WO2022206268A1 - 报告控制方法、装置、设备、介质和计算机程序产品 - Google Patents

报告控制方法、装置、设备、介质和计算机程序产品 Download PDF

Info

Publication number
WO2022206268A1
WO2022206268A1 PCT/CN2022/078793 CN2022078793W WO2022206268A1 WO 2022206268 A1 WO2022206268 A1 WO 2022206268A1 CN 2022078793 W CN2022078793 W CN 2022078793W WO 2022206268 A1 WO2022206268 A1 WO 2022206268A1
Authority
WO
WIPO (PCT)
Prior art keywords
easdf
report
smf
threshold
sending
Prior art date
Application number
PCT/CN2022/078793
Other languages
English (en)
French (fr)
Inventor
熊春山
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Priority to EP22778452.7A priority Critical patent/EP4199478A4/en
Publication of WO2022206268A1 publication Critical patent/WO2022206268A1/zh
Priority to US17/989,473 priority patent/US20230074694A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0263Rule management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/10Scheduling measurement reports ; Arrangements for measurement reports
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Definitions

  • the embodiments of the present application relate to the field of mobile communications, and in particular, to a report control method, apparatus, device, medium, and computer program product.
  • the Domain Name System (DNS) query sent by the User Equipment (UE) may be processed by the Edge Application Server Discovery Function (EASDF).
  • EASDF Edge Application Server Discovery Function
  • Session Management Function provides reporting (Reporting) rules and forwarding (Forwarding) rules to EASDF.
  • Reporting rules provide rules for EASDF to send reports to SMF, and forwarding rules provide rules for EASDF to forward messages.
  • the EASDF After the UE sends a DNS query to the EASDF, the EASDF will send a report to the SMF according to the reporting rules.
  • DOS Denial Of Service
  • a report control method comprising:
  • the SMF sends control information to the EASDF for prohibiting or stopping or reducing or restricting the EASDF from sending reports to the SMF.
  • a report control method comprising:
  • EASDF obtains control information
  • the EASDF prohibits or stops or reduces or restricts the sending of reports to the SMF according to the control information.
  • a reporting control device comprising:
  • a sending module configured to send control information to the EASDF, where the control information is used to prohibit or stop or reduce or restrict the EASDF from sending reports to the SMF.
  • a reporting control device comprising:
  • the acquisition module is used to acquire control information
  • a sending module configured to prohibit or stop, reduce or limit sending reports to the SMF according to the control information.
  • a network element device includes: a processor and a memory, the memory stores a computer program, and the computer program is loaded and executed by the processor to achieve the above The described reporting control method.
  • a computer-readable storage medium storing a computer program, the computer program being loaded and executed by a processor to implement the report control method as described above.
  • a computer program product comprising computer instructions stored in a computer-readable storage medium.
  • the processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device executes the report control method provided by the above aspects.
  • FIG. 1 shows a structural block diagram of a communication system provided by an exemplary embodiment of the present application
  • FIG. 2 shows a structural block diagram of a communication system provided by another exemplary embodiment of the present application
  • FIG. 3 shows a flowchart of a report control method provided by an exemplary embodiment of the present application
  • FIG. 4 shows a flowchart of a report control method provided by another exemplary embodiment of the present application.
  • FIG. 5 shows a flowchart of part of the steps of an EAS discovery method provided by an exemplary embodiment of the present application
  • FIG. 6 shows a flowchart of a report control method provided by another exemplary embodiment of the present application.
  • FIG. 7 shows a flowchart of an EAS discovery method provided by another exemplary embodiment of the present application.
  • FIG. 8 shows a flowchart of a report control method provided by an exemplary embodiment of the present application.
  • FIG. 9 shows a flowchart of a report control method provided by another exemplary embodiment of the present application.
  • FIG. 10 shows a flowchart of a report control method provided by an exemplary embodiment of the present application.
  • FIG. 11 shows a block diagram of a report control apparatus provided by an exemplary embodiment of the present application.
  • FIG. 12 shows a block diagram of a report control apparatus provided by an exemplary embodiment of the present application.
  • FIG. 13 shows a block diagram of a network element device provided by an exemplary embodiment of the present application.
  • the UE sends a PDU session establishment request to the SMF.
  • the SMF locates and selects an EASDF for the UE, and the SMF sends a message to the selected EASDF, which carries: the IP address of the UE, the callback uniform resource identifier (Uniform Resource Identifier, URI), and the rules for processing DNS messages.
  • the callback address refers to the target resource URI requested when the EASDF actively initiates a message to the SMF.
  • SMF provides reporting rules to EASDF, and EASDF's reports to SMF are sent under at least two of the following reporting rules:
  • SMF can provide a report if the Fully Qualified Domain Name(s) (FQDN) of the Edge Application Server (EAS) in the DNS query matches the FQDN(s) filter in the DNS message reporting rule The rule instructs the EASDF to send the EAS FQDN(s) to the SMF. Based on the reports received, the SMF provides forwarding rules to the EASDF. Then EASDF forwards the DNS query to the local DNS or forwards the DNS query to the C-DNS after adding the ECS attribute.
  • FQDN Fully Qualified Domain Name(s)
  • EAS Edge Application Server
  • SMF provides reporting rules to instruct EASDF to report the EAS IP address/FQDN to SMF, if the EAS IP address in the DNS response matches the IP address range of the reporting rule, or the FQDN of the DNS response matches the FQDN of the DNS message reporting rule. Then the SMF may perform an operation of UL CL insertion, which will introduce more signaling interactions.
  • UE, RAN, AMF, I-UPF, L-PSA, etc. all participate in signaling interaction.
  • the SMF configures the reporting rules with the EASDF
  • the UE may cause the EASDF to send a report (or a report message) to the SMF.
  • This report will cause more subsequent signaling and messages.
  • the peak uplink rate of 5G can reach 300Mbps, that is, a UE can upload 300Mb data in one second.
  • 300M/8/1500 25000 DNS queries per second per UE.
  • 8 is the number of bits in a byte, and it is assumed that the length of a DNS query is 1500 bytes.
  • a DNS query can trigger the signaling interaction with SMF, and at the same time, it may trigger the signaling of SMF's Uplink Classifier (UL CL) insertion operation, thus forming a signaling storm in the mobile communication system, causing DOS attacks, mobile
  • UL CL Uplink Classifier
  • multiple UEs can simultaneously send DNS queries to EASDF through different cell cooperation. This may cause a DDOS attack and form a more serious attack, causing the mobile communication system to be almost unable to serve normal UEs.
  • FIG. 1 shows a schematic diagram of the architecture of a communication system provided by an exemplary embodiment of the present application.
  • the system architecture 100 may include: a user equipment (User Equipment, UE), a radio access network (Radio Access Network, RAN), a core network (Core), and a data network (Data Network, DN).
  • UE, RAN, and Core are the main components of the architecture. Logically, they can be divided into two parts: the user plane and the control plane.
  • the control plane is responsible for the management of the mobile network, and the user plane is responsible for the transmission of service data.
  • the NG2 reference point is located between the RAN control plane and the Core control plane
  • the NG3 reference point is located between the RAN user plane and the Core user plane
  • the NG6 reference point is located between the Core user plane and the data network.
  • the UE It is the portal for mobile users to interact with the network. It can provide basic computing capabilities and storage capabilities, display service windows to users, and accept user operation input. The UE will use the next-generation air interface technology to establish a signal connection and a data connection with the RAN, thereby transmitting control signals and service data to the mobile network.
  • RAN Similar to the base station in the traditional network, it is deployed close to the UE to provide network access functions for authorized users within the cell coverage area, and can use transmission tunnels of different quality to transmit user data according to user levels and service requirements.
  • the RAN can manage its own resources, utilize them rationally, provide access services for the UE on demand, and forward control signals and user data between the UE and the core network.
  • Core responsible for maintaining the subscription data of the mobile network, managing the network elements of the mobile network, and providing functions such as session management, mobility management, policy management, and security authentication for the UE.
  • the UE When the UE is attached, it provides network access authentication for the UE; when the UE has a service request, it allocates network resources for the UE; when the UE moves, it updates the network resources for the UE; when the UE is idle, it provides a fast recovery mechanism for the UE;
  • the DN It is a data network that provides business services for users.
  • the client is located in the UE, and the server is located in the data network.
  • the data network can be a private network, such as a local area network, or an external network that is not controlled by operators, such as the Internet, or a private network jointly deployed by operators, such as in order to configure the IP Multimedia Core Network. Subsystem, IMS) service.
  • IMS IP Multimedia Core Network. Subsystem
  • Figure 2 is a detailed architecture determined on the basis of Figure 1, wherein the core network user plane includes a user plane function (User Plane Function, UPF); the core network control plane includes an authentication server function (Authentication Server Function, AUSF), access and Mobility Management (Access and Mobility Management Function, AMF), SMF, Network Slice Selection Function (NSSF), Network Exposure Function (NEF), Network Repository Function (NF Repository Function, NRF), unified Data Management (Unified Data Management, UDM), Policy Control Function (Policy Control Function, PCF), Application Function (Application Function, AF).
  • the functions of these functional entities are as follows:
  • UPF perform user data packet forwarding according to the routing rules of SMF
  • AUSF perform security authentication of the UE
  • AMF UE access and mobility management
  • SMF UE session management
  • NSSF select network slice for UE
  • NEF Open network functions to third parties in the form of API interfaces
  • NRF Provides the storage function and selection function of network function entity information for other network elements
  • UDM user subscription context management
  • PCF User Policy Management
  • the N1 interface is the reference point between the UE and the AMF
  • the N2 interface is the reference point between the RAN and the AMF, used for sending NAS messages, etc.
  • the N3 interface is the reference point between the RAN and the UPF, It is used to transmit data on the user plane, etc.
  • the N4 interface is the reference point between the SMF and the UPF, and is used to transmit information such as the tunnel identification information of the N3 connection, the data buffer indication information, and the downlink data notification message
  • the N6 interface is the UPF and the UPF.
  • NG interface The interface between the radio access network and the 5G core network.
  • each network element in FIG. 1 and FIG. 2 is just an example, and the name of the interface in the specific implementation may be other names, which are not specifically limited in this embodiment of the present application.
  • the names of each network element (such as SMF, AF, UPF, etc.) included in FIG. 1 and FIG. 2 are only an example, and the functions of the network elements themselves are not limited. In 5GS and other future networks, the above-mentioned network elements may also have other names, which are not specifically limited in this embodiment of the present application.
  • FIG. 3 shows a flowchart of a report control method provided by an exemplary embodiment of the present application. This embodiment is exemplified by the method being performed by SMF and EASDF. The method includes:
  • Step 320 SMF sends control information to EASDF, and the control information is used to prohibit or stop or reduce or restrict EASDF from sending reports to SMF;
  • the report is a report sent by the EASDF triggered by the behavior of the UE.
  • Reports include at least one of the following at least two types of reports:
  • Type 1 Reports triggered based on DNS queries
  • Type 2 Reports triggered based on DNS responses.
  • the report includes: a report that satisfies the report rule, the report rule is configured by the SMF to the EASDF.
  • the reporting rules include: at least one of a type 1 reporting rule and a type 2 reporting rule.
  • Type 1 reporting rules are reporting rules triggered by DNS queries
  • Type 2 reporting rules are reporting rules triggered by DNS responses.
  • SMF sends control information to EASDF before recognizing DOS attack or DDOS attack; or, SMF sends control information to EASDF after recognizing DOS attack or DDOS attack.
  • Step 340 EASDF obtains control information
  • the EASDF receives the control information sent by the SMF.
  • Step 360 The EASDF prohibits or stops or reduces or restricts the sending of reports to the SMF according to the control information.
  • the SMF sends control information to the EASDF, and the EASDF prohibits, stops or reduces the EASDF from sending reports to the SMF according to the control information, so that the EASDF cannot send reports to the SMF without restrictions, thereby preventing abnormality
  • the DOS attack or DDOS attack initiated by the UE ensures that the mobile communication system provides services for more UEs as much as possible.
  • FIG. 4 shows a flowchart of a report control method provided by an exemplary embodiment of the present application. This embodiment is exemplified by the method being performed by SMF and EASDF. The method includes:
  • Step 420 SMF sends configuration rules to EASDF, the configuration rules include forwarding rules and do not include reporting rules;
  • forwarding rules are rules for triggering EASDF to forward DNS messages of the UE; reporting rules (Reporting Rules) are rules for triggering EASDF to send reports.
  • Step 440 EASDF receives configuration rules
  • Configuration rules are also called DNS message processing rules, or rules for processing DNS messages from terminals.
  • Step 460 EASDF forwards the DNS message according to the forwarding rule, and prohibits sending reports to the SMF.
  • EASDF can forward DNS messages according to the forwarding rules. And because the configuration rules do not include report rules, EASDF will not send reports to SMF under any circumstances, that is, EASDF is prohibited from sending reports to SMF.
  • SMF does not configure reporting rules to EASDF, thereby directly prohibiting any reporting by EASDF, so that EASDF cannot send reports to SMF, thereby preventing DOS attacks or DDOS attacks initiated by abnormal UEs.
  • FIG. 4 will be described with reference to the communication protocol TS23.501 in the related art.
  • Figure 5 shows a flow chart of some steps of the EAS discovery method in the communication protocol TS23.501.
  • FIG. 5 shows a flowchart of a report control method provided by another exemplary embodiment of the present application. Take for example that the method is performed by the UE, SMF, UPF, EASDF and DNS server. The method includes:
  • Step 1 UE sends a PDU session establishment request to SMF;
  • Step 2 SMF selects EASDF
  • the SMF selects the first EASDF for the UE, and the first EASDF refers to the EASDF selected by the SMF for the UE.
  • Step 3 SMF sends a Neasdf_DNS context creation request to EASDF;
  • Neasdf refers to the interface or reference point between SMF and EASDF.
  • Neasdf_DNS context creation request carries (UE IP address, callback URI, rules for handling DNS messages from UE).
  • the rules for processing DNS messages from the UE ie, DNS message processing rules or configuration rules
  • DNS message forwarding rules ie, forwarding rules
  • DNS message reporting rules ie, reporting rules
  • the forwarding rule includes: at least one of a DNS server address to be forwarded and an ECS option to be added.
  • EASDF creates a DNS context for the PDU session and stores the UE's IP address, callback URI and rules for handling DNS messages from the UE to the context.
  • the reporting rules include: when the EASDF receives a DNS query or a DNS response, reporting conditions for reporting DNS messages (including EAS-related information) to the SMF.
  • Step 4 EASDF sends a Neasdf_DNS context creation response to SMF;
