CN1832450A - Method for preventing offence between inserted users - Google Patents

Method for preventing offence between inserted users Download PDF

Info

Publication number
CN1832450A
CN1832450A CNA2005100535568A CN200510053556A CN1832450A CN 1832450 A CN1832450 A CN 1832450A CN A2005100535568 A CNA2005100535568 A CN A2005100535568A CN 200510053556 A CN200510053556 A CN 200510053556A CN 1832450 A CN1832450 A CN 1832450A
Authority
CN
China
Prior art keywords
message
compartment wall
fire compartment
access device
heading
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2005100535568A
Other languages
Chinese (zh)
Other versions
CN100414928C (en
Inventor
王旭
胡玉胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB2005100535568A priority Critical patent/CN100414928C/en
Publication of CN1832450A publication Critical patent/CN1832450A/en
Application granted granted Critical
Publication of CN100414928C publication Critical patent/CN100414928C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

This invention provides a method for preventing attacking among access users, in which, a fire wall is set between an access device and the external packet data network, the method includes: A, the access device receives an inbound message to judge if it is one sent to another access user, if so, it sends it to the fire wall, B, the fire wall receives the message to test and filter to send the legal messages to the access device, C, the access device sends the message to related access user.

Description

A kind of method that prevents offence between inserted users
Technical field
The present invention relates to GPRS access technology field, be meant a kind of method that prevents offence between inserted users especially.
Background technology
Show the GPRS/WCDMA network configuration as Fig. 1.Wherein, GGSN and SGSN are two basic equipments in the GPRS/WCDMA packet domain core network.The major function of SGSN provides the access function of UTRAN/BSS, and the major function of GGSN is as the gateway between GPRS/WCDMA system and the external packet data net (PDN).The data service that inserts user (TE, Terminal Equipment) initiation inserts through SGSN equipment, mails to GGSN then, mails to the external packet data net via GGSN then, the inverse process that the process of reception data can think to initiate data.
In order to protect the access user not attacked, between GGSN and external packet data net (being generally Internet), be provided with fire compartment wall (Firewall) usually.Stop the invalid data from the external packet data net that may exist to flow the attack of docking access customer by fire compartment wall.
Along with the growth that inserts customer service, inserting the possibility of running foul of each other potential between the user is also increasing gradually.And the position of the residing network configuration of fire compartment wall has determined that its effect is the invalid data stream that is used for filtering from the external packet data net, and the data flow that can't dock between the access customer is filtered.Analyze below:
From the network configuration shown in Fig. 1 as can be seen, insert when transmitting data between the user, TE uploads to GGSN with data flow through SGSN, and GGSN just directly is handed down to another TE through SGSN after with Data Stream Processing, and data flow can not passed through fire compartment wall.
Data flow transmitted detects the words of attacking to take precautions against between the increase fire compartment wall comes TE between GGSN and subordinate equipment such as the SGSN if adopt, then can increase networking cost, and, packet from the external packet data net can just can pass to TE through two fire compartment walls, will certainly reduce the data transmission bauds of TE and external packet data net.
Therefore, prevent that at present the method for offence between inserted users from being: directly realize simple message packet filtering by GGSN, the data flow of transmitting between the access customer that achieves a butt joint detects filtration, prevents to insert the attack between the user.Packet filtering is a kind of simple filtering means, can only filter as parameters such as source address, destination address, source port, destination interface, TTL by the simple attributes of data message.But the packet filtering strategy that is based on the GGSN detection can only prevent to insert the attack between the user in limited extent, is difficult to prevent for the complex attack that inserts user's employing.This reason also is understood that: GGSN itself is not special-purpose firewall box, so be difficult to reach the high level ability that prevents complex attack of fire compartment wall, can not satisfy higher security requirement.
Summary of the invention
In view of this, main purpose of the present invention is to provide a kind of method that prevents offence between inserted users, makes realizing satisfying the strick precaution of attacking between other butt joint access customer of fire compartment wall level under the situation that does not change existing network.
Realize the method that prevents offence between inserted users of the present invention, between access device and external packet data network, be provided with fire compartment wall, may further comprise the steps:
A, access device receive the message of uploading, and judge whether this message is to send to the message that another inserts the user, if then this message is sent to fire compartment wall;
B, fire compartment wall receive described message, carry out after fire compartment wall detects filtration legal message being sent it back access device;
C, access device are handed down to corresponding access user with described message.
Optionally, steps A is described sends to fire compartment wall with this message and takes a step forward and comprise: the heading that message is added appointment; Step B is described further to be comprised after receiving described message: the appointment heading of removing this message.
Optionally, access device is provided with and detects rule, judges when message need detect, and adds the heading of described appointment.
Preferable, also comprise in the heading of appointment: the flag bit that whether needs fire compartment wall to detect; Step B further comprises: fire compartment wall determines whether to detect according to this flag bit.
The described fire compartment wall of step B detects the step of filtering and comprises: detects according to message source address, destination address, source port, destination interface, TTL1 parameter by fire compartment wall,
Filter according to the filtering rule that is disposed.Further comprise: the data to the message encapsulation detect, or/and detect after the data recombination with the message encapsulation.
Optionally, described access device is GGSN.
By said method as can be seen, the present invention cooperates the firewall filtering of realizing inserting message between the user by access device GGSN and firewall box, prevents to insert the rogue attacks between the user.Implementation method of the present invention does not need existing networking mode is changed, and does not need to be provided with in addition fire compartment wall, is implemented in the strobe utility based on fire compartment wall that does not change under the network configuration situation, can satisfy other high security requirement of fire compartment wall level.And kept low cost owing to existing networking not being changed.
Description of drawings
Fig. 1 is the GPRS/WCDMA network structure.
Fig. 2 fits into line data detection figure for GGSN and fire compartment wall.
Fig. 3 docks the testing process figure of data flow between the access customer for the present invention.
Embodiment
The present invention is not changing on the basis of existing networking structure, and by cooperatively interacting of GGSN and firewall box, the data flow that achieves a butt joint between the access customer detects filtration, thereby the attack that reaches between the butt joint access customer is taken precautions against.Referring to accompanying drawing, the method for offence between inserted users that prevents of the present invention is described in detail.
Still adopt the network structure shown in Fig. 1, fire compartment wall still is arranged between GGSN and the external packet data net.As shown in Figures 2 and 3, this method may further comprise the steps:
Step 301: access device GGSN receives the message of the TE transmission of uploading through SGSN, GGSN judges whether this message is to send to the message that another inserts the user, can go up the TE address configuration information of record according to GGSN, destination address to this message is judged, when judging this message is when sending to another user's message, then this message is added the heading of appointment, then this message is sent to fire compartment wall.The form of the appointment heading here can be consulted by GGSN and fire compartment wall, to guarantee that both sides can both identify this heading.
In addition, can also on GGSN, be provided with in advance and detect strategy, for example can not specify the message from the TE that trusts is detected.Like this, in step 301, when judging strategy that GGSN is provided with is when not needing message to certain TE to filter, and can not add the heading of described appointment to this message, and certain flag bit that perhaps comprises by being provided with in the heading is represented will not detect this message.
The implementation of a heading can for: can comprise information such as sign sequence number of message and flag bit in the heading, wherein flag bit can be used for representing whether this message needs fire compartment wall to detect.Provided the example of a structure message below, message can be configured to: Sequence Number+Flag+Length+ (UDP/IP initial data message), Sequence Number is above-mentioned sequence number, and Flag is above-mentioned flag bit, and Length represents the length of back message.Certainly, GGSN also will encapsulate the address of fire compartment wall, here no longer explanation when transmitting this message to fire compartment wall.
Step 302: after fire compartment wall receives message, it is the message that GGSN sends up that the appointment heading that carries according to message is judged, and then removes the heading of appointment, and the fire compartment wall of proceeding standard detects and filters, detected abnormal packet filtering is fallen, no longer transmitted.
If the heading in the step 301 is provided with the flag bit that whether detects, fire compartment wall also will determine whether to detect according to this flag bit.
Wherein, the function that can make full use of fire compartment wall and provide detects message.Can detect filtration according to parameters such as message source address, destination address, source port, destination interface, TTL by fire compartment wall.For example can be in advance on fire compartment wall configuration pin to the filtering rule of source address and destination address, also can be at the configurating filtered rule of some protocol ports, for example forbid the message (promptly prevent MS1 attack to MS2) of MS1 if desired to MS2, just can dispose on fire compartment wall and forbid that source address is the rule that the data message of MS2 passes through for the MS1 destination address, such message will be dropped and can not be handed down to GGSN again this moment.Moreover, also can utilize fire compartment wall to carry out more complicated detection, the detection rule of message content for example is set on fire compartment wall, fire compartment wall can detect according to the data of message content, i.e. encapsulation, and after the data recombination with encapsulation, carry out detection of upper layer data or the like.
Step 303: fire compartment wall will detect the normal above-mentioned message in back and be handed down to GGSN, carry out the forwarding of normal message by GGSN, be handed down to corresponding access user.
Above process as can be seen, this process does not need existing network is changed, and does not need to increase new fire compartment wall.And can not exert an influence to the original fire prevention measuring ability of fire compartment wall at external packet data net and GPRS core net.All are constant to the data flow of Internet as: original TE, still be by TE through SGSN to GGSN, pass through fire compartment wall and arrive Internet afterwards; And Internet is also constant to the data flow of TE, still is to GGSN, again through SGSN arrival TE via firewall filtering.
With the GPRS/WCDMA network configuration the present invention is described in this example.For different network configurations, its networking entity can be distinct, therefore, for above-mentioned GGSN, perhaps the entity that is other in other network configurations is realized, so long as and the essentially identical entity of GGSN function, use method of the present invention all can realize inserting the strick precaution that accuses each other between the user.
The above only is preferred embodiment of the present invention, and is in order to restriction the present invention, within the spirit and principles in the present invention not all, any modification of being done, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (7)

1, a kind of method that prevents offence between inserted users is provided with fire compartment wall between access device and the external packet data network, it is characterized in that, may further comprise the steps:
A, access device receive the message of uploading, and judge whether this message is to send to the message that another inserts the user, if then this message is sent to fire compartment wall;
B, fire compartment wall receive described message, carry out will confirming as legal message after the fire compartment wall detection is filtered and send it back access device;
C, access device are handed down to described message the access user who receives this message.
2, method according to claim 1 is characterized in that, steps A is described to send to fire compartment wall with this message and take a step forward and comprise: the heading that message is added appointment;
Step B is described further to be comprised after receiving described message: the appointment heading of removing this message.
3, method according to claim 2 is characterized in that, further comprises: access device is provided with and detects rule, in the time of need being detected by the described message of detection rule judgment, adds the heading of described appointment.
4, method according to claim 2 is characterized in that, further comprises in the heading of appointment: the flag bit that whether needs fire compartment wall to detect;
Step B further comprises: fire compartment wall determines whether this message is detected according to this flag bit.
5, method according to claim 1 is characterized in that, described access device is GGSN.
6, method according to claim 1, it is characterized in that, the described fire compartment wall of step B detects the step of filtering and comprises: detected according to message source address, destination address, source port, destination interface, TTL1 parameter by fire compartment wall, filter according to the filtering rule that is disposed.
7, method according to claim 6 is characterized in that, further comprises: the data to the message encapsulation detect, or/and detect after the data recombination with the message encapsulation.
CNB2005100535568A 2005-03-08 2005-03-08 Method for preventing offence between inserted users Expired - Fee Related CN100414928C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100535568A CN100414928C (en) 2005-03-08 2005-03-08 Method for preventing offence between inserted users

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100535568A CN100414928C (en) 2005-03-08 2005-03-08 Method for preventing offence between inserted users

Publications (2)

Publication Number Publication Date
CN1832450A true CN1832450A (en) 2006-09-13
CN100414928C CN100414928C (en) 2008-08-27

Family

ID=36994457

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100535568A Expired - Fee Related CN100414928C (en) 2005-03-08 2005-03-08 Method for preventing offence between inserted users

Country Status (1)

Country Link
CN (1) CN100414928C (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009079933A1 (en) * 2007-12-20 2009-07-02 Hangzhou H3C Technologies Co., Ltd. Message processing method and device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1244250A1 (en) * 2001-03-21 2002-09-25 Siemens Aktiengesellschaft Method and telecommunication system for monitoring data streams in a data network
CN100417153C (en) * 2002-10-10 2008-09-03 华为技术有限公司 Network system and method for processing VOIP business based on media net-link control protocol
CN1282347C (en) * 2003-10-08 2006-10-25 中兴通讯股份有限公司 Method for realing signalling fire wall in soft exchange network

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009079933A1 (en) * 2007-12-20 2009-07-02 Hangzhou H3C Technologies Co., Ltd. Message processing method and device
US8259740B2 (en) 2007-12-20 2012-09-04 Hangzhou H3C Technologies Co., Ltd. Method and an apparatus for processing packets

Also Published As

Publication number Publication date
CN100414928C (en) 2008-08-27

Similar Documents

Publication Publication Date Title
CN101616129B (en) Method, device and system for network attack defense and traffic overload protection
US7774849B2 (en) Methods, systems, and computer program products for detecting and mitigating denial of service attacks in a telecommunications signaling network
US10057213B2 (en) Examining and controlling IPv6 extension headers
US20100138920A1 (en) Method and system for detecting and responding to harmful traffic
CN101447996B (en) Defending method for distributed service-refusing attack and system and device thereof
JP2005229614A (en) Method and apparatus for defendable from denial-of-service attack camouflaging ip transmission source address
CN105991637A (en) Network attack protection method and network attack protection device
CN101056222A (en) A deep message detection method, network device and system
CN101227289A (en) Uniform intimidation managing device and loading method of intimidation defense module
EP1540921B1 (en) Method and apparatus for inspecting inter-layer address binding protocols
US8006303B1 (en) System, method and program product for intrusion protection of a network
EP1843624B1 (en) Method for protecting digital subscriber line access multiplexer, DSLAM and XDSL single service board
US8904534B2 (en) Method and apparatus for detecting scans in real-time
EP1521397A3 (en) Determination of the location of flow entry points in a communications network
CN101494639A (en) Method and apparatus for preventing aggression in packet communication system
US8769665B2 (en) IP communication device as firewall between network and computer system
CN1697397A (en) Method for guarding against attack realized for networked devices
JP4284248B2 (en) Application service rejection attack prevention method, system, and program
JP4278593B2 (en) Protection method against application denial of service attack and edge router
CN1832450A (en) Method for preventing offence between inserted users
JP3760919B2 (en) Unauthorized access prevention method, apparatus and program
CN110198298A (en) A kind of information processing method, device and storage medium
RU2005107480A (en) METHOD FOR PROCESSING NETWORK PACKAGES FOR DETECTION OF COMPUTER ATTACKS
KR20030042318A (en) Attacker isolation method and system using packet filtering at the border router of ISP
KR100726814B1 (en) Method for setting the fire wall

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080827

Termination date: 20130308