internet protocol multimedia subsystem network is effectively restrained, and the normal communication of the Internet protocol multimedia subsystem network is ensured.
The embodiments described in the embodiments of the present application are for more clearly describing the technical solutions of the embodiments of the present application, and do not constitute a limitation on the technical solutions provided by the embodiments of the present application, and as those skilled in the art can know that, with the evolution of technology and the appearance of new application scenarios, the technical solutions provided by the embodiments of the present application are equally applicable to similar technical problems.
It will be appreciated by those skilled in the art that the technical solutions shown in the figures do not constitute limitations of the embodiments of the present application, and may include more or fewer steps than shown, or may combine certain steps, or different steps.
The above described apparatus embodiments are merely illustrative, wherein the units illustrated as separate components may or may not be physically separate, i.e. may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
Those of ordinary skill in the art will appreciate that all or some of the steps of the methods, systems, functional modules/units in the devices disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof.
The terms "first," "second," "third," "fourth," and the like in the description of the present application and in the above-described figures, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that embodiments of the present application described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be understood that in this application, "at least one" means one or more, and "a plurality" means two or more. "and/or" for describing the association relationship of the association object, the representation may have three relationships, for example, "a and/or B" may represent: only a, only B and both a and B are present, wherein a, B may be singular or plural. The character "/" generally indicates that the context-dependent object is an "or" relationship. "at least one of" or the like means any combination of these items, including any combination of single item(s) or plural items(s). For example, at least one (one) of a, b or c may represent: a, b, c, "a and b", "a and c", "b and c", or "a and b and c", wherein a, b, c may be single or plural.
In the several embodiments provided in this application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the above-described division of units is merely a logical function division, and there may be another division manner in actual implementation, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described above as separate components may or may not be physically separate, and components shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in part or all of the technical solution or in part in the form of a software product stored in a storage medium, including multiple instructions to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods of the various embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing a program.
Preferred embodiments of the present application are described above with reference to the accompanying drawings, and thus do not limit the scope of the claims of the embodiments of the present application. Any modifications, equivalent substitutions and improvements made by those skilled in the art without departing from the scope and spirit of the embodiments of the present application shall fall within the scope of the claims of the embodiments of the present application.

Claims (10)