  • EASDF invokes the service operation Neasdf_DNS context creation response (IP address of EASDF) and uses information that allows SMF to update or delete the context later.
  • Neasdf_DNS context creation response IP address of EASDF
  • the IP address of the EASDF is the address of the DNS server that the UE connects to the EASDF as a PDU session.
  • Step 5 SMF sends PDU session establishment confirmation to UE
  • the PDU session establishment request carries the address information of the first EASDF, as shown in step 460 or step 660 .
  • Step 6 SMF sends a Neasdf_DNS context update request to EASDF;
  • SMF may call Neasdf_DNS Context Update Request (PDU Session Context ID, rules for handling DNS queries on UE) to EASDF.
  • PDU Session Context ID rules for handling DNS queries on UE
  • DNS message forwarding rules In the updated rules for processing DNS queries on the UE, only DNS message forwarding rules (ie forwarding rules) are still included, and DNS message reporting rules (ie reporting rules) are not included.
  • Step 7 EASDF sends a Neasdf_DNS context update response to SMF.
  • the SMF only sends the configuration forwarding rules to the EASDF.
  • FIG. 6 shows a flowchart of a report control method provided by an exemplary embodiment of the present application. This embodiment is exemplified by the method being performed by SMF and EASDF. The method includes:
  • Step 520 SMF sends the restriction threshold to EASDF
  • the limit threshold is a threshold (Threshold) related to the reporting rate of the EASDF when sending reports.
  • the throttling threshold may also be referred to as: the reporting rate threshold.
  • the limit threshold is 500 per second; or, the limit threshold is 10000 per minute.
  • the limit threshold is configured by the network device, or stipulated by the communication protocol.
  • the SMF also sends configuration rules to the EASDF, where the configuration rules include forwarding rules and reporting rules.
  • Step 540 EASDF reception restriction threshold
  • the EASDF will calculate its own reporting rate.
  • the reporting rate is the reporting rate of the EASDF in a recent period of time, for example, the reporting rate within the last 5 seconds.
  • the reporting rate is the reporting rate in the current time slice, for example, the current reporting rate within 1 second.
  • Step 560 The EASDF restricts the reporting rate for sending reports to the SMF not to exceed the limit threshold.
  • the EASDF determines whether the report rate reaches the limit threshold when there is a report to be sent; or, the EASDF determines whether the report rate reaches the limit threshold every predetermined time interval.
  • the EASDF sends a report to the SMF; if the reporting rate is greater than or equal to the limit threshold, the EASDF discards the report to be sent to keep the reporting rate within the limit threshold.
  • the reporting rate is close to the limit threshold, EASDF randomly or selectively discards some reports, so that the rate at which reports are sent to the SMF cannot reach the reporting limit rate, that is, the limit threshold.
  • the report includes: at least one of the first type of report and the second type of report.
  • the first type of reports are those triggered by DNS queries, and the second type of reports are those triggered by DNS responses.
  • the above-mentioned restriction threshold includes: a shared threshold, where the shared threshold is a threshold shared by at least two types of reports of the EASDF.
  • the above-mentioned restriction threshold includes: a first threshold and a second threshold, the first threshold is a threshold corresponding to the first type of EASDF report; the second threshold is a threshold corresponding to the second type of EASDF report.
  • the first type of report is a DNS query report
  • the second type of report is a DNS response report.
  • the shared threshold may also be referred to as a shared reporting rate threshold
  • the first threshold may also be referred to as a first-type reporting rate threshold
  • the second threshold may also be referred to as a second-type reporting rate threshold.
  • the SMF provides a limit threshold to the EASDF, so that the EASDF reports to the SMF to limit the speed by itself, so that the reported rate cannot reach the limit threshold, thereby reducing the EASDF sending to the SMF in a unit time.
  • the number of SMF reports makes it impossible for EASDF to send reports to SMF indefinitely, thereby preventing DOS attacks or DDOS attacks initiated by abnormal UEs, and ensuring that the mobile communication system provides services for more UEs as much as possible.
  • FIG. 4 will be described with reference to the communication protocol TS23.501 in the related art.
  • Figure 7 shows a flow chart of the EAS discovery method in the communication protocol TS23.501.
  • FIG. 7 shows a flowchart of a report control method provided by another exemplary embodiment of the present application. Take for example that the method is performed by the UE, SMF, UPF, EASDF and DNS server. The method includes:
  • Step 1 UE sends a PDU session establishment request to SMF;
  • Step 2 SMF selects EASDF
  • Step 3 SMF sends a Neasdf_DNS context creation request to EASDF;
  • Step 4 EASDF sends a Neasdf_DNS context creation response to SMF;
  • Step 5 SMF sends PDU session establishment confirmation to UE
  • Step 6 SMF sends a Neasdf_DNS context update request to EASDF;
  • Step 7 EASDF sends Neasdf_DNS context update response to SMF;
  • Step 8 UE sends DNS query to EASDF
  • Step 9 EASDF sends a Neasdf_DNS context notification request to SMF;
  • Step 10 SMF sends a Neasdf_DNS context notification response to EASDF;
  • Step 11 EASDF sends DNS query to DNS server
  • Step 12 The DNS server sends a DNS response to EASDF
  • Step 13 EASDF sends a Neasdf_DNS context notification request to SMF;
  • Step 14 SMF sends a Neasdf_DNS context notification response to EASDF;
  • Step 15 UL CL/Branching Point (Branching Point, BP) insertion;
  • Step 16 SMF sends a Neasdf_DNS context update request to EASDF;
  • Step 17 EASDF sends a Neasdf_DNS context update response to SMF;
  • Step 18 EASDF sends a DNS response to the UE.
  • step 3 the SMF sends the restriction threshold to the EASDF, or, in step 6, the SMF sends or updates the restriction threshold to the EASDF.
  • the above-mentioned restriction threshold includes: a shared threshold, where the shared threshold is a threshold shared by at least two types of reports of the EASDF. That is:
  • DNS reporting includes a shared reporting rate threshold (time per second).
  • threshold time per second
  • the EASDF should control its reporting rate below the shared reporting rate threshold, that is, when the reporting rate is greater than or equal to the shared reporting rate threshold, the EASDF will discard some reports.
  • the above-mentioned restriction threshold includes: a first threshold and a second threshold, the first threshold is a threshold corresponding to the first type of EASDF report; the second threshold is a threshold corresponding to the second type of EASDF report, the first The threshold may also be referred to as the first type of reporting rate threshold, and the second threshold may also be referred to as the second type of reporting rate threshold. That is:
  • the DNS query report also includes a Type 1 report rate threshold (time per second).
  • the EASDF should control its reporting rate below the first-type reporting rate threshold, that is, when the reporting rate is greater than or equal to the first-type reporting rate threshold, the EASDF will discard some reports.
  • DNS response reporting also includes a second type of reporting rate threshold (time per second).
  • the EASDF should control its reporting rate below the second type reporting rate threshold, that is, when the reporting rate is greater than or equal to the second type reporting rate threshold, the EASDF will discard some reports.
  • the first type of reporting rate threshold is used to limit the sending rate of message 9 .
  • the second type of reporting rate threshold is to limit the transmission rate of message 13 (corresponding to steps 13-17). If the DNS query report and the DNS response report share the shared report rate threshold, it is the limit on the sending rate of the message 9 and the message 13 at the same time.
  • FIG. 8 shows a flowchart of a report control method provided by an exemplary embodiment of the present application. This embodiment is exemplified by the method being performed by SMF and EASDF. The method includes:
  • Step 530 EASDF reads the local restriction threshold
  • the EASDF obtains the local limit threshold.
  • the local limit threshold may be predefined by a communication protocol, may be generated by a local policy, or may be configured by a network management system.
  • EASDF judges whether the reporting rate reaches the limit threshold
  • the EASDF will calculate its own reporting rate.
  • the reporting rate is the reporting rate of the EASDF in a recent period of time, for example, the reporting rate within the last 5 seconds.
  • the reporting rate is the reporting rate in the current time slice, for example, the current reporting rate within 1 second.
  • the EASDF determines whether the reporting rate reaches the limit threshold; or, the EASDF determines whether the reporting rate reaches the limit threshold every predetermined time interval.
  • step 560 if the reporting rate is less than the limit threshold, perform step 560; if the reporting rate is greater than or equal to the limit threshold, perform step 580; optionally, if the reporting rate is less than or equal to the limit threshold, perform step 560; If the rate is greater than the limit threshold, step 580 is executed.
  • Step 560 The EASDF restricts the reporting rate for sending reports to the SMF not to exceed the limit threshold.
  • the EASDF determines whether the report rate reaches the limit threshold when there is a report to be sent; or the EASDF determines whether the report rate reaches the limit threshold every predetermined time interval.
  • the EASDF sends a report to the SMF; if the reporting rate is greater than or equal to the limit threshold, the EASDF discards the report to be sent to keep the reporting rate within the reporting rate.
  • the EASDF randomly or selectively discards some reports, so that the rate at which reports are sent to the SMF cannot reach the limit threshold.
  • the report includes: at least one of the first type of report and the second type of report.
  • the first type of reports are those triggered by DNS queries, and the second type of reports are those triggered by DNS responses.
  • the above-mentioned restriction threshold includes: a shared threshold, where the shared threshold is a threshold shared by at least two types of reports of the EASDF.
  • EASDF needs to share and control the reporting rate of DNS queries and DNS responses, that is, when the reporting rate is greater than or equal to the threshold, EASDF will discard some reports.
  • the above-mentioned restriction threshold includes: a first threshold and a second threshold, the first threshold is a threshold corresponding to the first type of EASDF report; the second threshold is a threshold corresponding to the second type of EASDF report.
  • the first type of report is a report triggered by a DNS query
  • the second type of report is a report triggered by a DNS response.
  • EASDF should control its DNS query reporting rate below this local threshold, that is, when the reporting rate is greater than or equal to this threshold, EASDF will discard some reports.
  • the rate threshold time per second
  • EASDF should control its DNS response reporting rate below this local threshold, that is, when the reporting rate is greater than or equal to this threshold, EASDF will discard some reports.
  • EASDF reads the local limit threshold, so that EASDF no longer sends reports to SMF when the reporting rate reaches the limit threshold, thereby reducing the EASDF sending to SMF per unit time Therefore, EASDF cannot send unlimited reports to SMF, so as to prevent DOS attacks or DDOS attacks initiated by abnormal UEs, and ensure that the mobile communication system provides services for more UEs as much as possible.
  • EASDF may acquire two sets of restriction thresholds at the same time, one of which is the restriction threshold configured by the SMF, and the other set of restriction thresholds is the local restriction. threshold.
  • the priority of the restriction threshold configured by the SMF is higher than the priority of the local restriction threshold. That is, the EASDF preferentially uses the priority of the restriction threshold configured by the SMF.
  • the EASDF uses the local restriction threshold.
  • FIG. 9 shows a flowchart of a report control method provided by an exemplary embodiment of the present application. This embodiment is exemplified by the method being performed by SMF and EASDF. The method includes:
  • Step 620 SMF sends a stop instruction to EASDF when the reporting rate of EASDF reaches the limit threshold, and the stop instruction is used to indicate to EASDF to stop sending reports;
  • the throttling threshold is a threshold related to the reporting rate of EASDF when sending reports.
  • the throttling threshold may also be referred to as: the reporting rate threshold.
  • the limit threshold is 500 per second; or, the limit threshold is 10000 per minute.
  • the limit threshold is configured by other network devices, or stipulated by the communication protocol.
  • the SMF judges whether the reporting rate of the EASDF reaches the limit threshold. Among them, the reporting rate of the EASDF is equal to: the number of reports received by the SMF/time.
  • the reporting rate of the EASDF is calculated by the SMF.
  • this embodiment does not exclude the possibility of reporting the reporting rate to the SMF after the EASDF calculates its own reporting rate.
  • the reporting rate is the reporting rate of the EASDF in a recent period of time, for example, the reporting rate within the last 5 seconds.
  • the reporting rate is the reporting rate in the current time slice, for example, the current reporting rate within 1 second.
  • the SMF continues to receive the EASDF report; if the reporting rate is greater than or equal to the limit threshold, perform step 620; optionally, if the reporting rate is less than or equal to the limit threshold, the SMF continues Keep receiving the EASDF report; if the reporting rate is greater than the limit threshold, go to step 620.
  • Step 640 EASDF receives a stop instruction
  • the stop indication is carried in the Neasdf_DNS context update request shown in step 6 of FIG. 7 .
  • the stop indication is carried in the stop DNS query and/or response report indication field in the Neasdf_DNS context update request.
  • the stop instruction includes: a shared stop instruction, and the shared stop instruction is used to instruct the EASDF to stop two types of reports, that is, stop the first type of report and the second type of report at the same time.
  • the stop instruction includes at least one of a first stop instruction and a second stop instruction.
  • the first stop instruction is used to instruct the EASDF to stop sending the first type of report
  • the second stop instruction is used to instruct the EASDF to stop sending the second type of report.
  • the stop instruction can be sent at any time, but is preferably sent after step 10 or step 14 in FIG. 7 .
  • Step 660 EASDF stops sending reports to SMF according to the stop instruction
  • the EASDF stops sending the first type of report and the second type of report at the same time. In the case where the stop instruction includes the first stop instruction, the EASDF stops sending the first type of report. In the case where the stop instruction includes the second stop instruction, the EASDF stops sending the second type of report.
  • Step 682 The SMF sends a start indication to the EASDF, and the start indication is used to instruct the EASDF to resume sending the report.
  • the sending time of the start instruction may be any time after step 660 .
  • the start indication is carried in the Neasdf_DNS context update response shown in step 7 of FIG. 7 .
  • the start indication is carried in at least one of the start DNS query and response report indication fields in the Neasdf_DNS context update response.
  • the start indication includes: a sharing start indication, and the sharing start indication is used to instruct the EASDF to resume sending two types of reports, that is, resume sending the first type of report and the second type of report at the same time.
  • the start indication includes at least one of a first start indication and a second start indication.
  • the first start indication is used to instruct EASDF to resume sending the first type of report
  • the second start indication is used to instruct EASDF to resume sending the second type of report.
  • Step 684 EASDF receives a start indication
  • the start indication is carried in the Neasdf_DNS context update response shown in step 7 of FIG. 7 .
  • the start indication is carried in at least one of the start DNS query and response report indication fields in the Neasdf_DNS context update response.
  • Step 686 The EASDF resumes sending reports to the SMF according to the start indication.
  • the EASDF resumes sending the first type of report and the second type of report at the same time. In the case where the start indication includes the first start indication, the EASDF resumes sending the first type of report. In the case where the start indication includes the second start indication, the EASDF resumes sending the second type of report.
  • the sending of the report can only be resumed when the EASDF receives the start instruction sent by the SMF again. Even if it receives other Neasdf_DNS context update request messages for updating reporting rules during this period, EASDF cannot start sending reports to SMF.
  • the SMF sends a stop instruction or a start instruction to the EASDF, and actively controls the EASDF to stop sending reports or resume sending reports, so that the SMF can actively control the report sending mechanism of the EASDF, and the EASDF cannot be unlimited.
  • SMF can actively restore the reporting mechanism of EASDF, which can ensure the normal use of functions such as UL CL insertion and BP insertion.
  • FIG. 10 shows a flowchart of a report control method provided by an exemplary embodiment of the present application. This embodiment is exemplified by the method being performed by SMF and EASDF. The method includes:
  • Step 720 the SMF sends a stop instruction to the EASDF when the reporting rate of the EASDF reaches the limit threshold, and the stop instruction includes the backoff time;
  • step 620 the stop instruction in this embodiment further includes a back off time, and the back off time is the time period for instructing the EASDF to stop sending reports.
  • the length of the fallback time is 5 minutes.
  • Step 740 EASDF receives a stop instruction
  • the stop indication is carried in the Neasdf_DNS context update request shown in step 6 of FIG. 7 .
  • the stop indication is carried in at least one of stop DNS query and response report indication fields in the Neasdf_DNS context update request.
  • the stop indication carries a shared backoff time, and the shared backoff time is a backoff time shared by at least two types of reports of the EASDF;
  • the stop indication carries at least one of the first backoff time and the second backoff time.
  • the first backoff time is the backoff time corresponding to the first type report of the EASDF
  • the second backoff time is the backoff time corresponding to the second type report of the EASDF.
  • the first type of report is a report triggered by a DNS query, referred to as a DNS query report
  • the second type of report is a report triggered by a DNS response, referred to as a DNS response report.
  • EASDF parses or reads the fallback time from the stop instruction.
  • Step 760 EASDF stops sending reports to SMF before the fallback time expires
  • the EASDF stops sending the first type of report and the second type of report at the same time. In the case where the stop instruction includes the first stop instruction, the EASDF stops sending the first type of report. In the case where the stop instruction includes the second stop instruction, the EASDF stops sending the second type of report.
  • the EASDF stops sending at least two types of reports to the SMF before the shared backoff time expires.
  • the EASDF stops sending the first type of report to the SMF before the first backoff time expires.
  • the EASDF stops sending the second type of report to the SMF before the second backoff time expires.
  • this embodiment may adopt any one of the following two recovery modes to resume the sending of the report.
  • Step 782 the SMF sends a start indication to the EASDF, and the start indication is used to instruct the EASDF to resume sending the report;
  • the sending time of the start instruction may be any time after step 660 .
  • the start indication is carried in the Neasdf_DNS context update response shown in step 7 of FIG. 7 .
  • the start indication is carried in at least one of the start DNS query and response report indication fields in the Neasdf_DNS context update response.
  • Step 784 EASDF receives a start indication
  • the start indication is used to instruct the EASDF to resume sending reports.
  • Step 786 EASDF resumes sending reports to SMF according to the start instruction
  • the start indication includes: a sharing start indication, and the sharing start indication is used to instruct the EASDF to resume sending two types of reports, that is, resume sending the first type of report and the second type of report at the same time.
  • the start indication includes at least one of a first start indication and a second start indication.
  • the first start indication is used to instruct the EASDF to resume sending the first type of report
  • the second start indication is used to instruct the EASDF to resume sending the second type of report.
  • the EASDF resumes sending the first type of report and the second type of report at the same time. In the case where the start indication includes the first start indication, the EASDF resumes sending the first type of report. In the case where the start indication includes the second start indication, the EASDF resumes sending the second type of report.
  • Step 792 EASDF resumes sending reports to SMF after the backoff time expires.
  • the EASDF will automatically resume sending a report to the SMF after the backoff time expires.
  • the EASDF resumes sending at least two types of reports to the SMF after the shared backoff time expires.
  • the EASDF resumes sending the first type of report to the SMF.
  • the EASDF resumes sending the second type of report to the SMF.
  • the EASDF can automatically restore the reporting mechanism of the EASDF, which can ensure the normal use of functions such as UL CL insertion and BP insertion.
  • the steps performed by the SMF in the foregoing embodiments may be implemented independently as an embodiment on the SMF side; the steps performed by the EASDF in the foregoing embodiments may be independently implemented as an embodiment on the EASDF side.
  • the above embodiments can also be split and reorganized based on the understanding of those skilled in the art, which is not limited in this application.
  • 3, 4, 5, 6, 7, 8, 9 and 10 may include multiple sub-steps or multiple stages, and these sub-steps or stages are not necessarily executed and completed at the same time, but These sub-steps or stages may be executed at different times, and the execution order of these sub-steps or stages is not necessarily sequentially executed, but may be executed alternately or implicitly with other steps or at least a part of sub-steps or stages of other steps.
  • FIG. 11 shows a block diagram of a report control apparatus provided by an exemplary embodiment of the present application.
  • the device can be implemented as an SMF, or a part of the SMF, or used in the SMF.
  • the device includes:
  • a sending module 1120 configured to send control information to the EASDF, where the control information is used to prohibit or stop or reduce the EASDF from sending reports to the SMF.
  • the sending module 1120 is configured to send configuration rules to the EASDF, where the configuration rules include forwarding rules and do not include reporting rules, and the reporting rules are used to trigger the EASDF to send the report the rule of.
  • the sending module 1120 is configured to configure a limit threshold to the EASDF, so that the EASDF stops sending the report when the reporting rate reaches the limit threshold.
  • the sending module 1120 is configured to send a stop instruction to the EASDF when the reporting rate of the EASDF reaches a limit threshold, where the stop instruction is used to instruct the EASDF to stop sending the EASDF Report.
  • the stop indication includes a backoff time, the backoff time being the length of time that the EASDF stops sending the report.
  • the sending module 1120 is configured to send a start indication to the EASDF, where the start indication is used to instruct the EASDF to resume sending the report.
  • the restriction threshold includes: a shared threshold, and the shared threshold is a threshold shared by at least two types of reports of the EASDF; or, the restriction threshold includes: at least one of the first threshold and the second threshold One, the first threshold is a threshold corresponding to the first type of report of the EASDF; the second threshold is a threshold corresponding to the second type of report of the EASDF.
  • the stop instruction includes: a sharing stop instruction, and the sharing stop instruction is a stop instruction shared by at least two types of reports of the EASDF; or, the stop instruction includes: a first stop instruction and a second stop instruction At least one of stop instructions, the first stop instruction is a stop instruction corresponding to the first type of report of the EASDF; the second stop instruction is a stop instruction corresponding to the second type of report of the EASDF.
  • the start indication comprises: a sharing start indication, and the sharing start indication is a start indication of at least two types of reporting sharing of the EASDF; or, the start indication comprises: a first start indication and a second start indication At least one of the start indications, the first start indication is a start indication corresponding to the first type report of the EASDF; the second start indication is a start indication corresponding to the second type report of the EASDF.
  • the backoff time includes: a shared backoff time, and the shared backoff time is a backoff time shared by at least two types of reports of the EASDF; or, the backoff time includes: a first At least one of a backoff time and a second backoff time, the first backoff time is the backoff time corresponding to the first type of report of the EASDF; the second backoff time is the first backoff time of the EASDF.
  • the first type of report is a DNS request-triggered report
  • the second type of report is a DNS response-triggered report.
  • FIG. 12 shows a block diagram of a report control apparatus provided by an exemplary embodiment of the present application.
  • the device can be implemented as or part of an EASDF, or used in an EASDF.
  • the device includes:
  • a receiving module 1220 configured to obtain control information
  • the sending module 1240 is configured to prohibit, stop or reduce sending a report to the session management function SMF according to the control information.
  • the receiving module 1220 is configured to receive configuration rules sent by the SMF, the configuration rules include forwarding rules and do not include reporting rules, and the reporting rules are used to trigger the EASDF to send the report rule;
  • the sending module 1240 is configured to prohibit sending a report to the SMF according to the configuration rule.
  • the receiving module 1220 is configured to receive the restriction threshold configured by the SMF, or read the local restriction threshold;
  • the sending module 1240 is configured to limit the reporting rate of sending the report to the SMF not to exceed the limit threshold.
  • the priority of the restriction threshold configured by the SMF is higher than the priority of the local restriction threshold.
  • the receiving module 1220 is configured to receive a stop instruction sent by the SMF, where the stop instruction is sent by the SMF when the reporting rate of the EASDF reaches a limit threshold;
  • the sending module 1240 is configured to stop sending a report to the SMF according to the stop instruction.
  • the stop indication includes a back-off time
  • the sending module 1240 is configured to stop sending a report to the SMF before the backoff time expires.
  • the method further includes:
  • the receiving module 1220 is configured to receive a start instruction sent by the SMF;
  • the sending module 1240 is configured to resume sending a report to the SMF according to the start indication.
  • the method further includes:
  • the sending module 1240 is configured to resume sending a report to the SMF after the backoff time expires.
  • the restriction threshold includes: a shared threshold, and the shared threshold is a threshold shared by at least two types of reports of the EASDF; or, the restriction threshold includes: at least one of the first threshold and the second threshold One, the first threshold is a threshold corresponding to the first type of report of the EASDF; the second threshold is a threshold corresponding to the second type of report of the EASDF.
  • the stop instruction includes: a sharing stop instruction, and the sharing stop instruction is a stop instruction shared by at least two types of reports of the EASDF; or, the stop instruction includes: a first stop instruction and a second stop instruction At least one of stop instructions, the first stop instruction is a stop instruction corresponding to the first type of report of the EASDF; the second stop instruction is a stop instruction corresponding to the second type of report of the EASDF.
  • the start indication comprises: a sharing start indication, and the sharing start indication is a start indication of at least two types of reporting sharing of the EASDF; or, the start indication comprises: a first start indication and a second start indication At least one of the start indications, the first start indication is a start indication corresponding to the first type report of the EASDF; the second start indication is a start indication corresponding to the second type report of the EASDF.
  • the backoff time includes: a shared backoff time, and the shared backoff time is a backoff time shared by at least two types of reports of the EASDF; or, the backoff time includes: a first At least one of a backoff time and a second backoff time, the first backoff time is the backoff time corresponding to the first type of report of the EASDF; the second backoff time is the first backoff time of the EASDF.
  • the first type of report is a DNS request-triggered report; the second type of report is a DNS response-triggered report.
  • the sending module is used to execute the steps related to sending in the above method embodiments; the receiving module is used to execute the steps related to receiving in the above method embodiments; the processing module is used to execute the steps in the above method embodiments The steps other than the sending and receiving steps will not be described in detail in this embodiment.
  • FIG. 13 shows a schematic structural diagram of a network element device provided by an embodiment of the present application.
  • the network element device may be used to execute the above-mentioned report control method.
  • the network element device 1300 may include: a processor 1301 , a receiver 1302 , a transmitter 1303 , a memory 1304 and a bus 1305 .
  • the processor 1301 includes one or more processing cores, and the processor 1301 executes various functional applications and information processing by running software programs and modules.
  • the receiver 1302 and the transmitter 1303 may be implemented as a transceiver 1306, which may be a communication chip.
  • the memory 1304 is connected to the processor 1301 through the bus 1305 .
  • the memory 1304 may be used to store a computer program, and the processor 1301 is used to execute the computer program to implement various steps performed by the network element device, access network entity, core network element or core network entity in the above method embodiments.
  • the transmitter 1303 is used to perform the steps related to sending in the above method embodiments; the receiver 1302 is used to perform the steps related to receiving in the above method embodiments; the processor 1301 is used to perform the steps of removing the Steps other than the send and receive steps.
  • the memory 1304 can be implemented by any type of volatile or non-volatile storage device or a combination thereof, and the volatile or non-volatile storage device includes but is not limited to: RAM (Random-Access Memory, random access memory) and ROM (Read-Only Memory), EPROM (Erasable Programmable Read-Only Memory, Erasable Programmable Read-Only Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory, Electrically Erasable Programmable Read-Only Memory) memory), flash memory or other solid-state storage technology, CD-ROM (Compact Disc Read-Only Memory), DVD (Digital Video Disc, high-density digital video disc) or other optical storage, tape cassettes, magnetic tapes, magnetic disks storage or other magnetic storage devices.
  • RAM Random-Access Memory, random access memory
  • ROM Read-Only Memory
  • EPROM Erasable Programmable Read-Only Memory
  • EEPROM Electrically Erasable Programmable Read-Only Memory
  • flash memory or other solid-
  • a network element device includes: a processor and a memory, the memory stores a computer program, and the computer program is loaded and executed by the processor to implement The reporting control method as described above.
  • the present application further provides a computer-readable storage medium, where at least one instruction, at least one piece of program, code set or instruction set is stored in the storage medium, the at least one instruction, the at least one piece of program, the code set or The instruction set is loaded and executed by the processor to implement the report control method provided by the above method embodiments.
  • the present application also provides a computer program product, wherein the computer program product includes computer instructions, and the computer instructions are stored in a computer-readable storage medium.
  • the processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device executes the report control method provided by the above aspects.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本申请公开了一种报告控制方法,属于移动通信领域。所述方法包括:会话管理功能SMF向边缘应用服务器发现功能EASDF发送控制信息,所述控制信息用于禁止或停止或减少所述EASDF向所述SMF发送报告。

Description

报告控制方法、装置、设备、介质和计算机程序产品
本申请要求于2021年04月02日提交中国专利局,申请号为2021103638419,发明名称为“报告控制方法、装置、设备及介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请实施例涉及移动通信领域,特别涉及一种报告控制方法、装置、设备、介质和计算机程序产品。
背景技术
在边缘计算场景下,用户设备(User Equipment,UE)发送的域名系统(Domain Name System,DNS)查询可能由边缘应用服务器发现功能(Edge Application Server Discovery Function,EASDF)来处理。
会话管理功能(Session Management Function,SMF)向EASDF提供报告(Reporting)规则和转发(Forwarding)规则。报告规则提供了EASDF向SMF发送报告的规则,转发规则提供了EASDF转发消息的规则。在UE向EASDF发送一个DNS查询后,EASDF会根据报告规则向SMF发送报告。
在上行峰值速率较高的情况下,若UE采用恶意方式在短时间内向EASDF频繁发送DNS查询,从而EASDF频繁向SMF发送报告并且触发控制面的多个信令,会形成了移动通信系统的信令风暴,造成拒绝服务(Denial Of Service,DOS)攻击,导致移动通信系统无法为所有正常的UE的服务。
发明内容
根据本申请的各种实施例,提供了一种报告控制方法、装置、设备、介质和计算机程序产品。所述技术方案如下:
根据本申请的一个方面,提供了一种报告控制方法,所述方法包括:
SMF向EASDF发送控制信息,所述控制信息用于禁止或停止或减少或限制所述EASDF向所述SMF发送报告。
根据本申请的另一方面,提供了一种报告控制方法,所述方法包括:
EASDF获取控制信息;
所述EASDF根据所述控制信息禁止或停止或减少或限制向所述SMF发送报告。
根据本申请的一个方面,提供了一种报告控制装置,所述装置包括:
发送模块,用于向EASDF发送控制信息,所述控制信息用于禁止或停止或减少或限制所述EASDF向所述SMF发送报告。
根据本申请的另一方面,提供了一种报告控制装置,所述装置包括:
获取模块,用于获取控制信息;
发送模块,用于根据所述控制信息禁止或停止或减少或限制向所述SMF发送报告。
根据本申请的一个方面,提供了一种网元设备,所述网元设备包括:处理器和存储器,所述存储器存储有计算机程序,所述计算机程序由所述处理器加载并执行以实现如上所述的报告控制方法。
根据本申请的另一方面,提供了一种计算机可读存储介质,所述存储介质存储有计算机程序,所述计算机程序由处理器加载并执行以实现如上所述的报告控制方法。
根据本申请的另一方面,提供了一种计算机程序产品,所述计算机程序产品包括计算机指令,该计算机指令存储在计算机可读存储介质中。计算机设备的处理器从计算机可读存储介质读取该计算机指令,处理器执行该计算机指令,使得该计算机设备执行上述方面提供的报告控制方法。
本申请的一个或多个实施例的细节在下面的附图和描述中提出。本申请的其它特征和优点将从说明书、附图以及权利要求书变得明显。
附图说明
此处所说明的附图用来提供对本申请的进一步理解,构成本申请的一部分,本申请的示意性实施例及其说明用于解释本申请,并不构成对本申请的不当限定。在附图中:
图1示出了本申请一个示例性实施例提供的通信系统的结构框图;
图2示出了本申请另一个示例性实施例提供的通信系统的结构框图;
图3示出了本申请一个示例性实施例提供的报告控制方法的流程图;
图4示出了本申请另一个示例性实施例提供的报告控制方法的流程图;
图5示出了本申请一个示例性实施例提供的EAS发现方法的部分步骤流程图;
图6示出了本申请另一个示例性实施例提供的报告控制方法的流程图;
图7示出了本申请另一个示例性实施例提供的EAS发现方法的流程图;
图8示出了本申请一个示例性实施例提供的报告控制方法的流程图;
图9示出了本申请另一个示例性实施例提供的报告控制方法的流程图;
图10示出了本申请一个示例性实施例提供的报告控制方法的流程图;
图11示出了本申请一个示例性实施例提供的报告控制装置的框图;
图12示出了本申请一个示例性实施例提供的报告控制装置的框图;
图13示出了本申请一个示例性实施例提供的网元设备的框图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本申请相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本申请的一些方面相一致的装置和方法的例子。
应当理解的是,在本文中提及的“若干个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。字符“/”一般表示前后关联对象 是一种“或”的关系。
在边缘计算场景下,UE向SMF发送PDU会话建立请求。SMF为UE定位和选择一个EASDF,SMF向选择的EASDF发送消息,该消息中携带有:UE的IP地址,回调统一资源标识符(Uniform Resource Identifier,URI),处理DNS消息的规则。其中,回调地址是指EASDF主动发起到SMF的消息时所请求的目标资源URI。
可选的,SMF向EASDF提供报告规则,EASDF向SMF的报告由以下至少两类报告规则下发送:
1.基于DNS查询触发的报告;
如果DNS查询中的边缘应用服务器(Edge Application Server,EAS)的全限定域名(s)(Fully Qualified Domain Name,FQDN)与DNS消息上报规则中的FQDN(s)过滤器匹配,则SMF可以提供报告规则指示EASDF将EAS FQDN(s)发送给SMF。根据接收到的报告,SMF向EASDF提供转发规则。然后EASDF向本地DNS转发DNS查询或增加ECS属性后向C-DNS转发DNS查询。
2.基于DNS响应触发的报告;
SMF提供报告规则来指导EASDF向SMF报告EAS IP地址/FQDN,如果DNS响应中的EAS IP地址匹配上报规则的IP地址范围,或DNS响应的FQDN与DNS消息报告规则的FQDN匹配。然后SMF可能会进行UL CL插入的操作,而这个操作将引入比较多的信令交互。特别是UE,RAN,AMF,I-UPF,L-PSA等都参与了信令交互。
由于SMF向EASDF配置了报告规则,导致若UE向EASDF发送一个DNS查询时,可能会引发EASDF向SMF发送报告(或报告消息)。该报告会引发较多的后续信令及消息。比如,5G的上行峰值速率可达到300Mbps,即一个UE可以在一秒内上传300Mb数据,计算一下:
300M/8/1500=25000条DNS查询每秒每个UE。其中,8为一个字节里面的比特数量,同时假设一个DNS查询的长度是1500字节。
因一个DNS查询可以触发与SMF的信令交互,同时可能触发SMF的上行分类器(Uplink Classifier,UL CL)插入操作的信令,因而形成了移动通信系统的信令风暴,造成DOS攻击,移动通信系统无法为所有正常的UE的服务(因为5G系统的信令容易被DOS所占用,移动通信系统可能只有一部分正常的UE服务或完全无法为正常的UE服务)。
另外,多个UE可以通过不同的小区协作同时向EASDF发送DNS查询。这样可能造成DDOS攻击,形成更为严重的攻击,造成移动通信系统几乎无法为正常的UE服务。
图1示出了本申请一个示例性实施例提供的通信系统的架构示意图。如图1所示,该系统架构100可以包括:用户设备(User Equipment,UE)、无线接入网(Radio Access Network,RAN)、核心网(Core)和数据网络(Data Network,DN)构成。其中,UE、RAN、Core是构成架构的主要成分,逻辑上它们可以分为用户面和控制面两部分,控制面负责移动网络的管理,用户面负责业务数据的传输。在图1中,NG2参考点位于RAN控制面和Core控制面 之间,NG3参考点位于RAN用户面和Core用户面之间,NG6参考点位于Core用户面和数据网络之间。
UE:是移动用户与网络交互的入口,能够提供基本的计算能力、存储能力,向用户显示业务窗口,接受用户操作输入。UE会采用下一代空口技术,与RAN建立信号连接、数据连接,从而传输控制信号和业务数据到移动网络。
RAN:类似于传统网络里面的基站,部署在靠近UE的位置,为小区覆盖范围的授权用户提供入网功能,并能够根据用户的级别,业务的需求等使用不同质量的传输隧道传输用户数据。RAN能够管理自身的资源,合理利用,按需为UE提供接入服务,把控制信号和用户数据在UE和核心网之间转发。
Core:负责维护移动网络的签约数据,管理移动网络的网元,为UE提供会话管理、移动性管理、策略管理、安全认证等功能。在UE附着的时候,为UE提供入网认证;在UE有业务请求时,为UE分配网络资源;在UE移动的时候,为UE更新网络资源;在UE空闲的时候,为UE提供快恢复机制;在UE去附着的时候,为UE释放网络资源;在UE有业务数据时,为UE提供数据路由功能,如转发上行数据到DN;或者从DN接收UE下行数据,转发到RAN,从而发送给UE。
DN:是为用户提供业务服务的数据网络,一般客户端位于UE,服务端位于数据网络。数据网络可以是私有网络,如局域网,也可以是不受运营商管控的外部网络,如Internet,还可以是运营商共同部署的专有网络,如为了配置IP多媒体网络子系统(IP Multimedia Core Network Subsystem,IMS)服务。
图2是在图1的基础上确定的详细架构,其中核心网用户面包括用户面功能(User Plane Function,UPF);核心网控制面包括认证服务器功能(Authentication Server Function,AUSF)、接入和移动管理(Access and Mobility Management Function,AMF)、SMF、网络切片选择功能(Network Slice Selection Function,NSSF)、网络开放功能(Network Exposure Function,NEF)、网络仓储功能(NF Repository Function,NRF)、统一数据管理(Unified Data Management,UDM)、策略控制功能(Policy Control Function,PCF)、应用功能(Application Function,AF)。这些功能实体的功能如下:
UPF:根据SMF的路由规则执行用户数据包转发;
AUSF:执行UE的安全认证;
AMF:UE接入和移动性管理;
SMF:UE会话管理;
NSSF:为UE选择网络切片;
NEF:以API接口的方式向第三方开放网络功能;
NRF:为其他网元提供网络功能实体信息的存储功能和选择功能;
UDM:用户签约上下文管理;
PCF:用户策略管理;
AF:用户应用管理。
在图2所示架构中,N1接口为UE与AMF之间的参考点;N2接口为RAN和AMF的参考点,用于NAS消息的发送等;N3接口为RAN和UPF之间的参考点,用于传输用户面的数据等;N4接口为SMF和UPF之间的参考点,用于传输例如N3连接的隧道标识信息、数据缓存指示信息,以及下行数据通知消息等信息;N6接口为UPF和DN之间的参考点,用于传输用户面的数据等。NG接口:无线接入网和5G核心网之间的接口。
需要说明的是,图1和图2中的各个网元之间的接口名称只是一个示例,具体实现中接口的名称可能为其他的名称,本申请实施例对此不作具体限定。图1和图2中包括的各个网元(比如SMF、AF、UPF等)的名称也仅是一个示例,对网元本身的功能不构成限定。在5GS以及未来其它的网络中,上述各个网元也可以是其他的名称,本申请实施例对此不作具体限定。例如,在6G网络中,上述各个网元中的部分或全部可以沿用5G中的术语,也可能采用其他名称,等等,在此进行统一说明,以下不再赘述。此外,应理解,上述各个网元之间的所传输的消息(或信令)的名称也仅仅是一个示例,对消息本身的功能不构成任何限定。
图3示出了本申请一个示例性实施例提供的报告控制方法的流程图。本实施例以该方法由SMF和EASDF执行来举例说明。所述方法包括:
步骤320:SMF向EASDF发送控制信息,控制信息用于禁止或停止或减少或限制EASDF向SMF发送报告;
报告是由UE的行为触发EASDF发送的报告。报告包括如下至少两类报告中的至少一种:
类型1:基于DNS查询触发的报告;
类型2:基于DNS响应触发的报告。
示例性的,报告包括:满足报告规则的报告,报告规则是由SMF向EASDF配置的。示例性的,报告规则包括:类型1的报告规则和类型2的报告规则中的至少一种。
类型1的报告规则是由DNS查询触发的上报规则,类型2的报告规则是由DNS响应触发的上报规则。
SMF在识别到DOS攻击或DDOS攻击之前,向EASDF发送控制信息;或者,SMF在识别到DOS攻击或DDOS攻击之后,向EASDF发送控制信息。
步骤340:EASDF获取控制信息;
EASDF接收SMF发送的控制信息。
步骤360:EASDF根据控制信息禁止或停止或减少或限制向SMF发送报告。
综上所述,本实施例提供的方法,由SMF向EASDF发送控制信息,EASDF根据该控制信息禁止或停止或减少EASDF向SMF发送报告,使得EASDF不能无限制地向SMF发送报告,从而防御异常UE发起的DOS攻击或DDOS攻击,尽可能保障移动通信系统为更多的UE提供服务。
上述控制信息存在至少四种实现方式。下文采用不同的实施例来举例说明。
针对实现方式一:
图4示出了本申请一个示例性实施例提供的报告控制方法的流程图。本实施例以该方法由SMF和EASDF执行来举例说明。所述方法包括:
步骤420:SMF向EASDF发送配置规则,配置规则包括转发规则且不包括报告规则;
示例性的,转发规则(Forwarding Rules)是用于触发EASDF转发UE的DNS消息的规则;报告规则(Reporting Rules)是用于触发EASDF发送报告的规则。
步骤440:EASDF接收配置规则;
配置规则也称DNS消息处理规则,或者处理来自终端的DNS消息的规则。
步骤460:EASDF根据转发规则对DNS消息进行转发,且禁止向SMF发送报告。
由于配置规则包括转发规则,因此EASDF可以根据转发规则对DNS消息进行转发。又由于配置规则不包括报告规则,因此EASDF在任何情况下均不会向SMF发送报告,也即EASDF禁止向SMF发送报告。
综上所述,本实施例提供的方法,通过SMF不向EASDF配置报告规则,从而直接禁止了EASDF的任何报告,使得EASDF无法向SMF发送报告,从而防御异常UE发起的DOS攻击或DDOS攻击。
示例性的,结合相关技术中的通信协议TS23.501来对图4实施例进行阐述。图5示出了通信协议TS23.501中的EAS发现方法的部分步骤流程图。
图5示出了本申请另一个示例性实施例提供的报告控制方法的流程图。以该方法由UE、SMF、UPF、EASDF和DNS服务器来执行为例。该方法包括:
步骤1:UE向SMF发送PDU会话建立请求;
步骤2:SMF选择EASDF;
SMF为UE选择第一EASDF,第一EASDF是指SMF为UE选择的EASDF。
SMF选择EASDF的过程可以参考通信协议TS23.501的第6.3条的相关描述,此选择过程可以使用网络存储功能(NF Repository Function,NRF)发现,也可以基于SMF本地配置。EASDF可能已经在NRF注册。
步骤3:SMF向EASDF发送Neasdf_DNS上下文创建请求;
其中,Neasdf是指SMF和EASDF之间的接口或参考点。
SMF调用Neasdf_DNS上下文创建请求到选择的EASDF。Neasdf_DNS上下文创建请求携带有(UE IP地址,回调URI,处理来自UE的DNS消息的规则)。
其中,处理来自UE的DNS消息的规则(即DNS消息处理规则或配置规则)只包括DNS消息转发规则(即转发规则),不包括DNS消息报告规则(即报告规则)。
其中,转发规则包括:需要转发的DNS服务器地址和需要添加的ECS选项中的至少一种。
EASDF为PDU会话创建一个DNS上下文,并存储UE的IP地址,回调URI和处理从UE到上下文的DNS消息的规则。
其中,报告规则包括:EASDF在收到DNS查询或DNS响应时,向SMF上报DNS消息(包括EAS相关信息)的上报条件。
步骤4:EASDF向SMF发送Neasdf_DNS上下文创建响应;
EASDF调用服务操作Neasdf_DNS上下文创建响应(EASDF的IP地址),并使用允许SMF稍后更新或删除上下文的信息。
EASDF的IP地址是UE连接到EASDF作为PDU会话的DNS服务器的地址。
步骤5:SMF向UE发送PDU会话建立确认;
该PDU会话建立请求携带有第一EASDF的地址信息,参考步骤460或步骤660所示。
步骤6:SMF向EASDF发送Neasdf_DNS上下文更新请求;
SMF可能会调用Neasdf_DNS上下文更新请求(PDU会话上下文ID,处理UE上DNS查询的规则)到EASDF。
在更新的处理UE上DNS查询的规则中,仍然只包括DNS消息转发规则(即转发规则),不包括DNS消息报告规则(即报告规则)。
步骤7:EASDF向SMF发送Neasdf_DNS上下文更新响应。
相比于相关技术,在步骤3和步骤6中,SMF仅向EASDF发送配置转发规则。
针对实现方式二:
图6示出了本申请一个示例性实施例提供的报告控制方法的流程图。本实施例以该方法由SMF和EASDF执行来举例说明。所述方法包括:
步骤520:SMF向EASDF发送限制门限;
限制门限是与EASDF在发送报告时的上报速率有关的门限(Threshold)。限制门限也可称为:报告率门限。
比如,限制门限为500个/每秒;或者,限制门限为10000个/每分钟。该限制门限是由网络设备配置的,或者,通信协议约定的。
可选地,SMF还向EASDF发送配置规则,配置规则包括转发规则和报告规则。
步骤540:EASDF接收限制门限;
EASDF接收和保存限制门限。
EASDF会计算自身的上报速率。该上报速率是EASDF在最近一段时间内的上报速率,比如,最近5秒内的上报速率。或者,上报速率是当前所处时间片内的上报速率,比如,当前1秒内的上报速率。
步骤560:EASDF限制向SMF发送报告的上报速率不超过限制门限。
可选地,EASDF限制在存在报告需要发送时,判断上报速率是否达到限制门限;或者,EASDF每隔预定时间间隔,判断上报速率是否达到限制门限。
可选地,若上报速率小于限制门限,则EASDF向SMF发送报告;若上报速率大于或等于限制门限,则EASDF丢弃待发送的报告,以保持上报速率不超过限制门限。或者,EASDF在上报速率邻近限制门限的情况下,随机或选择性的丢弃一些报告,从而使得向SMF发送报 告的速率不能达到上报限制速率,即不能达到限制门限。
示例性的,报告包括:第一类报告和第二类报告中的至少一种。第一类报告是由DNS查询触发的报告,第二类报告是由DNS响应触发的报告。
在一个实施例中,上述限制门限包括:共享门限,共享门限是EASDF的至少两类报告共用的门限。
在另一个实施例中,上述限制门限包括:第一门限和第二门限,第一门限是EASDF的第一类报告对应的门限;第二门限是EASDF的第二类报告对应的门限。示例性的,第一类报告是DNS查询报告,第二类报告是DNS响应报告。
示例性的,共享门限也可称为共享报告率门限,第一门限也可称为第一类报告率门限,第二门限也可称为第二类报告率门限。
综上所述,本实施例提供的方法,通过SMF向EASDF提供限制门限,使得EASDF向SMF报告,进行自行限速,使得在上报速率不能达到限制门限,从而减少了EASDF在单位时间内发送给SMF的报告数量,使得EASDF不能无限制地向SMF发送报告,从而防御异常UE发起的DOS攻击或DDOS攻击,尽可能保障移动通信系统为更多的UE提供服务。
示例性的,结合相关技术中的通信协议TS23.501来对图4实施例进行阐述。图7示出了通信协议TS23.501中的EAS发现方法的流程图。
图7示出了本申请另一个示例性实施例提供的报告控制方法的流程图。以该方法由UE、SMF、UPF、EASDF和DNS服务器来执行为例。该方法包括:
步骤1:UE向SMF发送PDU会话建立请求;
步骤2:SMF选择EASDF;
步骤3:SMF向EASDF发送Neasdf_DNS上下文创建请求;
步骤4:EASDF向SMF发送Neasdf_DNS上下文创建响应;
步骤5:SMF向UE发送PDU会话建立确认;
步骤6:SMF向EASDF发送Neasdf_DNS上下文更新请求;
步骤7:EASDF向SMF发送Neasdf_DNS上下文更新响应;
步骤8:UE向EASDF发送DNS查询;
步骤9:EASDF向SMF发送Neasdf_DNS上下文通知请求;
步骤10:SMF向EASDF发送Neasdf_DNS上下文通知响应;
步骤11:EASDF向DNS服务器发送DNS查询;
步骤12:DNS服务器向EASDF发送DNS响应;
步骤13:EASDF向SMF发送Neasdf_DNS上下文通知请求;
步骤14:SMF向EASDF发送Neasdf_DNS上下文通知响应;
步骤15:UL CL/分支点(Branching Point,BP)插入;
步骤16:SMF向EASDF发送Neasdf_DNS上下文更新请求;
步骤17:EASDF向SMF发送Neasdf_DNS上下文更新响应;
步骤18:EASDF向UE发送DNS响应。
相比于相关技术,在步骤3中SMF向EASDF发送限制门限,或,在步骤6中SMF向EASDF发送或更新限制门限。
在一个实施例中,上述限制门限包括:共享门限,共享门限是EASDF的至少两类报告共用的门限。也即:
DNS报告包括共享报告率门限(每秒时间)。对于EASDF,DNS查询和DNS响应对应的至少两类报告共享此共享报告率门限,简称门限。EASDF应将其报告率控制在该共享报告率门限以下,即当报告率大于或等于该共享报告率门限时,EASDF将丢弃部分报告。
在另一个实施例中,上述限制门限包括:第一门限和第二门限,第一门限是EASDF的第一类报告对应的门限;第二门限是EASDF的第二类报告对应的门限,第一门限也可称为第一类报告率门限,第二门限也可称为第二类报告率门限。也即:
DNS查询报告还包括第一类报告率门限(每秒时间)。EASDF应将其报告率控制在该第一类报告率门限以下,即当报告率大于或等于该第一类报告率门限时,EASDF将丢弃部分报告。
DNS响应报告还包括第二类报告率门限(每秒时间)。EASDF应将其报告率控制在该第二类报告率门限以下,即当报告率大于或等于该第二类报告率门限时,EASDF将丢弃部分报告。
即第一类报告率门限是用于限制消息9的发送速率。第二类报告率门限是限制消息13(对应于步骤13~17)的发送速率。若DNS查询报告与DNS响应报告共用共享报告率门限,即是同时对消息9与消息13的发送速率的限制。
针对实现方式三:
图8示出了本申请一个示例性实施例提供的报告控制方法的流程图。本实施例以该方法由SMF和EASDF执行来举例说明。所述方法包括:
步骤530:EASDF读取本地的限制门限;
EASDF获取本地的限制门限。该本地的限制门限可以是通信协议预定义的,也可以是本地策略生成的,也可以是由网管系统配置的。
EASDF判断上报速率是否达到限制门限;
EASDF会计算自身的上报速率。该上报速率是EASDF在最近一段时间内的上报速率,比如,最近5秒内的上报速率。或者,上报速率是当前所处时间片内的上报速率,比如,当前1秒内的上报速率。
可选地,EASDF在存在报告需要发送时,判断上报速率是否达到限制门限;或者,EASDF每隔预定时间间隔,判断上报速率是否达到限制门限。
可选地,若上报速率小于限制门限,则执行步骤560;若上报速率大于或等于限制门限,则执行步骤580;可选地,若上报速率小于或等于限制门限,则执行步骤560;若上报速率大于限制门限,则执行步骤580。
步骤560:EASDF限制向SMF发送报告的上报速率不超过限制门限。
可选地,EASDF限制在存在报告需要发送时,判断上报速率是否达到限制门限;或者, EASDF每隔预定时间间隔,判断上报速率是否达到限制门限。
可选地,若上报速率小于限制门限,则EASDF向SMF发送报告;若上报速率大于或等于限制门限,则EASDF丢弃待发送的报告,以保持上报速率不超过上报速率。或者,EASDF在上报速率邻近限制门限的情况下,随机或选择性的丢弃一些报告,从而使得向SMF发送报告的速率不能达到限制门限。
示例性的,报告包括:第一类报告和第二类报告中的至少一种。第一类报告是由DNS查询触发的报告,第二类报告是由DNS响应触发的报告。
在一个实施例中,上述限制门限包括:共享门限,共享门限是EASDF的至少两类报告共用的门限。
也即,根据本地策略和配置的DNS上报速率门限(每秒时间)中的至少一种。在此门限以下,EASDF需要共享并控制DNS查询和DNS响应的报告率,即当报告率大于或等于该门限时,EASDF将丢弃部分报告。
在另一个实施例中,上述限制门限包括:第一门限和第二门限,第一门限是EASDF的第一类报告对应的门限;第二门限是EASDF的第二类报告对应的门限。示例性的,第一类报告是DNS查询触发的报告,第二类报告是DNS响应触发的报告。
也即,根据本地策略和/或配置的DNS查询上报速率门限(每秒时间)。EASDF应将其DNS查询报告率控制在该本地门限以下,即当报告率大于或等于该门限时,EASDF将丢弃部分报告。
也即,根据本地策略和/或配置的DNS响应报告速率门限(每秒时间)。EASDF应将其DNS响应报告率控制在该本地门限以下,即当报告率大于或等于该门限时,EASDF将丢弃部分报告。
综上所述,本实施例提供的方法,EASDF读取本地的限制门限,使得EASDF在上报速率达到限制门限的情况下,不再向SMF发送报告,从而减少了EASDF在单位时间内发送给SMF的报告数量,使得EASDF不能无限制地向SMF发送报告,从而防御异常UE发起的DOS攻击或DDOS攻击,尽可能保障移动通信系统为更多的UE提供服务。
需要说明的是,在图6和图8的两个实施例结合时,EASDF可能同时获取到两组限制门限,其中一组限制门限是SMF配置的限制门限,另一组限制门限是本地的限制门限。在该种情况下,SMF配置的限制门限的优先级高于本地的限制门限的优先级。也即,EASDF优先使用SMF配置的限制门限的优先级。
若EASDF没有SMF配置的限制门限,仅有本地的限制门限的情况下,EASDF使用本地的限制门限。
针对实现方式四:
图9示出了本申请一个示例性实施例提供的报告控制方法的流程图。本实施例以该方法由SMF和EASDF执行来举例说明。所述方法包括:
步骤620:SMF在EASDF的上报速率达到限制门限的情况下,向EASDF发送停止指 示,停止指示用于向EASDF指示停止发送报告;
限制门限是与EASDF在发送报告时的上报速率有关的门限。限制门限也可称为:报告率门限。
比如,限制门限为500个/每秒;或者,限制门限为10000个/每分钟。该限制门限是由其它网络设备配置的,或者,通信协议约定的。
SMF判断EASDF的上报速率是否达到限制门限。其中,EASDF的上报速率等于:SMF收到的报告数量/时间。
可选地,EASDF的上报速率是SMF计算的。但是本实施例不排除EASDF计算自身的上报速率后,将上报速率上报给SMF的可能。
该上报速率是EASDF在最近一段时间内的上报速率,比如,最近5秒内的上报速率。或者,上报速率是当前所处时间片内的上报速率,比如,当前1秒内的上报速率。
可选地,若上报速率小于限制门限,则SMF继续保持接收EASDF的报告;若上报速率大于或等于限制门限,则执行步骤620;可选地,若上报速率小于或等于限制门限,则SMF继续保持接收EASDF的报告;若上报速率大于限制门限,则执行步骤620。
步骤640:EASDF接收停止指示;
可选地,停止指示携带在图7的步骤6所示的Neasdf_DNS上下文更新请求中。比如,停止指示携带在Neasdf_DNS上下文更新请求中的停止DNS查询和/或响应报告指示字段。
一种设计中,停止指示包括:共享停止指示,共享停止指示用于指示EASDF停止两种类型报告,也即同时停止第一类报告和第二类报告。
另一种设计中,停止指示包括:第一停止指示和第二停止指示中的至少一种。第一停止指示用于指示EASDF停止发送第一类报告,第二停止指示用于指示EASDF停止发送第二类报告。
一般而言,停止指示可以在任意时刻发送,但最好是在图7的步骤10或步骤14后发送。
步骤660:EASDF根据停止指示停止向SMF发送报告;
在停止指示包括共享停止指示的情况下,EASDF同时停止发送第一类报告和第二类报告。在停止指示包括第一停止指示的情况下,EASDF停止发送第一类报告。在停止指示包括第二停止指示的情况下,EASDF停止发送第二类报告。
步骤682:SMF向EASDF发送开始指示,开始指示用于向EASDF指示恢复发送报告。
开始指示的发送时刻可以为步骤660之后的任意时刻。
可选地,开始指示携带在图7的步骤7所示的Neasdf_DNS上下文更新响应中。比如,开始指示携带在Neasdf_DNS上下文更新响应中的开始DNS查询和响应报告指示字段中的至少一种。
一种设计中,开始指示包括:共享开始指示,共享开始指示用于指示EASDF恢复发送两种类型报告,也即同时恢复发送第一类报告和第二类报告。
另一种设计中,开始指示包括:第一开始指示和第二开始指示中的至少一种。第一开始 指示用于指示EASDF恢复发送第一类报告,第二开始指示用于指示EASDF恢复发送第二类报告。
步骤684:EASDF接收开始指示;
可选地,开始指示携带在图7的步骤7所示的Neasdf_DNS上下文更新响应中。比如,开始指示携带在Neasdf_DNS上下文更新响应中的开始DNS查询和响应报告指示字段中的至少一种。
步骤686:EASDF根据开始指示恢复向SMF发送报告。
在开始指示包括共享开始指示的情况下,EASDF同时恢复发送第一类报告和第二类报告。在开始指示包括第一开始指示的情况下,EASDF恢复发送第一类报告。在开始指示包括第二开始指示的情况下,EASDF恢复发送第二类报告。
若Neasdf_DNS上下文更新响应中不包含回退时间,则只有当EASDF再次收到SMF发送的开始指示,才能恢复报告的发送。即使在此期间收到其它的更新报告规则的Neasdf_DNS上下文更新请求消息,EASDF也不能开始向SMF发送报告。
综上所述,本实施例提供的方法,由SMF向EASDF发送停止指示或开始指示,主动控制EASDF停止发送报告或恢复发送报告,从而使得SMF能够主动控制EASDF的报告发送机制,EASDF不能无限制地向SMF发送报告,从而防御异常UE发起的DOS攻击或DDOS攻击,尽可能保障移动通信系统为更多的UE提供服务。
而且,SMF可以主动恢复EASDF的报告机制,能够保障UL CL插入、BP插入等功能的正常使用。
图10示出了本申请一个示例性实施例提供的报告控制方法的流程图。本实施例以该方法由SMF和EASDF执行来举例说明。所述方法包括:
步骤720:SMF在EASDF的上报速率达到限制门限的情况下,向EASDF发送停止指示,停止指示包括回退时间;
本步骤的实现过程可以参考步骤620。与步骤620不同的是,本实施例的停止指示还包括回退(back off)时间,回退时间是指示EASDF停止发送报告的时长。
可选地,回退时间的时长为5分钟。
步骤740:EASDF接收停止指示;
可选地,停止指示携带在图7的步骤6所示的Neasdf_DNS上下文更新请求中。
可选地,停止指示携带在Neasdf_DNS上下文更新请求中的停止DNS查询和响应报告指示字段中的至少一种。
可选地,停止指示携带有共享回退时间,共享回退时间是EASDF的至少两类报告共用的回退时间;
可选地,停止指示携带有第一回退时间和第二回退时间中的至少一种。
第一回退时间是EASDF的第一类报告对应的回退时间,第二回退时间是EASDF的第二类报告对应的回退时间。第一类报告是DNS查询触发的报告,简称DNS查询报告;第二类 报告是DNS响应触发的报告,简称DNS响应报告。
EASDF从停止指示中,解析或读取回退时间。
步骤760:EASDF在回退时间超时前,停止向SMF发送报告;
示意性的,EASDF收到停止指示的时刻为t1,回退时间为t bo,则EASDF在t2=t1+t bo之前,停止向SMF发送报告。
在停止指示包括共享停止指示的情况下,EASDF同时停止发送第一类报告和第二类报告。在停止指示包括第一停止指示的情况下,EASDF停止发送第一类报告。在停止指示包括第二停止指示的情况下,EASDF停止发送第二类报告。
可选地,EASDF在共享回退时间超时前,停止向SMF发送至少两类报告。
可选地,EASDF在第一回退时间超时前,停止向SMF发送第一类报告。可选地,EASDF在第二回退时间超时前,停止向SMF发送第二类报告。
在EASDF停止发送报告后,本实施例可以采用如下两种恢复方式中的任意一种来恢复报告的发送。
恢复方式一:
步骤782:SMF向EASDF发送开始指示,开始指示用于向EASDF指示恢复发送报告;
开始指示的发送时刻可以为步骤660之后的任意时刻。
可选地,开始指示携带在图7的步骤7所示的Neasdf_DNS上下文更新响应中。比如,开始指示携带在Neasdf_DNS上下文更新响应中的开始DNS查询和响应报告指示字段中的至少一种。
步骤784:EASDF接收开始指示;
开始指示用于向EASDF指示恢复发送报告。
步骤786:EASDF根据开始指示恢复向SMF发送报告;
一种设计中,开始指示包括:共享开始指示,共享开始指示用于指示EASDF恢复发送两种类型报告,也即同时恢复发送第一类报告和第二类报告。
另一种设计中,开始指示包括:第一开始指示和第二开始指示中的至少一种。第一开始指示用于指示EASDF恢复发送第一类报告,第二开始指示用于指示EASDF恢复发送第二类报告。
在开始指示包括共享开始指示的情况下,EASDF同时恢复发送第一类报告和第二类报告。在开始指示包括第一开始指示的情况下,EASDF恢复发送第一类报告。在开始指示包括第二开始指示的情况下,EASDF恢复发送第二类报告。
恢复方式二:
步骤792:EASDF在回退时间超时后,恢复向SMF发送报告。
若SMF没有向EASDF发送开始指示,EASDF在回退时间超时后,自行恢复向SMF发送报告。
可选地,EASDF在共享回退时间超时后,恢复向SMF发送至少两类报告。
可选地,EASDF在第一回退时间超时后,恢复向SMF发送第一类报告。可选地,EASDF在第二回退时间超时后,恢复向SMF发送第二类报告。
综上所述,本实施例提供的方法,在回退时间超时后,EASDF可以自行恢复EASDF的报告机制,能够保障UL CL插入、BP插入等功能的正常使用。
上述各个实施例中由SMF执行的步骤,可以单独实现成为SMF侧的实施例;上述各个实施例中由EASDF执行的步骤,可以单独实现成为EASDF侧的实施例。上述各个实施例还可以基于本领域技术人员的理解,进行拆分和重组,本申请对此不加以限定。
应该理解的是,虽然图3、4、5、6、7、8、9和10的流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,这些步骤可以以其它的顺序执行。而且,图3、4、5、6、7、8、9和10中的至少一部分步骤可以包括多个子步骤或者多个阶段,这些子步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,这些子步骤或者阶段的执行顺序也不必然是依次进行,而是可以与其它步骤或者其它步骤的子步骤或者阶段的至少一部分轮流或者交底地执行。
图11示出了本申请一个示例性实施例提供的报告控制装置的框图。该装置可以实现成为SMF,或者SMF的一部分,或者应用于SMF中。所述装置包括:
发送模块1120,用于向EASDF发送控制信息,所述控制信息用于禁止或停止或减少所述EASDF向所述SMF发送报告。
在一个实施例中,所述发送模块1120,用于向所述EASDF发送配置规则,所述配置规则包括转发规则且不包括报告规则,所述报告规则是用于触发所述EASDF发送所述报告的规则。
在一个实施例中,所述发送模块1120,用于向所述EASDF配置限制门限,以便所述EASDF在上报速率达到所述限制门限的情况下停止发送所述报告。
在一个实施例中,所述发送模块1120,用于在所述EASDF的上报速率达到限制门限的情况下,向所述EASDF发送停止指示,所述停止指示用于指示所述EASDF停止发送所述报告。
在一个实施例中,所述停止指示包括回退时间,所述回退时间是所述EASDF停止发送所述报告的时长。
在一个实施例中,所述发送模块1120,用于向所述EASDF发送开始指示,所述开始指示用于指示所述EASDF恢复发送所述报告。
在一个实施例中,所述限制门限包括:共享门限,所述共享门限是所述EASDF的至少两类报告共享的门限;或,所述限制门限包括:第一门限和第二门限中的至少一种,所述第一门限是所述EASDF的第一类报告对应的门限;所述第二门限是所述EASDF的第二类报告对应的门限。
在一个实施例中,所述停止指示包括:共享停止指示,所述共享停止指示是所述EASDF 的至少两类报告共享的停止指示;或,所述停止指示包括:第一停止指示和第二停止指示中的至少一种,所述第一停止指示是所述EASDF的第一类报告对应的停止指示;所述第二停止指示是所述EASDF的第二类报告对应的停止指示。
在一个实施例中,所述开始指示包括:共享开始指示,所述共享开始指示是所述EASDF的至少两类报告共享的开始指示;或,所述开始指示包括:第一开始指示和第二开始指示中的至少一种,所述第一开始指示是所述EASDF的第一类报告对应的开始指示;所述第二开始指示是所述EASDF的第二类报告对应的开始指示。
在一个实施例中,所述回退时间包括:共享回退时间,所述共享回退时间是所述EASDF的至少两类报告共享的回退时间;或,所述回退时间包括:第一回退时间和第二回退时间中的至少一种,所述第一回退时间是所述EASDF的第一类报告对应的回退时间;所述第二回退时间是所述EASDF的第二类报告对应的回退时间。
在一个实施例中,所述第一类报告是DNS请求触发的报告;
所述第二类报告是DNS响应触发的报告。
图12示出了本申请一个示例性实施例提供的报告控制装置的框图。该装置可以实现成为EASDF或EASDF的一部分,或者应用于EASDF中。所述装置包括:
接收模块1220,用于获取控制信息;
发送模块1240,用于根据所述控制信息禁止或停止或减少向会话管理功能SMF发送报告。
在一个实施例中,所述接收模块1220,用于接收SMF发送的配置规则,所述配置规则包括转发规则且不包括报告规则,所述报告规则是用于触发所述EASDF发送所述报告的规则;
所述发送模块1240,用于根据所述配置规则禁止向所述SMF发送报告。
在一个实施例中,所述接收模块1220,用于接收SMF配置的限制门限,或,读取本地的所述限制门限;
所述发送模块1240,用于限制向所述SMF发送所述报告的上报速率不超过所述限制门限。
在一个实施例中,所述SMF配置的限制门限的优先级高于本地的所述限制门限的优先级。
在一个实施例中,所述接收模块1220,用于接收所述SMF发送的停止指示,所述停止指示是所述SMF在所述EASDF的上报速率达到限制门限的情况下发送的;
所述发送模块1240,用于根据所述停止指示停止向所述SMF发送报告。
在一个实施例中,所述停止指示包括回退时间;
所述发送模块1240,用于在所述回退时间超时前,停止向所述SMF发送报告。
在一个实施例中,所述方法还包括:
所述接收模块1220,用于接收所述SMF发送的开始指示;
所述发送模块1240,用于根据所述开始指示恢复向所述SMF发送报告。
在一个实施例中,所述方法还包括:
所述发送模块1240,用于在所述回退时间超时后,恢复向所述SMF发送报告。
在一个实施例中,所述限制门限包括:共享门限,所述共享门限是所述EASDF的至少两类报告共享的门限;或,所述限制门限包括:第一门限和第二门限中的至少一种,所述第一门限是所述EASDF的第一类报告对应的门限;所述第二门限是所述EASDF的第二类报告对应的门限。
在一个实施例中,所述停止指示包括:共享停止指示,所述共享停止指示是所述EASDF的至少两类报告共享的停止指示;或,所述停止指示包括:第一停止指示和第二停止指示中的至少一种,所述第一停止指示是所述EASDF的第一类报告对应的停止指示;所述第二停止指示是所述EASDF的第二类报告对应的停止指示。
在一个实施例中,所述开始指示包括:共享开始指示,所述共享开始指示是所述EASDF的至少两类报告共享的开始指示;或,所述开始指示包括:第一开始指示和第二开始指示中的至少一种,所述第一开始指示是所述EASDF的第一类报告对应的开始指示;所述第二开始指示是所述EASDF的第二类报告对应的开始指示。
在一个实施例中,所述回退时间包括:共享回退时间,所述共享回退时间是所述EASDF的至少两类报告共享的回退时间;或,所述回退时间包括:第一回退时间和第二回退时间中的至少一种,所述第一回退时间是所述EASDF的第一类报告对应的回退时间;所述第二回退时间是所述EASDF的第二类报告对应的回退时间。
在一个实施例中,所述第一类报告是DNS请求触发的报告;所述第二类报告是DNS响应触发的报告。
需要说明的是,发送模块用于执行上述各个方法实施例中与发送相关的步骤;接收模块用于执行上述各个方法实施例中与接收相关的步骤;处理模块用于执行上述各个方法实施例中除发送和接收步骤之外的其它步骤,本实施例不再一一赘述。
图13示出了本申请一个实施例提供的网元设备的结构示意图,例如,该网元设备可以用于执行上述报告控制方法。具体来讲:该网元设备1300可以包括:处理器1301、接收器1302、发射器1303、存储器1304和总线1305。
处理器1301包括一个或者一个以上处理核心,处理器1301通过运行软件程序以及模块,从而执行各种功能应用以及信息处理。
接收器1302和发射器1303可以实现为一个收发器1306,该收发器1306可以是一块通信芯片。
存储器1304通过总线1305与处理器1301相连。
存储器1304可用于存储计算机程序,处理器1301用于执行该计算机程序,以实现上述方法实施例中的网元设备、接入网实体、核心网网元或核心网实体执行的各个步骤。
其中,发射器1303用于执行上述各个方法实施例中与发送相关的步骤;接收器1302用于执行上述各个方法实施例中与接收相关的步骤;处理器1301用于执行上述各个实施例中除 发送和接收步骤之外的其它步骤。
此外,存储器1304可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,易失性或非易失性存储设备包括但不限于:RAM(Random-Access Memory,随机存储器)和ROM(Read-Only Memory,只读存储器)、EPROM(Erasable Programmable Read-Only Memory,可擦写可编程只读存储器)、EEPROM(Electrically Erasable Programmable Read-Only Memory,电可擦写可编程只读存储器)、闪存或其他固态存储其技术,CD-ROM(Compact Disc Read-Only Memory,只读光盘)、DVD(Digital Video Disc,高密度数字视频光盘)或其他光学存储、磁带盒、磁带、磁盘存储或其他磁性存储设备。
在示例性实施例中,还提供了一种网元设备,所述网元设备包括:处理器和存储器,所述存储器存储有计算机程序,所述计算机程序由所述处理器加载并执行以实现如上所述的报告控制方法。
本申请还提供一种计算机可读存储介质,所述存储介质中存储有至少一条指令、至少一段程序、代码集或指令集,所述至少一条指令、所述至少一段程序、所述代码集或指令集由处理器加载并执行以实现上述方法实施例提供的报告控制方法。
可选地,本申请还提供了一种计算机程序产品,所述计算机程序产品包括计算机指令,该计算机指令存储在计算机可读存储介质中。计算机设备的处理器从计算机可读存储介质读取该计算机指令,处理器执行该计算机指令,使得该计算机设备执行上述方面提供的报告控制方法。
上述本申请实施例序号仅仅为了描述,不代表实施例的优劣。
本领域普通技术人员可以理解实现上述实施例的全部或部分步骤可以通过硬件来完成,也可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中,上述提到的存储介质可以是只读存储器,磁盘或光盘等。
以上所述仅为本申请的可选实施例,并不用以限制本申请,凡在本申请的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。

Claims (27)

  1. 一种报告控制方法,其特征在于,所述方法包括:
    会话管理功能SMF向边缘应用服务器发现功能EASDF发送控制信息,所述控制信息用于限制所述EASDF向所述SMF发送报告。
  2. 根据权利要求1所述的方法,其特征在于,所述SMF向EASDF发送控制信息包括:
    所述SMF向所述EASDF发送配置规则,所述配置规则包括转发规则且不包括报告规则,所述报告规则是用于触发所述EASDF发送所述报告的规则。
  3. 根据权利要求1所述的方法,其特征在于,所述SMF向EASDF发送控制信息包括:
    所述SMF向所述EASDF配置限制门限,所述限制门限用于向所述EASDF配置所述报告的上报速率的上限。
  4. 根据权利要求1所述的方法,其特征在于,所述SMF向EASDF发送控制信息包括:
    所述SMF在所述EASDF的上报速率达到限制门限的情况下,向所述EASDF发送停止指示,所述停止指示用于指示所述EASDF停止发送所述报告。
  5. 根据权利要求4所述的方法,其特征在于,所述停止指示包括回退时间,所述回退时间是所述EASDF停止发送所述报告的时长。
  6. 根据权利要求4所述的方法,其特征在于,所述方法还包括:
    所述SMF向所述EASDF发送开始指示,所述开始指示用于指示所述EASDF恢复发送所述报告。
  7. 根据权利要求3至6任一所述的方法,其特征在于,
    所述限制门限包括:共享门限,所述共享门限是所述EASDF的至少两类报告共享的门限;
    或,
    所述限制门限包括:第一门限和第二门限中的至少一种,所述第一门限是所述EASDF的第一类报告对应的门限;所述第二门限是所述EASDF的第二类报告对应的门限。
  8. 根据权利要求3至6任一所述的方法,其特征在于,
    所述停止指示包括:共享停止指示,所述共享停止指示是所述EASDF的至少两类报告共享的停止指示;
    或,
    所述停止指示包括:第一停止指示和第二停止指示中的至少一种,所述第一停止指示是所述EASDF的第一类报告对应的停止指示;所述第二停止指示是所述EASDF的第二类报告对应的停止指示。
  9. 根据权利要求6所述的方法,其特征在于,
    所述开始指示包括:共享开始指示,所述共享开始指示是所述EASDF的至少两类报告共享的开始指示;
    或,
    所述开始指示包括:第一开始指示和第二开始指示中的至少一种,所述第一开始指示是所述EASDF的第一类报告对应的开始指示;所述第二开始指示是所述EASDF的第二类报告对应的开始指示。
  10. 根据权利要求6所述的方法,其特征在于,
    所述回退时间包括:共享回退时间,所述共享回退时间是所述EASDF的至少两类报告共享的回退时间;
    或,
    所述回退时间包括:第一回退时间和第二回退时间中的至少一种,所述第一回退时间是所述EASDF的第一类报告对应的回退时间;所述第二回退时间是所述EASDF的第二类报告对应的回退时间。
  11. 一种报告控制方法,其特征在于,所述方法包括:
    边缘应用服务器发现功能EASDF获取控制信息;
    所述EASDF根据所述控制信息限制向会话管理功能SMF发送报告。
  12. 根据权利要求11所述的方法,其特征在于,所述EASDF获取控制信息包括:
    所述EASDF接收SMF发送的配置规则,所述配置规则包括转发规则且不包括报告规则,所述报告规则是用于触发所述EASDF发送所述报告的规则;
    所述EASDF根据所述控制信息限制向所述SMF发送报告,包括:
    所述EASDF根据所述配置规则禁止向所述SMF发送报告。
  13. 根据权利要求12所述的方法,其特征在于,所述EASDF获取控制信息包括:
    所述EASDF接收SMF配置的限制门限,或,读取本地的所述限制门限;
    所述EASDF根据所述控制信息限制向所述SMF发送报告,包括:
    所述EASDF限制向所述SMF发送所述报告的上报速率不超过所述限制门限。
  14. 根据权利要求13所述的方法,其特征在于,所述SMF配置的限制门限的优先级高于本地的所述限制门限的优先级。
  15. 根据权利要求11所述的方法,其特征在于,所述EASDF获取控制信息包括:
    所述EASDF接收所述SMF发送的停止指示,所述停止指示是所述SMF在所述EASDF的上报速率达到限制门限的情况下发送的;
    所述EASDF根据所述控制信息限制向所述SMF发送报告,包括:
    所述EASDF根据所述停止指示停止向所述SMF发送报告。
  16. 根据权利要求15所述的方法,其特征在于,所述停止指示包括回退时间;
    所述EASDF根据所述停止指示停止向所述SMF发送报告,包括:
    所述EASDF在所述回退时间超时前,停止向所述SMF发送报告。
  17. 根据权利要求16所述的方法,其特征在于,所述方法还包括:
    所述EASDF接收所述SMF发送的开始指示;
    所述EASDF根据所述开始指示恢复向所述SMF发送报告。
  18. 根据权利要求16所述的方法,其特征在于,所述方法还包括:
    所述EASDF在所述回退时间超时后,恢复向所述SMF发送报告。
  19. 根据权利要求13至18任一所述的方法,其特征在于,
    所述限制门限包括:共享门限,所述共享门限是所述EASDF的至少两类报告共享的门限;
    或,
    所述限制门限包括:第一门限和第二门限中的至少一种,所述第一门限是所述EASDF的第一类报告对应的门限;所述第二门限是所述EASDF的第二类报告对应的门限。
  20. 根据权利要求15至18任一所述的方法,其特征在于,
    所述停止指示包括:共享停止指示,所述共享停止指示是所述EASDF的至少两类报告共享的停止指示;
    或,
    所述停止指示包括:第一停止指示和第二停止指示中的至少一种,所述第一停止指示是所述EASDF的第一类报告对应的停止指示;所述第二停止指示是所述EASDF的第二类报告对应的停止指示。
  21. 根据权利要求17所述的方法,其特征在于,
    所述开始指示包括:共享开始指示,所述共享开始指示是所述EASDF的至少两类报告共享的开始指示;
    或,
    所述开始指示包括:第一开始指示和第二开始指示中的至少一种,所述第一开始指示是所述EASDF的第一类报告对应的开始指示;所述第二开始指示是所述EASDF的第二类报告对应的开始指示。
  22. 根据权利要求16或18所述的方法,其特征在于,
    所述回退时间包括:共享回退时间,所述共享回退时间是所述EASDF的至少两类报告共享的回退时间;
    或,
    所述回退时间包括:第一回退时间和第二回退时间中的至少一种,所述第一回退时间是所述EASDF的第一类报告对应的回退时间;所述第二回退时间是所述EASDF的第二类报告对应的回退时间。
  23. 一种报告控制装置,其特征在于,所述装置包括:
    发送模块,用于向边缘应用服务器发现功能EASDF发送控制信息,所述控制信息用于禁止或停止或减少或限制所述EASDF向所述装置发送报告。
  24. 一种报告控制装置,其特征在于,所述装置包括:
    获取模块,用于获取控制信息;
    发送模块,用于根据所述控制信息禁止或停止或减少或限制向会话管理功能SMF发送报 告。
  25. 一种网元设备,其特征在于,所述网元设备包括:处理器和存储器,所述存储器存储有计算机程序,所述计算机程序由所述处理器加载并执行以实现如权利要求1至22任一所述的报告控制方法。
  26. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机程序,所述计算机程序由处理器加载并执行以实现如权利要求1至22任一所述的报告控制方法。
  27. 一种计算机程序产品,包括计算机程序,其特征在于,该计算机程序被处理器执行时实现权利要求1至22中任一项所述的方法的步骤。
PCT/CN2022/078793 2021-04-02 2022-03-02 报告控制方法、装置、设备、介质和计算机程序产品 WO2022206268A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP22778452.7A EP4199478A4 (en) 2021-04-02 2022-03-02 REPORT CONTROL METHOD AND APPARATUS, DEVICE, MEDIUM AND COMPUTER PROGRAM PRODUCT
US17/989,473 US20230074694A1 (en) 2021-04-02 2022-11-17 Report control method and apparatus, device, medium, and computer program product

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110363841.9 2021-04-02
CN202110363841.9A CN113114651B (zh) 2021-04-02 2021-04-02 报告控制方法、装置、设备及介质

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/989,473 Continuation US20230074694A1 (en) 2021-04-02 2022-11-17 Report control method and apparatus, device, medium, and computer program product

Publications (1)

Publication Number Publication Date
WO2022206268A1 true WO2022206268A1 (zh) 2022-10-06

Family

ID=76713863

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/078793 WO2022206268A1 (zh) 2021-04-02 2022-03-02 报告控制方法、装置、设备、介质和计算机程序产品

Country Status (4)

Country Link
US (1) US20230074694A1 (zh)
EP (1) EP4199478A4 (zh)
CN (2) CN118101311A (zh)
WO (1) WO2022206268A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024081317A1 (en) * 2022-10-12 2024-04-18 Intel Corporation Edge-native management system of edge applications

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118101311A (zh) * 2021-04-02 2024-05-28 腾讯科技(深圳)有限公司 报告控制方法、装置、设备及介质
CN113572864B (zh) * 2021-07-21 2023-06-20 腾讯科技(深圳)有限公司 一种数据处理方法、网元设备以及可读存储介质
CN115766657A (zh) * 2021-08-06 2023-03-07 华为技术有限公司 一种获取边缘服务的方法和装置
CN113630272B (zh) * 2021-08-06 2022-12-06 华为技术有限公司 一种通信方法及装置
WO2023147295A1 (en) * 2022-01-28 2023-08-03 Qualcomm Incorporated Discovery of edge application server across networks

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110140333A (zh) * 2017-09-11 2019-08-16 华为技术有限公司 一种会话管理的方法及终端
US20200053828A1 (en) * 2018-08-13 2020-02-13 Jayshree Bharatia Network Initiated UPF sessions Transfer
CN112543511A (zh) * 2019-09-20 2021-03-23 大唐移动通信设备有限公司 一种提供、发现移动边缘计算的方法及设备、装置、介质
WO2021056384A1 (en) * 2019-09-27 2021-04-01 Qualcomm Incorporated Back-off mechanisms for transmission of data over control plane
CN113114651A (zh) * 2021-04-02 2021-07-13 腾讯科技(深圳)有限公司 报告控制方法、装置、设备及介质

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10999779B2 (en) * 2017-01-15 2021-05-04 Lg Electronics Inc. Method for controlling congestion when congestion occurs in network
CN109391915B (zh) * 2017-08-14 2021-03-30 华为技术有限公司 基于cups协议的离线计费话单阈值控制方法及系统
KR20190043084A (ko) * 2017-10-17 2019-04-25 한국전자통신연구원 위치 기반 서비스를 지원하기 위한 5g 시스템 장치 및 방법
US20190116486A1 (en) * 2017-10-17 2019-04-18 Electronics And Telecommunications Research Institute Method and apparatus for location based service in 5g system
US10986528B2 (en) * 2018-02-15 2021-04-20 Huawei Technologies Co., Ltd. Tracking QoS violated events
CN110324800B (zh) * 2018-03-30 2021-01-29 华为技术有限公司 一种策略控制的方法、网元及系统
CN110972092B (zh) * 2018-09-30 2021-02-23 华为技术有限公司 本地局域网通信方法、设备及系统
US11678252B2 (en) * 2018-10-05 2023-06-13 Huawei Technologies Co., Ltd. Quality of service information notification to user equipment, users, and application server
CN113873588A (zh) * 2018-12-29 2021-12-31 华为技术有限公司 一种通信方法及装置
CN111770490B (zh) * 2019-04-02 2022-08-05 大唐移动通信设备有限公司 一种确定终端行为分析的方法和设备
WO2021017550A1 (zh) * 2019-07-30 2021-02-04 华为技术有限公司 一种事件报告的发送方法、装置及系统
US20220287136A1 (en) * 2019-08-05 2022-09-08 Telefonaktiebolaget Lm Ericsson (Publ) Method and Apparatus for Session Management
WO2021016631A2 (en) * 2019-11-08 2021-01-28 Futurewei Technologies, Inc. Methods and apparatus for mobility management
CN111093225B (zh) * 2019-12-30 2021-07-06 北京邮电大学 一种数据路径服务质量的监视及报告方法、装置及介质
CN111431882B (zh) * 2020-03-18 2022-06-10 惠州Tcl移动通信有限公司 数据处理方法、装置及存储介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110140333A (zh) * 2017-09-11 2019-08-16 华为技术有限公司 一种会话管理的方法及终端
US20200053828A1 (en) * 2018-08-13 2020-02-13 Jayshree Bharatia Network Initiated UPF sessions Transfer
CN112543511A (zh) * 2019-09-20 2021-03-23 大唐移动通信设备有限公司 一种提供、发现移动边缘计算的方法及设备、装置、介质
WO2021056384A1 (en) * 2019-09-27 2021-04-01 Qualcomm Incorporated Back-off mechanisms for transmission of data over control plane
CN113114651A (zh) * 2021-04-02 2021-07-13 腾讯科技(深圳)有限公司 报告控制方法、装置、设备及介质

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP4199478A4

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024081317A1 (en) * 2022-10-12 2024-04-18 Intel Corporation Edge-native management system of edge applications

Also Published As

Publication number Publication date
EP4199478A1 (en) 2023-06-21
US20230074694A1 (en) 2023-03-09
CN118101311A (zh) 2024-05-28
CN113114651B (zh) 2024-03-29
CN113114651A (zh) 2021-07-13
EP4199478A4 (en) 2024-05-15

Similar Documents

Publication Publication Date Title
WO2022206268A1 (zh) 报告控制方法、装置、设备、介质和计算机程序产品
CN113115480B (zh) 地址信息发送方法、获取方法、装置、设备及介质
JP7192928B2 (ja) Non-3GPP InterWorking Functionノード、UE、Non-3GPP InterWorking Functionノードの方法、及びUEの方法
US20220060970A1 (en) Routing Rule Configuration Method and Communications Apparatus
KR102588974B1 (ko) 5g 슬라이스 식별자의 프라이버시 보호를 위한 방법 및 시스템
US20220022040A1 (en) Methods, systems, and computer readable media for mitigating 5g roaming security attacks using security edge protection proxy (sepp)
US20200344208A1 (en) Method and apparatus for processing service request
JP2024073446A (ja) Nasメッセージのセキュリティ保護のためのシステム及び方法
WO2022206252A1 (zh) 一种网络攻击的处理方法、装置、设备、计算机可读存储介质及计算机程序产品
US20220256396A1 (en) Congestion control method and apparatus
US11855957B2 (en) Discovery method and apparatus for DNS server, computer device, computer-readable storage medium and computer program product
EP3687135B1 (en) Device monitoring, and deregistration method and apparatus
WO2022206251A1 (zh) 拒绝服务攻击的解决方法、装置、设备、介质和计算机程序产品
TW202142010A (zh) 用戶資料更新方法、裝置、節點和儲存媒體
US20210168614A1 (en) Data Transmission Method and Device
WO2023133691A1 (zh) Drx配置方法、装置、设备及介质
WO2022067538A1 (zh) 网元发现方法、装置、设备及存储介质
WO2022089130A1 (zh) 一种异常终端控制方法及装置
WO2022001972A1 (zh) Dns请求的解析方法、通信装置及通信系统
WO2021168713A1 (zh) 通信方法及装置
WO2009117968A1 (zh) 一种防止非法路由攻击的方法、系统和装置
WO2022165787A1 (zh) 参数配置方法、装置、设备及存储介质
US20240348670A1 (en) Apparatus and method for requesting time sensitive communication management information in wireless communication system
WO2022213486A1 (zh) 网络功能注册方法、发现方法、装置、设备及介质
WO2024145875A1 (zh) 一种授权方法、装置、设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22778452

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2022778452

Country of ref document: EP

Effective date: 20230316

NENP Non-entry into the national phase

Ref country code: DE