1. A method for preventing call looping in a network, the method being applied to an internet protocol multimedia subsystem network, the method comprising:
acquiring a call Request, wherein the call Request comprises Request-line, from and To information;
when a first network element is determined to continuously receive a plurality of identical call requests from the same network domain at a set time interval, generating a blacklist according to the call requests, and controlling the first network element to intercept the call requests according to the blacklist;
reporting the information of the first network element and the call request and carrying out the alarm prompt of the cyclic call.
2. The method of claim 1, wherein the internet protocol multimedia subsystem network comprises an anti-loop acquisition module, the acquiring the call request comprising:
acquiring a call request through the anti-circulation acquisition module
3. The method of claim 2, wherein said determining that the first network element continuously receives a plurality of identical call requests from the same network domain at set time intervals comprises:
and determining, by the anti-circulation acquisition module, that the first network element continuously receives a plurality of identical call requests from the same network domain at a set time interval.
4. A method according to claim 3, wherein the internet protocol multimedia subsystem network further comprises an anti-loop storage module, and wherein said determining, by the anti-loop acquisition module, that the first network element continuously receives a plurality of identical call requests from the same network domain at set time intervals comprises:
judging whether the first network element continuously receives a plurality of identical call requests from the same network domain at a set time interval or not through the anti-circulation acquisition module;
if the judgment result is that the first network element continuously receives a plurality of identical call requests from the same network domain at a set time interval, the anti-circulation acquisition module sends the information of the first network element and the call requests to the anti-circulation storage module;
and controlling the anti-circulation storage module to store the information of the first network element and the call request.
5. The method of claim 1, wherein the internet protocol multimedia subsystem network includes an anti-loop storage module and an anti-loop execution module, wherein the generating a blacklist according to the call request, controlling the first network element to intercept the call request according to the blacklist, comprises:
transmitting the information of the first network element and the call request to the anti-circulation executing module through the anti-circulation storage module;
generating a blacklist according to the call request through the anti-circulation execution module;
and controlling the first network element to intercept the call request according to the blacklist through the anti-circulation execution module.
6. The method of claim 1, wherein when determining that the first network element continuously receives a plurality of identical call requests from the same network domain at a set time interval, generating a blacklist according to the call requests comprises:
and when the first network element is determined To continuously receive a plurality of call requests with the same From information and To information From the same network domain at set time intervals, generating a blacklist according To Request-li ne information of the call requests.
7. A network anti-call circulation system for use in an internet protocol multimedia subsystem network, the anti-call circulation system comprising:
A first unit configured To acquire a call Request, where the call Request includes Request-li ne, from, and To information;
a second unit, configured to, when determining that a first network element continuously receives a plurality of identical call requests from a same network domain at a set time interval, generate a blacklist according to the call requests, and control the first network element to intercept the call requests according to the blacklist;
and the third unit is used for reporting the information of the first network element and the call request and carrying out the alarm prompt of the cyclic call.
8. A network anti-call circulation system, the system comprising:
the anti-circulation acquisition module is used for acquiring call requests and determining whether a first network element continuously receives a plurality of identical call requests from the same network domain at a set time interval;
the anti-circulation storage module is used for continuously receiving a plurality of identical call requests from the same network domain at a set time interval by a first network element, storing the information of the first network element and the call requests, sending the information of the first network element and the call requests to the anti-circulation execution module, and sending the information of the first network element and the call requests to the anti-circulation alarm module;
The anti-circulation execution module is used for generating a blacklist according to the call request and controlling the first network element to intercept the call request according to the blacklist;
and the anti-circulation alarm module is used for outputting an alarm prompt according to the information of the first network element and the call request.
9. An electronic device comprising a memory storing a computer program and a processor that when executing the computer program implements the network anti-call cycle method of any one of claims 1 to 6.
10. A computer readable storage medium storing a computer program, wherein the computer program when executed by a processor implements the network anti-call circulation method of any one of claims 1 to 6.
CN202311376968.XA 2023-10-23 2023-10-23 Network call circulation prevention method, system, electronic equipment and storage medium Pending CN117319556A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311376968.XA CN117319556A (en) 2023-10-23 2023-10-23 Network call circulation prevention method, system, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311376968.XA CN117319556A (en) 2023-10-23 2023-10-23 Network call circulation prevention method, system, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117319556A true CN117319556A (en) 2023-12-29

Family

ID=89255273

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311376968.XA Pending CN117319556A (en) 2023-10-23 2023-10-23 Network call circulation prevention method, system, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117319556A (en)

Similar Documents

Publication Publication Date Title
KR101109276B1 (en) Sustaining session connections
US8244887B2 (en) HTTP push to simulate server-initiated sessions
US10567483B2 (en) Method and apparatus for high performance low latency real time notification delivery
EP2741541B1 (en) Capability inquiry method, communication terminal and application server
US8364827B2 (en) Communication system
CN103312528B (en) A kind of heartbeat message sending method and user terminal
CN105516640B (en) A kind of detection method and system of video communication session exception
CN104219705B (en) VoLTE terminal re-registration method and device
CN101997850B (en) Call management method and device for IP (Internet Protocol) multimedia subsystem
CA2979824C (en) Method and system for transferring messages between messaging systems
US10038664B2 (en) Terminal status subscription method, apparatus, and system
CN106101468B (en) Method and device for determining transmission link
WO2013159492A1 (en) Method and system for reporting and downloading information
KR102131260B1 (en) Cloud system OF IP Multimedia Subsystem
CN117319556A (en) Network call circulation prevention method, system, electronic equipment and storage medium
US9866644B2 (en) Terminal, message distribution system, message distribution method, and computer-readable medium
JP2014146876A (en) Message distribution system and message distribution method
CN113965495A (en) Method and device for detecting activity of terminal application program, electronic equipment and storage medium
CN113037803A (en) Geological disaster monitoring method and system, electronic equipment and storage medium
US9367367B2 (en) Application router
CN108337215B (en) File transmission method, system and device and electronic equipment
CN111294358A (en) Message processing method and device
CN108881774A (en) The calling system and method for multi-media network call
US10367900B2 (en) Presence notifications
US11102268B2 (en) RTP monitoring device and RTP monitoring method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination