[go: up one dir, main page]

CN118118907A - Multi-park wireless private network safety protection method and device and central node - Google Patents

Multi-park wireless private network safety protection method and device and central node Download PDF

Info

Publication number
CN118118907A
CN118118907A CN202211528805.4A CN202211528805A CN118118907A CN 118118907 A CN118118907 A CN 118118907A CN 202211528805 A CN202211528805 A CN 202211528805A CN 118118907 A CN118118907 A CN 118118907A
Authority
CN
China
Prior art keywords
terminal
data
private network
user
wireless private
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211528805.4A
Other languages
Chinese (zh)
Inventor
宋琪
苏自翔
肖松
童贞
曾熙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Chengdu ICT Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Chengdu ICT Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Chengdu ICT Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202211528805.4A priority Critical patent/CN118118907A/en
Publication of CN118118907A publication Critical patent/CN118118907A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • H04W12/64Location-dependent; Proximity-dependent using geofenced areas

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application discloses a wireless private network safety protection method, a device and a central node for multiple parks, wherein the method comprises the following steps: acquiring total user ticket data of a plurality of branch nodes aiming at signaling flow interaction of a wireless private network signaling surface interface; wherein the plurality of branch nodes correspond to different parks or factories; based on the total quantity of user call ticket data, carrying out security collaborative management on the multi-branch nodes to generate wireless private network security protection information; therefore, the central node can control the network security and terminal equipment of each branch node, realize the unified control of the multi-branch nodes, and facilitate the security collaborative management of the multi-branch nodes and the security protection supervision of the wireless private network.

Description

一种多园区的无线专网安全防护方法、装置和中心节点A multi-campus wireless private network security protection method, device and central node

技术领域Technical Field

本申请涉及通信技术领域,尤其是涉及一种多园区的无线专网安全防护方法、装置和中心节点。The present application relates to the field of communication technology, and in particular to a method, device and central node for protecting the security of a wireless private network in multiple campuses.

背景技术Background technique

在新一代科技革命和产业变革的浪潮下,全球领先国家无不将工业互联网作为强化本国未来产业竞争力的战略方向。第五代移动通信技术(5rd-Generation,5G)与工业互联网的融合使得海量工业终端接入工业互联网成为可能。然而,目前缺少跨多园区或跨厂区间专网的安全防护管理方案。Under the wave of the new generation of scientific and technological revolution and industrial transformation, the world's leading countries have all regarded the industrial Internet as a strategic direction to strengthen their future industrial competitiveness. The integration of the fifth-generation mobile communication technology (5th-Generation, 5G) and the industrial Internet has made it possible for massive industrial terminals to access the industrial Internet. However, there is currently a lack of security protection management solutions for private networks across multiple parks or factories.

发明内容Summary of the invention

本申请实施例提供一种多园区的无线专网安全防护方法、装置和中心节点,解决相关技术中缺少跨多园区或跨厂区间专网的安全防护管理方案的问题,通过中心节点管控各分支节点的网络安全及终端设备,实现针对多分支节点的统一管控,便于多分支节点安全协同管理以及无线专网安全防护监管。The embodiments of the present application provide a multi-campus wireless private network security protection method, device and central node to solve the problem of the lack of security protection management solutions for private networks across multiple parks or between factories in the related technology. The central node manages the network security and terminal equipment of each branch node, and realizes unified control of multiple branch nodes, which facilitates the collaborative security management of multiple branch nodes and the security protection supervision of wireless private networks.

本申请的技术方案是这样实现的:The technical solution of this application is implemented as follows:

一种多园区的无线专网安全防护方法,应用于无线专网的中心节点,所述方法包括:A multi-campus wireless private network security protection method is applied to a central node of the wireless private network, the method comprising:

获得多个分支节点针对无线专网信令面接口的信令流程交互的全量用户话单数据;其中,所述多个分支节点对应于不同的园区或厂区;Obtaining full user call list data of signaling process interactions of multiple branch nodes for wireless private network signaling plane interfaces; wherein the multiple branch nodes correspond to different parks or factory areas;

基于所述全量用户话单数据对多分支节点进行安全协同管理,生成无线专网安全防护信息。Based on the full amount of user call record data, multi-branch nodes are managed in a secure and collaborative manner to generate wireless private network security protection information.

一种多园区的无线专网安全防护装置,包括:A multi-campus wireless private network security protection device, comprising:

获得模块,用于获得多个分支节点针对无线专网信令面接口的信令流程交互的全量用户话单数据;其中,所述多个分支节点对应于不同的园区或厂区;An acquisition module is used to obtain the full amount of user call list data of the signaling process interaction of multiple branch nodes for the wireless private network signaling interface; wherein the multiple branch nodes correspond to different parks or factory areas;

处理模块,用于基于所述全量用户话单数据对多分支节点进行安全协同管理,生成无线专网安全防护信息。The processing module is used to perform security collaborative management of multiple branch nodes based on the full amount of user call record data and generate wireless private network security protection information.

一种无线专网的中心节点,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如上述的多园区的无线专网安全防护方法的步骤。A central node of a wireless private network includes: a processor and a memory, the memory is used to store a computer program, and the processor is used to call and run the computer program stored in the memory to execute the steps of the multi-campus wireless private network security protection method as described above.

一种存储介质,所述存储介质存储有一个或者多个程序,所述一个或者多个程序可被一个或者多个处理器执行,以实现如上述的多园区的无线专网安全防护方法的步骤。A storage medium storing one or more programs, wherein the one or more programs can be executed by one or more processors to implement the steps of the multi-campus wireless private network security protection method as described above.

本申请实施例所提供的一种多园区的无线专网安全防护方法,通过获得多个分支节点针对无线专网信令面接口的信令流程交互的全量用户话单数据;其中,多个分支节点对应于不同的园区或厂区;基于全量用户话单数据对多分支节点进行安全协同管理,生成无线专网安全防护信息;如此,中心节点可以管控各分支节点的网络安全及终端设备,实现针对多分支节点的统一管控,便于多分支节点安全协同管理以及无线专网安全防护监管。A multi-campus wireless private network security protection method provided in an embodiment of the present application obtains full user call record data of signaling process interactions of multiple branch nodes for the wireless private network signaling plane interface; wherein, multiple branch nodes correspond to different campuses or factory areas; based on the full user call record data, multiple branch nodes are securely and collaboratively managed to generate wireless private network security protection information; in this way, the central node can manage the network security and terminal equipment of each branch node, realize unified control of multiple branch nodes, and facilitate secure collaborative management of multiple branch nodes and supervision of wireless private network security protection.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

图1为本申请实施例提供的一种多园区的无线专网安全防护方法的流程示意图;FIG1 is a schematic diagram of a flow chart of a multi-campus wireless private network security protection method provided in an embodiment of the present application;

图2为本申请实施例提供的5G保密专网管理平台的架构示意图;FIG2 is a schematic diagram of the architecture of a 5G secure private network management platform provided in an embodiment of the present application;

图3为本申请实施例提供的统一归档管控的业务流的示意图;FIG3 is a schematic diagram of a business flow of unified archiving and management provided in an embodiment of the present application;

图4为本申请实施例提供的5G通信系统的架构示意图;FIG4 is a schematic diagram of the architecture of a 5G communication system provided in an embodiment of the present application;

图5为本申请实施例提供的注册流程示意图;FIG5 is a schematic diagram of a registration process provided in an embodiment of the present application;

图6为本申请实施例提供的认证流程示意图;FIG6 is a schematic diagram of an authentication process provided in an embodiment of the present application;

图7为本申请实施例提供的一种初始终端入网流程示意图;FIG7 is a schematic diagram of an initial terminal network access process provided by an embodiment of the present application;

图8为本申请实施例提供的另一种初始终端入网流程示意图;FIG8 is a schematic diagram of another initial terminal network access process provided in an embodiment of the present application;

图9为本申请实施例提供的服务请求流程示意图;FIG9 is a schematic diagram of a service request process provided in an embodiment of the present application;

图10为本申请实施例提供的一种服务建立流程示意图;FIG10 is a schematic diagram of a service establishment process provided in an embodiment of the present application;

图11为本申请实施例提供的另一种服务建立流程示意图;FIG11 is a schematic diagram of another service establishment process provided in an embodiment of the present application;

图12为本申请实施例提供的一种PDU会话初始建立流程示意图;FIG12 is a schematic diagram of a PDU session initial establishment process provided in an embodiment of the present application;

图13为本申请实施例提供的另一种PDU会话初始建立流程示意图;FIG13 is a schematic diagram of another PDU session initial establishment process provided in an embodiment of the present application;

图14为本申请实施例提供的又一种PDU会话初始建立流程示意图;FIG14 is a schematic diagram of another PDU session initial establishment process provided in an embodiment of the present application;

图15为本申请实施例提供的再一种PDU会话初始建立流程示意图;FIG15 is a schematic diagram of another PDU session initial establishment process provided in an embodiment of the present application;

图16为本申请实施例提供的区域安全监管业务流程示意图;FIG16 is a schematic diagram of a regional security supervision business process provided by an embodiment of the present application;

图17为本申请实施例提供的定位示意图;FIG17 is a schematic diagram of positioning provided in an embodiment of the present application;

图18为本申请实施例提供的5G保密专网管理平台的多维安全防护的流程示意图;FIG18 is a schematic diagram of a process of multi-dimensional security protection of a 5G confidential private network management platform provided in an embodiment of the present application;

图19为本申请实施例提供的基于用户话单建立安全管控及信令管理系统的架构示意图;FIG19 is a schematic diagram of the architecture of establishing a security control and signaling management system based on user call records provided in an embodiment of the present application;

图20为本申请实施例提供的一种多园区的无线专网安全防护装置的结构示意图;FIG20 is a schematic diagram of the structure of a multi-campus wireless private network security protection device provided in an embodiment of the present application;

图21为本申请实施例提供的一种无线专网的中心节点的结构示意图。Figure 21 is a structural diagram of a central node of a wireless private network provided in an embodiment of the present application.

具体实施方式Detailed ways

下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述。The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application.

应理解,说明书通篇中提到的“本申请实施例”或“前述实施例”意味着与实施例有关的特定特征、结构或特性包括在本申请的至少一个实施例中。因此,在整个说明书各处出现的“本申请实施例中”或“在前述实施例中”未必一定指相同的实施例。此外,这些特定的特征、结构或特性可以任意适合的方式结合在一个或多个实施例中应用。在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。上述本申请实施例序号仅仅为了描述,不代表实施例的优劣。It should be understood that the "embodiment of the present application" or "the aforementioned embodiment" mentioned throughout the specification means that the specific features, structures or characteristics related to the embodiment are included in at least one embodiment of the present application. Therefore, "in the embodiment of the present application" or "in the aforementioned embodiment" appearing throughout the specification does not necessarily refer to the same embodiment. In addition, these specific features, structures or characteristics can be combined in one or more embodiments in any suitable manner. In the various embodiments of the present application, the size of the sequence number of the above-mentioned processes does not mean the order of execution. The execution order of each process should be determined by its function and internal logic, and should not constitute any limitation on the implementation process of the embodiment of the present application. The above-mentioned sequence numbers of the embodiments of the present application are for description only and do not represent the advantages and disadvantages of the embodiments.

本申请实施例提供一种多园区的无线专网安全防护方法,应用于无线专网的中心节点,参照图1所示,该方法包括以下步骤:The present application embodiment provides a multi-campus wireless private network security protection method, which is applied to the central node of the wireless private network. As shown in FIG. 1 , the method includes the following steps:

步骤101、获得多个分支节点针对无线专网信令面接口的信令流程交互的全量用户话单数据。Step 101: Obtain full user call record data of signaling process interactions of multiple branch nodes for wireless private network signaling plane interfaces.

本申请实施例中,无线专网的中心节点用于管控各分支节点的网络安全及终端设备。各分支节点的业务数据和信令可以通过中心节点中转后访问其他节点应用。无线专网信令面接口包括但不限于5G移动通信接口。全量用户话单数据包括中心节点生成的,信令过程和业务传输过程的会话级详细记录,包含了用户所有的上网信息。其中,全量用户话单数据包括外部数据表示法(External Data Representation,XDR)话单数据。其中,各分支节点对应于不同的园区或厂区,本申请实现跨多园区或跨厂区间专网安全通信。In an embodiment of the present application, the central node of the wireless private network is used to manage the network security and terminal equipment of each branch node. The business data and signaling of each branch node can access other node applications after being transferred through the central node. The signaling interface of the wireless private network includes but is not limited to the 5G mobile communication interface. The full user call list data includes a detailed session-level record of the signaling process and the service transmission process generated by the central node, which contains all the user's Internet access information. Among them, the full user call list data includes External Data Representation (XDR) call list data. Among them, each branch node corresponds to a different campus or factory area, and the present application realizes secure communication among private networks across multiple campuses or factories.

步骤102、基于全量用户话单数据对多分支节点进行安全协同管理,生成无线专网安全防护信息。Step 102: Based on the full amount of user call record data, secure collaborative management of multiple branch nodes is performed to generate wireless private network security protection information.

本申请实施例中,无线专网安全防护信息包括但不限于跨多园区或跨厂区间专网的数据与信令安全协同管理信息,跨多园区或跨厂区的特定区域安全管控信息;其中,特定区域包括但不限于区域涉密等级大于预设等级的区域,区域属性为预设属性的区域,这里预设属性包括但不限于预设位置、预设业务服务类别。In an embodiment of the present application, wireless private network security protection information includes but is not limited to data and signaling security collaborative management information of private networks across multiple campuses or factories, and specific area security control information across multiple campuses or factories; wherein, specific areas include but are not limited to areas where the regional confidentiality level is greater than the preset level, and areas where the regional attributes are preset attributes, where the preset attributes include but are not limited to preset locations and preset business service categories.

本申请实施例提供的多园区的无线专网安全防护方法,通过获得多个分支节点针对无线专网信令面接口的信令流程交互的全量用户话单数据;多个分支节点对应于不同的园区或厂区;基于全量用户话单数据对多分支节点进行安全协同管理,生成无线专网安全防护信息;如此,中心节点可以管控各分支节点的网络安全及终端设备,实现针对多分支节点的统一管控,便于多分支节点安全协同管理以及无线专网安全防护监管。The embodiment of the present application provides a multi-campus wireless private network security protection method, which obtains the full amount of user call record data of the signaling process interaction of multiple branch nodes for the wireless private network signaling interface; the multiple branch nodes correspond to different campuses or factory areas; based on the full amount of user call record data, the multiple branch nodes are securely and collaboratively managed to generate wireless private network security protection information; in this way, the central node can manage the network security and terminal equipment of each branch node, realize unified control of multiple branch nodes, and facilitate the secure collaborative management of multiple branch nodes and the supervision of wireless private network security protection.

本申请其他实施例中,步骤101获得多个分支节点针对无线专网信令面接口的信令流程交互的全量用户话单数据,可以通过如下步骤实现:In other embodiments of the present application, step 101 obtains the full amount of user call list data of the signaling process interaction of multiple branch nodes for the wireless private network signaling plane interface, which can be implemented by the following steps:

A11、接收每个分支节点下沉式部署的用户面采集解析设备,针对信令流程上报给中心节点的数据合成服务器的用户面数据。A11. Receive the user plane collection and analysis equipment deployed in each branch node, and synthesize the user plane data of the server according to the data reported to the central node by the signaling process.

本申请实施例中,每一分支节点下沉式部署有用户面采集解析设备,用于收集该分支节点的用户面数据,用户面数据包括但不限于用户特定业务信息和数据业务事件及流量统计(视频、即时通信等)。其中,用户特定业务信息包括但不限于通过如下协议和/服务传输的业务信息:超文本传输协议(Hyper Text Transfer Protocol,HTTP)、超文本传输安全协议(Hypertext Transfer Protocol Secure,HTTPS)、域名系统(Domain Name System,DNS)、文件传输协议(File Transfer Protocol,FTP)等。可见,本申请中每个分支节点均可采取监测、收集的方式,通过部署的用户面采集解析设备记录用户面事件即数据面事件。In the embodiment of the present application, each branch node is deployed with a user plane collection and analysis device to collect the user plane data of the branch node. The user plane data includes but is not limited to user-specific business information and data business events and traffic statistics (video, instant messaging, etc.). Among them, user-specific business information includes but is not limited to business information transmitted through the following protocols and/or services: Hypertext Transfer Protocol (HTTP), Hypertext Transfer Protocol Secure (HTTPS), Domain Name System (DNS), File Transfer Protocol (FTP), etc. It can be seen that each branch node in the present application can adopt a monitoring and collection method to record user plane events, i.e., data plane events, through the deployed user plane collection and analysis device.

本申请提供了一种5G保密专网管理平台,该平台的总体架构参见图2所示,图2中以5G保密专网管理平台的总体架构包括一个中心节点和两个分支节点为例进行举例说明,在分支节点①和分支节点②均下沉式部署有用户面采集解析设备,收集分支节点的用户特定业务信息和数据业务事件及流量统计(视频、即时通信等)。用户面采集解析设备与交换机VPN通过数据镜像实现两个数据源之间的拷贝。其中,中心节点又称为主节点或中心节点涉密系统,中心节点部署有汇聚核心交换机,用于汇集所有控制面数据,包括但不限于控制面信令流程、字段及错误信息,并存储在5G保密专网管理平台中。中心节点核心网侧包括如下控制面网元:认证服务器功能(Authentication Server Function,AUSF)、统一数据管理(Unified Data Management,UDM)、策略控制功能(Policy Control function,PCF)、接入与移动性管理功能(Access and Mobility Management Function,AMF)、会话管理功能(Session Management Function,SMF)、网络存储功能(Network Repository Function,NRF)。分支节点包括用户面功能(User Plane Function,UPF)设备、交换机虚拟专用网(Virtual Private Network)、移动边缘计算(Mobile Edge Computing,MEC)设备;MEC设备又称多接入边缘计算(Multi-access Edge Computing)设备,提供边缘侧的计算服务。5G保密专网管理平台支持针对多节点的统一归档管控。图2中还示出了如下的数据流向:各分支节点中的UPF与主节点中的汇聚核心交换机之间的控制面信令流向;各分支节点中的用户面采集解析设备与主节点中的数据合成服务器之间的用户面采集数据的流向;主节点中的控制面采集解析设备与数据合成服务器之间的控制面采集数据的流向;主节点将全字段XDR向平台上报的数据流向。分支节点的5G基站的数据流量还可以通过切片分组网(Slicing Packet Network,SPN)网络直接对接核心网的UPF设备,分支节点的5G基站与设备和5G模组之间进行通信。The present application provides a 5G confidential private network management platform, and the overall architecture of the platform is shown in Figure 2. In Figure 2, the overall architecture of the 5G confidential private network management platform includes a central node and two branch nodes. User-plane collection and analysis devices are deployed in a sinking manner at branch node ① and branch node ② to collect user-specific service information and data service events and traffic statistics (video, instant messaging, etc.) of the branch nodes. The user-plane collection and analysis device and the switch VPN realize the copy between the two data sources through data mirroring. Among them, the central node is also called the master node or the central node confidential system. The central node is deployed with a converged core switch for collecting all control plane data, including but not limited to control plane signaling processes, fields and error information, and storing them in the 5G confidential private network management platform. The core network side of the central node includes the following control plane network elements: Authentication Server Function (AUSF), Unified Data Management (UDM), Policy Control Function (PCF), Access and Mobility Management Function (AMF), Session Management Function (SMF), Network Repository Function (NRF). Branch nodes include User Plane Function (UPF) devices, switch virtual private networks (Virtual Private Network), and Mobile Edge Computing (MEC) devices; MEC devices are also called Multi-access Edge Computing devices, which provide computing services on the edge side. The 5G confidential private network management platform supports unified archiving and control of multiple nodes. Figure 2 also shows the following data flows: the control plane signaling flow between the UPF in each branch node and the converged core switch in the main node; the flow of user plane data collection between the user plane collection and analysis device in each branch node and the data synthesis server in the main node; the flow of control plane data collection between the control plane collection and analysis device in the main node and the data synthesis server; the data flow of the main node reporting the full-field XDR to the platform. The data traffic of the 5G base station of the branch node can also be directly connected to the UPF device of the core network through the Slicing Packet Network (SPN) network, and the 5G base station of the branch node communicates with the device and the 5G module.

A12、通过中心节点的控制面解析设备对每个分支节点的控制面数据解析,生成控制面用户话单。A12. The control plane parsing device of the central node parses the control plane data of each branch node to generate a control plane user call list.

结合图2所示,中心节点还部署有控制面采集解析设备简称控制面解析设备,用于对每个分支节点的控制面数据解析,生成控制面XDR话单数据。控制面采集解析设备与汇聚核心交换机通过数据镜像实现两个数据源之间的拷贝。As shown in Figure 2, the central node is also deployed with a control plane collection and analysis device, referred to as a control plane analysis device, which is used to analyze the control plane data of each branch node and generate control plane XDR call record data. The control plane collection and analysis device and the aggregation core switch realize the copy between the two data sources through data mirroring.

A13、通过数据合成服务器对控制面用户话单和用户面数据进行关联处理,得到全量用户话单数据。A13. The control plane user call record and the user plane data are correlated by the data synthesis server to obtain the full amount of user call record data.

结合图2所示,中心节点还部署有数据合成服务器,用于对控制面解析设备上传的控制面用户话单,和用户面采集解析设备上报的用户面数据进行关联处理,得到全量用户话单数据如全量XDR话单数据,如此,实现统一归档、统一管控,便于特殊行业的多分支节点之间安全协同配合,避免5G网络信令风暴威胁风险。As shown in Figure 2, the central node is also deployed with a data synthesis server, which is used to associate the control plane user call records uploaded by the control plane analysis device with the user plane data reported by the user plane collection and analysis device to obtain full user call record data such as full XDR call record data. In this way, unified archiving and unified management and control are achieved, which facilitates safe coordination and cooperation between multi-branch nodes in special industries and avoids the risk of 5G network signaling storm threats.

本申请其他实施例中,步骤102基于全量用户话单数据对多分支节点进行安全协同管理,生成无线专网安全防护信息,可以通过如下步骤实现:In other embodiments of the present application, step 102 performs security collaborative management of multiple branch nodes based on the full amount of user call record data to generate wireless private network security protection information, which can be achieved through the following steps:

B21、对全量用户话单数据进行统一归档,以生成关系型数据库。B21. All user call record data are archived in a unified manner to generate a relational database.

本申请实施例中,关系型数据库是指采用了关系模型来组织数据的数据库,其以行和列的形式存储数据。In the embodiments of the present application, a relational database refers to a database that uses a relational model to organize data, and stores data in the form of rows and columns.

示例性的,在一个可实现的统一归档的场景中,结合图2和图3所示,分支节点①和分支节点②的UPF将数据面采集的用户数据转发到数据合成服务器,核心网控制面网元将中心节点控制面采集的数据转发到数据合成服务器,5G保密专网管理平台根据5G专网信令流(例如用户注册、认证;服务请求及建立等),对数据合成服务器提供的5G移动通信接口(例如N1、N2、N8、N11、N4等接口)的用户身份字段、数据字段及参数值建立关系型数据库。Exemplarily, in a feasible unified archiving scenario, in combination with Figures 2 and 3, the UPF of branch node ① and branch node ② forwards the user data collected by the data plane to the data synthesis server, and the core network control plane network element forwards the data collected by the central node control plane to the data synthesis server. The 5G confidential private network management platform establishes a relational database for the user identity field, data field and parameter value of the 5G mobile communication interface (such as N1, N2, N8, N11, N4 and other interfaces) provided by the data synthesis server according to the 5G private network signaling flow (such as user registration, authentication; service request and establishment, etc.).

B22、基于关系型数据库,生成无线专网安全防护信息。B22. Generate wireless private network security protection information based on relational database.

本申请实施例中,无线专网安全防护信息包括但不限于跨多园区或跨厂区间专网的数据与信令安全协同管理信息,跨多园区或跨厂区的特定区域安全管控信息。In the embodiment of the present application, the wireless private network security protection information includes but is not limited to data and signaling security collaborative management information of private networks across multiple parks or factories, and specific area security control information across multiple parks or factories.

这里,参照上述统一归档的场景示例,结合图3所示,基于上述建立的关系型数据库,可衍生进行按照时间维度的数据存储即数据库归档,以及终端错误分析,进一步地,还可以对存储的数据和/或终端错误分析信息进行可视化显示,最终,通过5G核心网接入的终端上可以呈现上述可视化显示的内容。Here, referring to the above-mentioned unified archiving scenario example, combined with Figure 3, based on the relational database established above, data storage according to the time dimension, i.e., database archiving, and terminal error analysis can be derived. Furthermore, the stored data and/or terminal error analysis information can be visualized. Finally, the above-mentioned visual display content can be presented on the terminal accessed through the 5G core network.

本申请一些实施例中,B22基于关系型数据库,生成无线专网安全防护信息,可以通过如下步骤实现:In some embodiments of the present application, B22 generates wireless private network security protection information based on a relational database, which can be achieved through the following steps:

基于关系型数据库,执行用户行为分析、敏感区域位置信息分析、终端入网异常离线数据分析中的至少一种安全防护分析,得到无线专网安全防护信息。Based on the relational database, at least one security protection analysis is performed among user behavior analysis, sensitive area location information analysis, and terminal network access abnormal offline data analysis to obtain wireless private network security protection information.

这里,无线专网安全防护信息包括:对终端入网异常离线数据分析得到的终端错误分析信息;其中,终端错误分析信息中的错误类型包括用户注册、认证错误,服务请求及建立异常错误。Here, the wireless private network security protection information includes: terminal error analysis information obtained by analyzing abnormal offline data of terminal network access; wherein the error types in the terminal error analysis information include user registration, authentication errors, service request and establishment abnormality errors.

需要说明的是,跨多园区或跨厂区间专网的数据与信令安全协同管理信息包括上述的终端错误分析信息。It should be noted that the data and signaling security collaborative management information across multiple campuses or inter-factory private networks includes the above-mentioned terminal error analysis information.

本申请一些实施例中,无线专网的中心节点还可以执行如下操作:通过无线专网的核心网基于终端错误类型,对终端执行相应的安全防护管理操作。In some embodiments of the present application, the central node of the wireless private network may also perform the following operations: performing corresponding security protection management operations on the terminal based on the terminal error type through the core network of the wireless private network.

在一个可实现的安全防护管理的场景中,中心节点还可以根据终端错误类型,进行分析判定,联动5G核心网对终端执行相应的安全防护管理操作,例如进行黑名单处理操作,保护网络安全。例如终端入网注册,收到异常数据且每次终端异常均为鉴权向量问题,1小时内次数达到20次以上,则确认存在恶意接入情况。此时,执行处理操作即解决方案包括:通过5G核心网将此用户拉入黑名单,避免恶意分布式拒绝服务攻击(Distributeddenial of service attack,DDOS)接入攻击。In a feasible security protection management scenario, the central node can also analyze and judge based on the terminal error type, and link the 5G core network to perform corresponding security protection management operations on the terminal, such as blacklist processing operations to protect network security. For example, when the terminal registers for network access, abnormal data is received and each terminal abnormality is an authentication vector problem. If the number reaches more than 20 times within 1 hour, it is confirmed that there is malicious access. At this time, the execution of the processing operation, that is, the solution includes: adding this user to the blacklist through the 5G core network to avoid malicious distributed denial of service attack (DDOS) access attacks.

示例性的,在统一归档管控的场景中,参见图4的5G通信系统的架构示意图,5G通信系统采用统一的基于服务化架构和接口,具备灵活可编排、解耦、开放的特点。5G通信系统包括接入网(access network,AN)和核心网(core network,CN),还可以包括终端。上述终端可以为具有收发功能的终端,或为可设置于该终端的芯片或芯片系统。该终端也可以称为用户装置(user equipment,UE)、接入终端、用户单元(subscriber unit)、用户站、移动站(mobile station,MS)、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。Exemplarily, in the scenario of unified archiving and control, referring to the architectural diagram of the 5G communication system in FIG4 , the 5G communication system adopts a unified service-based architecture and interface, and has the characteristics of flexible arrangement, decoupling and openness. The 5G communication system includes an access network (AN) and a core network (CN), and may also include a terminal. The above-mentioned terminal may be a terminal with transceiver functions, or a chip or chip system that can be set in the terminal. The terminal may also be referred to as a user equipment (UE), an access terminal, a subscriber unit (subscriber unit), a user station, a mobile station (MS), a mobile station, a remote station, a remote terminal, a mobile device, a user terminal, a terminal, a wireless communication device, a user agent or a user device.

上述AN用于实现接入有关的功能,可以为特定区域的授权用户提供入网功能,并能够根据用户的级别,业务的需求等确定不同质量的传输链路以传输用户数据。AN在终端与CN之间转发控制信号和用户数据。AN可以包括:接入网设备,也可以称为无线接入网设备(radio access network,RAN)设备。The above AN is used to implement access-related functions, can provide network access functions for authorized users in a specific area, and can determine transmission links of different qualities to transmit user data according to the user level, business requirements, etc. AN forwards control signals and user data between the terminal and CN. AN can include: access network equipment, also known as radio access network equipment (RAN) equipment.

本申请实施例中,实现控制面与用户面分析、移动性管理与会话管理的解耦,涉及到的网元如图4所示包括:AMF、SMF、PCF、UDM、AUSF、UPF等网元。其中,AMF网元功能:接入和移动性管理功能;SMF网元功能:会话管理功能;UDM网元功能:统一数据管理;AUSF:认证服务;UPF:用户数据转发。5G通信系统中的5G日志留存系统包括的5G移动通信接口如下:可采集的接口N1(例如AMF-UE,移动性管理信令)、N2(例如AMF-RAN,接入管理信令)、N4(例如UPF-SMF,会话转发控制信令)、N8(例如AMF-UDM,接入签约数据管理)、N11(例如AMF-SMF,会话管理信令)。涉及到的接口信令流包括但不限于注册及认证流程、服务请求及建立流程。其中,UPF网元可以接收来自数据网络(data network,DN)的用户数据,通过接入网络设备向终端转发该用户数据。5G通信系统还包括如图4所示的其他网元:网络切片选择功能(Network Slice Selection Function,NSSF)、应用层功能(Application Function,AF)。5G通信系统还包括如图4所示的其他接口,例如NSSF与AMF之间的N22、AUSF与AMF之间的N12、UDM与SMF之间的N10、SMF与PCF之间的N7、PCF与AF之间的N5、AMF的N14、PCF与AMF之间的N15、AN与UPF之间的N3、UPF与DN之间的N6、UPF的N9。In the embodiment of the present application, the decoupling of control plane and user plane analysis, mobility management and session management is realized, and the network elements involved include: AMF, SMF, PCF, UDM, AUSF, UPF and other network elements as shown in Figure 4. Among them, AMF network element function: access and mobility management function; SMF network element function: session management function; UDM network element function: unified data management; AUSF: authentication service; UPF: user data forwarding. The 5G mobile communication interface included in the 5G log retention system in the 5G communication system is as follows: the collectable interface N1 (such as AMF-UE, mobility management signaling), N2 (such as AMF-RAN, access management signaling), N4 (such as UPF-SMF, session forwarding control signaling), N8 (such as AMF-UDM, access contract data management), N11 (such as AMF-SMF, session management signaling). The interface signaling flows involved include but are not limited to registration and authentication processes, service requests and establishment processes. Among them, the UPF network element can receive user data from the data network (DN) and forward the user data to the terminal through the access network device. The 5G communication system also includes other network elements as shown in Figure 4: Network Slice Selection Function (NSSF), Application Function (AF). The 5G communication system also includes other interfaces as shown in Figure 4, such as N22 between NSSF and AMF, N12 between AUSF and AMF, N10 between UDM and SMF, N7 between SMF and PCF, N5 between PCF and AF, N14 of AMF, N15 between PCF and AMF, N3 between AN and UPF, N6 between UPF and DN, and N9 of UPF.

在注册及认证流程的场景下,涉及到的交互流程如图5和图6所示,In the registration and authentication process scenario, the interaction process involved is shown in Figures 5 and 6.

这里,以终端为UE举例,涉及到的网元包括AMF、UDM;注册流程通过步骤201至步骤203实现:Here, taking the terminal as UE as an example, the network elements involved include AMF and UDM; the registration process is implemented through steps 201 to 203:

步骤201、UE向AMF发送注册请求(Registration request)消息;Step 201: UE sends a registration request message to AMF;

步骤202、AMF向UE发送注册响应(Registration accept)消息;Step 202: AMF sends a registration response (Registration accept) message to the UE;

步骤203、UE向AMF发送注册完成(Registration complete)消息,完成注册。Step 203: The UE sends a Registration complete message to the AMF to complete the registration.

认证流程通过步骤301至步骤302实现:The authentication process is implemented through steps 301 to 302:

步骤301、AMF向UDM发送PUT…/{ueId}/registrations/amf-3gpp-access(Amf3GppAccessRegistration);Step 301, AMF sends PUT .../{ueId}/registrations/amf-3gpp-access (Amf3GppAccessRegistration) to UDM;

步骤302、UDM向AMF发送204No Content或201Created。Step 302: UDM sends 204 No Content or 201 Created to AMF.

在注册及认证流程的场景下,异常报错的内容包括但不限于如下异常报错表格1中的信息。In the registration and authentication process scenario, the content of the abnormal error includes but is not limited to the information in the following abnormal error table 1.

异常报错表格1Abnormal error form 1

示例性的,在一个初始终端入网的场景流程中,结合图7和图8所示,5G注册管理主要用于用户和网络之间进行注册和去注册,便于网络建立用户上下文。触发5G用户建立用户面资源,实现5G终端IP分配、协议数据单元(Protocol Data Unit,PDU)会话建立以及网络服务等级。Exemplarily, in a scenario process of an initial terminal accessing the network, as shown in FIG7 and FIG8, 5G registration management is mainly used for registration and deregistration between users and the network, so as to facilitate the network to establish user contexts. Trigger 5G users to establish user plane resources, implement 5G terminal IP allocation, protocol data unit (PDU) session establishment, and network service level.

当用户从成都坐飞机到了北京,会开启5G UE例如手机。初始注册流程的信令交互如下:When a user flies from Chengdu to Beijing, he will turn on the 5G UE, such as a mobile phone. The signaling interaction of the initial registration process is as follows:

首先,参见图7所示:First, see Figure 7:

步骤401、UE向北京AMF网元发起5G终端注册请求(Registration Request)消息;Step 401: The UE initiates a 5G terminal registration request message to the Beijing AMF network element;

在一个可实现的场景中,UE向北京AMF网元发送下一代应用协议(NextGeneration Application Protocol,NGAP):Iritial UE消息,包括:In a feasible scenario, the UE sends a Next Generation Application Protocol (NGAP): Iritial UE message to the Beijing AMF network element, including:

{UE当前位置信息:NR-CGI/TAI{UE current location information: NR-CGI/TAI

NAS-PDU:Message Type:Registration RequestNAS-PDU: Message Type: Registration Request

Registration type:initial registrationRegistration type: initial registration

Mobile identity:5G-GUTIMobile identity: 5G-GUTI

UE Security capability:支持加密和完整性保护算法UE Security capability: Support encryption and integrity protection algorithms

Requested-NSSAI:请求的切片ID}Requested-NSSAI: Requested slice ID}

步骤402、北京AMF网元根据5G-GUTI中携带的全局唯一的AMF标识符(GloballyUnique AMF Identifier,GUAMI)识别到成都AMF网元;Step 402: The Beijing AMF network element identifies the Chengdu AMF network element according to the globally unique AMF identifier (Globally Unique AMF Identifier, GUAMI) carried in the 5G-GUTI;

步骤403、北京AMF网元请求成都AMF网元的UE上下文参数;Step 403: The Beijing AMF network element requests the Chengdu AMF network element for UE context parameters;

这里,北京AMF网元向成都AMF网元发送HTTP2 POST请求:成都AMF的UE上下文{UeContextTransfer ReqData}。Here, the Beijing AMF network element sends an HTTP2 POST request to the Chengdu AMF network element: Chengdu AMF's UE context {UeContextTransfer ReqData}.

步骤404、成都AMF网元向北京AMF网元发送的反馈参数包括:用户永久标识符(SUbscription Permanent Identifier,SUPI)、通用公共用户标识(Generic Public Subscription Identifier,GPSI)、公共陆地移动通信网络(Public Land Mobile Network,PLMN)、5G系统移动管理能力(5GS mobility management Capability,5GMM Capability);Step 404, the feedback parameters sent by the Chengdu AMF network element to the Beijing AMF network element include: user permanent identifier (SUbscription Permanent Identifier, SUPI), generic public subscription identifier (GPSI), public land mobile communication network (Public Land Mobile Network, PLMN), 5G system mobility management capability (5GS mobility management Capability, 5GMM Capability);

这里,成都AMF网元向北京AMF网元发送HTTP2反馈消息:{JSON[UEContextTransferRsp Data:SUPI,GPSI,PEI及签约的UE-AMBR等MM Context参数}。Here, the Chengdu AMF network element sends an HTTP2 feedback message to the Beijing AMF network element: {JSON[UEContextTransferRsp Data: SUPI, GPSI, PEI and contracted UE-AMBR and other MM Context parameters}.

之后,步骤405~步骤408:北京AMF网元向北京NRF网元请求AUSF网元选择并反馈AUSF的IP地址;Afterwards, step 405 to step 408: the Beijing AMF network element requests the Beijing NRF network element to select and feed back the IP address of the AUSF network element;

步骤405、北京AMF网元向UE发送NGAP:DOWNLINK NAS TRANSPORT请求UE要用户隐藏标识符(SUbs cription Concealed Identifier,SUCI)(可选);{NAS-PDU(Messagetype:Identity request,Identity type:SUCI)};Step 405, the Beijing AMF network element sends NGAP: DOWNLINK NAS TRANSPORT to the UE, requesting the UE to conceal the user identifier (SUbs cription Concealed Identifier, SUCI) (optional); {NAS-PDU (Message type: Identity request, Identity type: SUCI)};

步骤406、UE向北京AMF网元发送NGAP:UPLINKNAS TRANSPORT;{NAS-PDU(Messagetype:identity response,Mobile Identity:SUCI)};Step 406, UE sends NGAP:UPLINKNAS TRANSPORT; {NAS-PDU (Messagetype:identity response, Mobile Identity:SUCI)} to Beijing AMF network element;

步骤407、北京AMF网元向北京NRF网元发送HTTP2 GET:选择AUSF;Step 407, the Beijing AMF network element sends an HTTP2 GET to the Beijing NRF network element: select AUSF;

{service-name:nausf-auth,target-nf-type:AUSFLrequester-nf-type=AMF,requester-nf-instance:amfxxx,Routing indicator:SUCI);{service-name: nausf-auth, target-nf-type: AUSFLrequester-nf-type = AMF, requester-nf-instance: amfxxx, Routing indicator: SUCI);

步骤408、北京NRF网元向北京AMF网元发送HTTP2{JSON[Nfinstances:AUSF的IP地址、正式域名(Fully Qualified Domain Name,FQDN)、nf类型(Nftype)、NFServices,单个网络切片选择协助信息(Single Network Slice Selection Assistance information,SNSSAI)等};Step 408, the Beijing NRF network element sends HTTP2{JSON[Nfinstances: IP address of AUSF, fully qualified domain name (FQDN), nf type (Nftype), NFServices, single network slice selection assistance information (Single Network Slice Selection Assistance information, SNSSAI) etc.} to the Beijing AMF network element;

进一步地,步骤409~步骤411:AMF网元向终端所属的归属网元AUSF/UDM请求UE的鉴权向量,并且基于根密钥K值生成5G鉴权向量组。其中UDM通过AES算法生成鉴权向量包括:消息认证码(Message Authentication Code,MAC)、预期响应(Expected Response,RES)、加密性密钥(Cipher Key,CK)、完整性密钥(Integrity Key,IK)、匿名密钥(anonymity key,AK)以及认证令牌等;Further, step 409 to step 411: the AMF network element requests the UE's authentication vector from the home network element AUSF/UDM to which the terminal belongs, and generates a 5G authentication vector group based on the root key K value. The authentication vector generated by UDM through the AES algorithm includes: message authentication code (Message Authentication Code, MAC), expected response (Expected Response, RES), encryption key (Cipher Key, CK), integrity key (Integrity Key, IK), anonymity key (anonymity key, AK) and authentication token, etc.;

步骤409、北京AMF网元向成都AUSF/UDM网元发送HTTP2_POST:请求AUSF/UDM生成UE的鉴权向量组;Step 409: The Beijing AMF network element sends HTTP2_POST to the Chengdu AUSF/UDM network element: requesting AUSF/UDM to generate an authentication vector group for the UE;

SON{Supi or Sud:SUCI,serving newg name:5G:mncxxx.mcc460xx};SON{Supi or Sud:SUCI, serving newg name:5G:mncxxx.mcc460xx};

步骤410、成都UDM网元通过私钥将SUa解密为SUPI,基于SUPI生成5G鉴权向量组;Step 410: The Chengdu UDM network element decrypts SUa into SUPI using a private key, and generates a 5G authentication vector group based on SUPI;

步骤411、成都AUSF/UDM网元向北京AMF网元发送HTTP2;Step 411, Chengdu AUSF/UDM network element sends HTTP2 to Beijing AMF network element;

{JSON{Av 5G AKA(Rand,autn,hxres*.Kseaf),Auth_type:5G_AKA};{JSON{Av 5G AKA(rand, autn, hxres*.Kseaf), Auth_type: 5G_AKA};

其次,参见图8所示:Secondly, see Figure 8:

步骤412~步骤413:北京AMF向UE发起终端侧鉴权,UE同样进行鉴权向量计算,采用相同AES算法,然后再AMF安全锚点功能(SEAF,Security Anchor Function)模块处进行比对,如果预期响应值(HRES)相同,则认证UE成功。Step 412 to Step 413: Beijing AMF initiates terminal-side authentication to the UE. The UE also performs authentication vector calculation, using the same AES algorithm, and then compares it at the AMF Security Anchor Function (SEAF) module. If the expected response values (HRES) are the same, the UE is authenticated successfully.

步骤412、北京AMF网元向UE发送NGAP:DOWNLINK NAS TRANSPORT对UE发起鉴权,得到UE鉴权结果;Step 412: The Beijing AMF network element sends NGAP: DOWNLINK NAS TRANSPORT to the UE to initiate authentication for the UE and obtain the UE authentication result.

NAS-PDU{Message aype:Authentication request,RAND,AUTH};NAS-PDU{Message aype:Authentication request, RAND, AUTH};

步骤413、UE向北京AMF网元发送NGAP:UPLINK NAS TRANSPORT NAS-PDU{Messagetype:Authentication response,RES*};Step 413: The UE sends NGAP: UPLINK NAS TRANSPORT NAS-PDU {Messagetype: Authentication response, RES*} to the Beijing AMF network element;

步骤414、北京AMF网元采用相同算法计算Hres*和AUSF下发的Hres*比对;如一致则AMF站在网络服务角度,认为终端认证成功;Step 414: Beijing AMF network element uses the same algorithm to calculate Hres* and compares it with Hres* issued by AUSF; if they are consistent, AMF considers that the terminal authentication is successful from the perspective of network service;

步骤415、北京AMF网元向成都AUSF/UDM网元发送HTTP2_PUT:网络侧完成对UE的鉴权{JSON(RES*));Step 415, the Beijing AMF network element sends HTTP2_PUT to the Chengdu AUSF/UDM network element: the network side completes the authentication of the UE {JSON(RES*));

步骤416、成都AUSF将RES*与UDM生成的XRES*进行比对,如一样则AUSF站在归属网络角度,认为终端认证成功。Step 416: Chengdu AUSF compares RES* with XRES* generated by UDM. If they are the same, AUSF considers that the terminal authentication is successful from the perspective of the home network.

步骤417、成都AUSF/UDM网元向北京AMF网元发送HTTP2{JSON{authResut:AUTHENTICATION_SUCCESS,SUP}。Step 417, the Chengdu AUSF/UDM network element sends HTTP2{JSON{authResut:AUTHENTICATION_SUCCESS, SUP} to the Beijing AMF network element.

上述初始终端入网的场景流程中,存在的问题为:终端鉴权向量问题(AV_GENERATION_PROBLEM)。In the above-mentioned initial terminal network access scenario process, there is a problem: terminal authentication vector problem (AV_GENERATION_PROBLEM).

终端SIM卡如鉴权算法模块、K值、SQN与核心网签约数据不一致,将导致上述业务流程反复重启,同时AUSF/UDM网元会根据UE鉴权请求,基于根密钥K值反复计算生成5G鉴权向量组。如果有多台恶意终端反复接入网络,将导致AUSF/UDM网元出现DDOS攻击,资源被占用,无法为正常终端提供鉴权向量生成服务。同理,AMF SEAF功能模块将对终端侧和网络侧的预期响应值HRES值进行比对,如恶意终端反复接入网络,导致AMF网元资源被占用,导致AMF接入功能不能正常使用,无法为正常终端提供网络接入服务。If the authentication algorithm module, K value, SQN of the terminal SIM card are inconsistent with the core network contract data, the above-mentioned business process will be repeatedly restarted. At the same time, the AUSF/UDM network element will repeatedly calculate and generate the 5G authentication vector group based on the root key K value according to the UE authentication request. If multiple malicious terminals repeatedly access the network, the AUSF/UDM network element will be attacked by DDOS, and resources will be occupied, making it impossible to provide authentication vector generation services for normal terminals. Similarly, the AMF SEAF function module will compare the expected response value HRES value on the terminal side and the network side. If malicious terminals repeatedly access the network, the AMF network element resources will be occupied, causing the AMF access function to be unable to be used normally, and network access services cannot be provided to normal terminals.

然而,相关技术中,在边缘计算场景下,UE向SMF发送目标PDU会话建立请求时候,触发SMF网元重复性的上行分类器插入操作、DHCP UE IP地址分配的请求信令,造成5G系统的信令被DOS占用,无法为UE提供服务。可见,相关技术中未考虑UE终端入网注册鉴权时候,触发AMF网元重复性的初始注册请求、终端鉴权认证信令、UE上下文等以及UDM网元重复性的鉴权向量生成信令,造成AMF网元、UDM网元被DOS占用,无法为UE提供服务。However, in the related art, in the edge computing scenario, when the UE sends a target PDU session establishment request to the SMF, it triggers the repetitive uplink classifier insertion operation of the SMF network element and the request signaling of the DHCP UE IP address allocation, causing the signaling of the 5G system to be occupied by DOS and unable to provide services to the UE. It can be seen that the related art does not take into account the repetitive initial registration request, terminal authentication signaling, UE context, etc. of the AMF network element when the UE terminal enters the network for registration and authentication, and the repetitive authentication vector generation signaling of the UDM network element, causing the AMF network element and the UDM network element to be occupied by DOS and unable to provide services to the UE.

在服务请求及建立流程的场景中,涉及到的交互流程如图9、图10和图11所示,In the scenario of service request and process establishment, the interaction processes involved are shown in Figures 9, 10 and 11.

这里,以终端为UE为例,涉及到网元包括AMF、SMF、UPF;服务请求流程通过步骤501至步骤502实现:Here, taking the terminal as UE as an example, the network elements involved include AMF, SMF, and UPF; the service request process is implemented through steps 501 to 502:

步骤501、UE向AMF发送PDU会话建立请求(PDU session establishment request)消息;Step 501: UE sends a PDU session establishment request message to AMF;

步骤502、AMF向UE发送PDU会话建立响应(PDU session establishment accept)消息。Step 502: AMF sends a PDU session establishment response (PDU session establishment accept) message to the UE.

建立流程通过步骤601至步骤602以及步骤701至步骤702实现:The establishment process is implemented through step 601 to step 602 and step 701 to step 702:

步骤601、NF服务消费者(Service Consumer)向SMF发送POST.../sm-contexts(SmContextCreateData);Step 601, NF service consumer (Service Consumer) sends POST .../sm-contexts (SmContextCreateData) to SMF;

步骤602、SMF向Service Consumer发送201Created(SmContextCreatedData)。Step 602: SMF sends 201Created (SmContextCreatedData) to Service Consumer.

步骤701、SMF向UPF发送包转发控制协议(Packet Forwarding ControlProtocol,PFCP)会话建立请求(Session Establishment Request)消息。Step 701: SMF sends a Packet Forwarding Control Protocol (PFCP) session establishment request message to UPF.

步骤702、UPF向SMF发送PFCP会话建立响应(Session Establishment Response)消息。Step 702: UPF sends a PFCP session establishment response (Session Establishment Response) message to SMF.

在服务请求及建立流程的场景下,异常报错的内容包括但不限于如下异常报错表格2中的信息。In the scenario of service request and process establishment, the content of the exception report includes but is not limited to the information in the following exception report table 2.

异常报错表格2Abnormal error form 2

示例性的,在一个PDU会话初始建立的场景流程中,结合图12至图15所示,5GC中的PDU会话建立伴随注册流程完成一起触发或者UE访问业务单独触发。5GC的PDU会话初始建立流程,实现5G终端IP分配、会话建立、网络服务等级等;Exemplarily, in a scenario process of initial establishment of a PDU session, as shown in Figures 12 to 15, the establishment of the PDU session in 5GC is triggered together with the completion of the registration process or triggered separately by the UE access service. The initial establishment process of the PDU session of 5GC implements 5G terminal IP allocation, session establishment, network service level, etc.;

当用户从成都做飞机到了北京,在北京本地会开启5G手机进行应用服务。信令交互如下:When a user flies from Chengdu to Beijing, he will turn on his 5G mobile phone to use application services in Beijing. The signaling interaction is as follows:

首先,参见图12所示:First, see Figure 12:

步骤801~步骤804:UE发起PDU会话建立发送给AMF,AMF网元根据NRF反馈SMF IP地址请求用户终端的SM上下文,包括PDU会话号、外部数据网络DNN。Step 801 to step 804: The UE initiates a PDU session establishment and sends it to the AMF. The AMF network element requests the SM context of the user terminal based on the SMF IP address fed back by the NRF, including the PDU session number and the external data network DNN.

步骤801、UE向北京AMF网元发送NGAP:UL NAS Transport;Step 801: UE sends NGAP:UL NAS Transport to Beijing AMF network element;

{UE当前位置信息:NR-CGI/TAI NAS-PDU:Message Type:PDU Sessionestablishment Request.PDU Session type:IPV4,Payload-Container Type:N1 SMinformation,Ppu Session ID:5,Request Type:initial Request};{UE current location information: NR-CGI/TAI NAS-PDU: Message Type: PDU Session establishment Request. PDU Session type: IPV4, Payload-Container Type: N1 SMinformation, Ppu Session ID: 5, Request Type: initial Request};

步骤802、北京AMF网元向北京NRF网元发送HTTP2_GET:选择SMF;Step 802, Beijing AMF network element sends HTTP2_GET to Beijing NRF network element: select SMF;

{目标网元:SMF、请求网元:AMF,DNN:XXXnet};{Target network element: SMF, requesting network element: AMF, DNN: XXXnet};

步骤803、北京NRF网元向北京AMF网元发送HTTP2;Step 803: Beijing NRF network element sends HTTP2 to Beijing AMF network element;

{JSON[SMF的IP地址、FQDN、nfType等};{JSON[SMF's IP address, FQDN, nfType, etc.};

步骤804、北京AMF网元向北京SMF网元发送HTTP2 POST:请求SMF创建用户的SM上下文;Step 804: The Beijing AMF network element sends an HTTP2 POST to the Beijing SMF network element: requesting the SMF to create an SM context for the user;

{JSON[SUPI,PDUSessionID:5,DNN,Request Type:nitial Request等};{JSON[SUPI, PDUSessionID: 5, DNN, Request Type: initial Request, etc.};

步骤805~步骤806:SMF网元向NRF网元请求UDM网元的路径,并获取归属域的UDMIP地址。Step 805 to Step 806: The SMF network element requests the NRF network element for the path of the UDM network element and obtains the UDM IP address of the home domain.

步骤805、北京SMF网元向北京NRF网元发送HTTP2 GET:选择UDM;Step 805, the Beijing SMF network element sends an HTTP2 GET to the Beijing NRF network element: select UDM;

{service-nametnudm-auth,target-nf-typeUDM,requester-nf-{service-nametnudm-auth, target-nf-typeUDM, requester-nf-

type=SMF,requester-nf-instance:smfxxx,Routing indicator:SUPI);type=SMF,requester-nf-instance:smfxxx,Routing indicator:SUPI);

步骤806、北京NRF网元向北京SMF网元发送HTTP2 GET:选择UDM;Step 806: The Beijing NRF network element sends an HTTP2 GET to the Beijing SMF network element: select UDM;

JSON{nfinstances:UDM IP地址、FQDN,nfType,nfservices,SNSSAI等信息)。JSON{nfinstances:UDM IP address, FQDN, nfType, nfservices, SNSSAI and other information).

其次,参见图13所示:Next, see Figure 13:

步骤807~步骤8012:SMF在UDM中注册登记,并通过获取终端SM相关签约数据,包括:DNN网络名称、PDU会话类型、AMBR聚合最大比特速率、5G Qos Profile;同时,定位5G SM签约数据变更,与UDM网元进行同步。Steps 807 to 8012: SMF registers in UDM and obtains terminal SM-related contract data, including: DNN network name, PDU session type, AMBR aggregation maximum bit rate, 5G Qos Profile; at the same time, locates 5G SM contract data changes and synchronizes with the UDM network element.

步骤807、北京SMF网元向成都UDM网元发送HTTP2_PUT:SMF在UDM中注册登记;Step 807, the Beijing SMF network element sends HTTP2_PUT to the Chengdu UDM network element: SMF registers in the UDM;

USON{SMFid,DNN,PDUSe ssionID,PLMN ID};USON{SMFid, DNN, PDUSesionID, PLMN ID};

步骤808、成都UDM网元向北京SMF网元发送HTTP2:SMF在UDM中注册登记;Step 808, Chengdu UDM network element sends HTTP2 to Beijing SMF network element: SMF registers in UDM;

JSON{PDUSessionID,SMFinstanceID,DNN,PLMN ID};JSON{PDUSessionID,SMFinstanceID,DNN,PLMN ID};

步骤809、北京SMF网元向成都UDM网元发送HTTP2_GET:获取SM相关签约数据{DNN,S-NSSAI};Step 809: The Beijing SMF network element sends HTTP2_GET to the Chengdu UDM network element: obtain SM-related contract data {DNN, S-NSSAI};

步骤810、成都UDM网元向北京SMF网元发送HTTP2:获取SM相关签约数据;Step 810: Chengdu UDM network element sends HTTP2 to Beijing SMF network element: obtain SM related contract data;

JSON{DNN,POUSessionType,SSCMode,sessionAMBR:上下行5GQosProfile};JSON{DNN, POUSessionType, SSCMode, sessionAMBR: uplink and downlink 5GQosProfile};

步骤811、北京SMF网元向成都UDM网元发送HTTP2_POST:订阅SM签约数据变更事件;Step 811, the Beijing SMF network element sends HTTP2_POST to the Chengdu UDM network element: subscribe to the SM contract data change event;

JSON{mon itoredResourceU ris:sm-data,callbackUri};JSON{monitoredResourceU ris:sm-data, callbackUri};

步骤812、成都UDM网元向北京SMF网元发送HTTP2:Created订阅SM签约数据变更事件;Step 812, Chengdu UDM network element sends HTTP2: Created subscription SM contract data change event to Beijing SMF network element;

进一步地,步骤8013~步骤8018:选择PCF网元获取用户签约策略,包括DNN、PDU会话ID、SUPI、UE IPV4、QOS等级等。Further, step 8013 to step 8018: select a PCF network element to obtain a user subscription policy, including DNN, PDU session ID, SUPI, UE IPV4, QOS level, etc.

步骤813、北京SMF网元向北京AMF网元发送HTTP2:Created;Step 813, Beijing SMF network element sends HTTP2: Created to Beijing AMF network element;

步骤814、北京SMF网元检查步骤804中request type不等于Existing PDUSession,发起PCF选择;Step 814: The Beijing SMF network element checks that the request type in step 804 is not equal to Existing PDUSession, and initiates PCF selection;

步骤815、北京SMF网元向北京NRF网元发送HTTP2_GET:选择PCF;Step 815, the Beijing SMF network element sends HTTP2_GET to the Beijing NRF network element: select PCF;

{target-nf-type:PCF,requester-nf-type:SMF,requester-nf-instance:smfxxx,DNN};{target-nf-type: PCF, requester-nf-type: SMF, requester-nf-instance: smfxxx, DNN};

步骤816、北京NRF网元向北京SMF网元发送HTTP2:选择PCE JSON{nfinstances:PCF的IP地址、FQDN,nfType nfService,SNSSA/等信息};Step 816, the Beijing NRF network element sends HTTP2 to the Beijing SMF network element: select PCE JSON {nfinstances: PCF's IP address, FQDN, nfType nfService, SNSSA/etc. information};

步骤817、北京SMF网元向成都PCF网元发送HTTP2 POST:从PCF获取PDU会话Qos策略USON{SUPI、PDUSessionID,DNN、UE的IPV4地址等};Step 817, the Beijing SMF network element sends HTTP2 POST to the Chengdu PCF network element: obtains the PDU session QoS policy USON {SUPI, PDUSessionID, DNN, UE's IPV4 address, etc.} from PCF;

步骤818、成都PCF网元向北京SMF网元发送HTTP2:create;Step 818, Chengdu PCF network element sends HTTP2:create to Beijing SMF network element;

JSON{sessRules:(se ssRule ID,authSe ssAmbr,authDefault Qos)};JSON{sessRules:(sessRule ID, authSe ssAmbr, authDefault Qos)};

再次,参见图14所示:Again, see Figure 14:

步骤819~步骤823:北京SMF网元选择一个UPF,并建立PFCP会话链接。包括:用户面地址、隧道端点标识(Tunnel End Point identifier,TEID)、节点ID、FAR转发规则等。Steps 819 to 823: The Beijing SMF network element selects a UPF and establishes a PFCP session link, including: user plane address, tunnel endpoint identifier (TEID), node ID, FAR forwarding rules, etc.

步骤819、北京SMF网元选择一个UPF;Step 819: The Beijing SMF network element selects a UPF;

步骤820、北京SMF网元向北京UPF网元发送PFCP:PFCP会话建立请求;Step 820, the Beijing SMF network element sends a PFCP: PFCP session establishment request to the Beijing UPF network element;

各种规则{PDR、FAR、URR、QER},PDN类型;Various rules {PDR, FAR, URR, QER}, PDN type;

步骤821、北京UPF网元向北京SMF网元发送PFCP:PFCP会话建立响应;Step 821, Beijing UPF network element sends PFCP: PFCP session establishment response to Beijing SMF network element;

{PDR,F-SEID(UPF用户面地址+TEID),Node ID};{PDR, F-SEID (UPF user plane address + TEID), Node ID};

步骤822、北京SMF网元向北京NRF网元发送HTTP2_GET:选择AMF的Comm服务;{目标nF类型:AMF,请求nf:SMF};Step 822, Beijing SMF network element sends HTTP2_GET to Beijing NRF network element: select Comm service of AMF; {target nF type: AMF, request nf: SMF};

步骤823、北京NRF网元向北京SMF网元发送HTTP2:选择AMF的Comm服务;Step 823, the Beijing NRF network element sends HTTP2 to the Beijing SMF network element: select the Comm service of AMF;

JSON{nfinstances:AMF的IP地址,FQDN等};JSON{nfinstances:AMF's IP address, FQDN, etc.};

步骤824~步骤825:给AMF发送N1和N2消息,N2消息通知基站建立用户面通道,N1消息给UE通知PDU会话建立成功及参数。Step 824 to Step 825: Send N1 and N2 messages to AMF. The N2 message notifies the base station to establish a user plane channel. The N1 message notifies the UE of the successful establishment of the PDU session and its parameters.

步骤824、北京SMF网元向北京AMF网元发送HTTP2 POST;Step 824, the Beijing SMF network element sends HTTP2 POST to the Beijing AMF network element;

{PDU会话ID N2消息(PDU会话ID,QFI,Qos轮廓,UPF隧道地址和ID,QoS参数、PDU会话类型:IPV4);{PDU session ID N2 message (PDU session ID, QFI, QoS profile, UPF tunnel address and ID, QoS parameters, PDU session type: IPV4);

N1消息(NAS-PDU:PDU Session Establish Accept,UE的IP地址,SessionAMBR,DNN)};N1 message (NAS-PDU: PDU Session Establish Accept, UE IP address, Session AMBR, DNN)};

给AMF发送N1和N2消息,N2消息通知gNB建用户面通道,N1消息给UE通知PDU会话建立成功及参数Send N1 and N2 messages to AMF. N2 message notifies gNB to build user plane channel. N1 message notifies UE of successful PDU session establishment and parameters.

步骤825、北京AMF网元向北京SMF网元发送HTTP2JSON{cause:N1_N2_TRANSFER_INITIATED}。Step 825, the Beijing AMF network element sends HTTP2JSON{cause:N1_N2_TRANSFER_INITIATED} to the Beijing SMF network element.

最后,参见图15所示:Finally, see Figure 15:

步骤826~步骤828:AMF网元通过N2消息通过基站建立用户面隧道,N1消息给UE通知PDU会话建立成功以及参数,包括:DNN、UE的IP地址、会话AMBR聚合最大比特速率等。Steps 826 to 828: The AMF network element establishes a user plane tunnel through the base station via the N2 message, and the N1 message notifies the UE of the successful establishment of the PDU session and parameters, including: DNN, UE's IP address, session AMBR aggregation maximum bit rate, etc.

步骤826、北京AMF网元向北京gNB发送NGAP:PDU Session Resource SetupRequest;Step 826: The Beijing AMF network element sends an NGAP:PDU Session Resource SetupRequest to the Beijing gNB.

N2消息参数:[PDU Session ID,s-NSSAI,POU Session Type,UPFIP和TEID,Qps参数;N2 message parameters: [PDU Session ID, s-NSSAI, POU Session Type, UPFIP and TEID, Qps parameters;

NAS-PDU:(PDU Session establishment accept,选择SSC模式,|DNN,UE的IP地址,Session-AMBR);NAS-PDU: (PDU Session establishment accept, select SSC mode, |DNN, UE IP address, Session-AMBR);

N2消息通知gNB建用户面通道,N1消息给UE通知PDU会话建立成功及参数;The N2 message notifies the gNB to establish a user plane channel, and the N1 message notifies the UE of the successful establishment of the PDU session and its parameters;

步骤827、北京gNB向UE发送NAS:PDU Session establishment accept;Step 827: Beijing gNB sends NAS: PDU Session establishment accept to the UE.

{s-NSSAI,DNN,UE的IP地址Session-AMBR参数};{s-NSSAI, DNN, UE IP address Session-AMBR parameters};

步骤828、北京gNB向北京AMF网元发送NGAP:PDU Session Resource SetupResponse;Step 828: Beijing gNB sends NGAP:PDU Session Resource SetupResponse to Beijing AMF network element.

N2消息参数(PDU SessionID,gNB的用户面IP和TEID);N2 message parameters (PDU SessionID, gNB user plane IP and TEID);

至此,UE开始发迷第一个上行数据;At this point, the UE starts to send the first uplink data;

步骤829~步骤832:此时UE发送第一个上行数据。同时AMF网元向SMF网元下发基站的用户面IP和TEID值,SMF网元把基站的用户面消息告知给UPF,最后UPF通过基站下发一个下行数据给到5G终端。Steps 829 to 832: At this time, the UE sends the first uplink data. At the same time, the AMF network element sends the user plane IP and TEID value of the base station to the SMF network element. The SMF network element informs the UPF of the user plane message of the base station. Finally, the UPF sends a downlink data to the 5G terminal through the base station.

步骤829、北京AMF网元向北京SMF网元发送HTTP2 POST;JSON{UE Lacation,RequestType:Initial Request,gNB用户面IP和TEID};Step 829: The Beijing AMF network element sends HTTP2 POST to the Beijing SMF network element; JSON {UE Lacation, RequestType: Initial Request, gNB user plane IP and TEID};

步骤830、北京SMF网元向北京UPF网元发送PFCP:PFCP Session ModificationRequest;{Updated FAR:gNB的用户面IP和TEID};将gNB的用户面消息告知UPF;Step 830: The Beijing SMF network element sends a PFCP to the Beijing UPF network element: PFCP Session ModificationRequest; {Updated FAR: gNB user plane IP and TEID}; and informs the UPF of the gNB user plane message.

步骤831、北京UPF网元向北京SMF网元发送PFCP-PFCP Session ModificationResponse;{Cause:Request accepted};Step 831, Beijing UPF network element sends PFCP-PFCP Session ModificationResponse to Beijing SMF network element; {Cause: Request accepted};

步骤832、北京SMF网元向北京AMF网元发送HTTP2;Step 832, the Beijing SMF network element sends HTTP2 to the Beijing AMF network element;

至此,UPF开始发送第一个下行数据。At this point, UPF starts sending the first downlink data.

上述PDU会话初始建立的场景流程中,存在的问题为:DNN网络未知、无效PDU会话;用户在请求PDU会话业务建立时候,会把5G终端的DNN、PDU会话ID等参数带给5G核心网,在SM上下请求消息中要建立AMF与SMF关于此终端Session的联系,如果DNN网络不同、或者PDU会话ID超过允许取值范围则不会执行后续操作,但是会反复触发AMF和SMF之间的用户SM上下文创建,导致SMF网元此信令程序被反复占用,影响正常5G终端上下文创建,同时也不会通过N4接口向UPF发起会话建立请求。In the above scenario process of initial establishment of PDU session, the problems are: unknown DNN network and invalid PDU session; when the user requests to establish PDU session service, the DNN, PDU session ID and other parameters of the 5G terminal will be brought to the 5G core network, and the connection between AMF and SMF regarding this terminal session will be established in the SM up and down request messages. If the DNN network is different or the PDU session ID exceeds the allowed value range, subsequent operations will not be performed, but the user SM context creation between AMF and SMF will be repeatedly triggered, resulting in the repeated occupation of this signaling program of the SMF network element, affecting the normal 5G terminal context creation, and no session establishment request will be initiated to UPF through the N4 interface.

本次申请通过构建统一归档管控的5G专网架构,分别在分支节点下沉部署“控制面采集解析设备”收集多个分支节点的5G控制面信令流程、字段及错误信息,实现统一归档、统一管控便于特殊行业的多分支节点安全协同,避免5G网络控制面的信令风暴。This application builds a 5G private network architecture with unified archiving and control, and deploys "control plane collection and analysis equipment" at branch nodes to collect 5G control plane signaling processes, fields and error information of multiple branch nodes, so as to achieve unified archiving and unified control to facilitate the safe collaboration of multiple branch nodes in special industries and avoid signaling storms on the 5G network control plane.

而相关技术中针对用户面PDU会话建立请求过程中,触发SMF网元重复性的上行分类器插入操作、DHCP UE IP地址分配的请求信令,造成5G系统的信令被DOS占用,无法为UE提供服务。相比于相关技术中的方案,本申请不仅考虑了PDU会话建立请求的信令攻击,还考虑了5G控制面的终端入网鉴权时候,触发AMF网元重复性的初始注册、终端鉴权认证、UE上下文等信令请求以及UDM网元重复性的鉴权向量生成信令请求等,造成AMF网元、UDM网元被DOS占用,无法为UE提供服务。In the related art, during the user-side PDU session establishment request process, the uplink classifier insertion operation of the SMF network element is triggered repeatedly, and the request signaling of the DHCP UE IP address allocation is triggered, causing the signaling of the 5G system to be occupied by DOS and unable to provide services to the UE. Compared with the solutions in the related art, this application not only considers the signaling attack of the PDU session establishment request, but also considers the terminal access authentication of the 5G control plane, which triggers the AMF network element's repeated initial registration, terminal authentication, UE context and other signaling requests, as well as the UDM network element's repeated authentication vector generation signaling requests, etc., causing the AMF network element and the UDM network element to be occupied by DOS and unable to provide services to the UE.

由上述内容可知,本申请提供的多园区的无线专网安全防护方法,把5G核心网控制面网元和用户面网元均下沉到用户园区,并进行本地化部署形成一套与公网物理隔绝的安全专网系统。为了确保整个网络的安全可靠性,本申请对基站、传输交互,到核心网三大核心设备均实现专有的物理隔离,真正做到应用数据间的安全隔离。此外,采取监测、记录网络运行事件、网络安全事件并需按照规定留存相关网络日志大于或等于6个月,保障网络安全、稳定运行,维护网络数据的完整性、保密性和可用性。From the above content, it can be seen that the multi-campus wireless private network security protection method provided by this application sinks the 5G core network control plane network elements and user plane network elements to the user park, and conducts local deployment to form a set of secure private network systems that are physically isolated from the public network. In order to ensure the security and reliability of the entire network, this application implements proprietary physical isolation for the three core devices of base stations, transmission interactions, and core networks, and truly achieves secure isolation between application data. In addition, measures are taken to monitor and record network operation events and network security events, and relevant network logs must be retained for greater than or equal to 6 months in accordance with regulations to ensure network security and stable operation, and maintain the integrity, confidentiality and availability of network data.

除此之外,由于部分特殊行业用户共用公网基站,针对5G网络信令风暴的危险,避免大量非法身份的5G终端反复接入网络或者合法5G终端由于异常事件反复接入网络,造成网络拥塞;大量合法5G终端被黑客控制,反复开机、周期性发送信令和大流量数据,造成网络异常等问题,需侧重研究统一归档管控的5G专网总体架构及业务流。In addition, since some users in special industries share public network base stations, in order to address the danger of 5G network signaling storms, we need to focus on studying the overall architecture and business flows of 5G private networks with unified archiving and management to prevent a large number of 5G terminals with illegal identities from repeatedly accessing the network or legal 5G terminals from repeatedly accessing the network due to abnormal events, causing network congestion; a large number of legal 5G terminals are controlled by hackers, repeatedly turned on, and periodically send signaling and large amounts of data, causing network anomalies.

本申请提供的多园区的无线专网安全防护方法,还可以用于进行区域安全监管。根据保密法规定国家秘密的层级分为核心、重要、一般涉密人员三个等级,根据特殊行业不同员工的涉密等级和工作性质,涉密军工企业划分工作区域,进行大型园区的区域管理。但是,随着用户数量及园区涉密应用服务增多,如何在保证安全前提下可实现对区域内人员和业务监管则至关重要。The wireless private network security protection method for multiple parks provided by this application can also be used for regional security supervision. According to the National Security Law, the levels of state secrets are divided into three levels: core, important, and general confidential personnel. According to the confidentiality level and nature of work of different employees in special industries, confidential military enterprises divide work areas to conduct regional management of large parks. However, with the increase in the number of users and confidential application services in the park, it is crucial to achieve supervision of personnel and business in the region while ensuring safety.

示例性的,在一个可实现的区域安全管控的场景中,结合图16所示,,分支节点①和分支节点②的UPF将数据面采集的用户数据转发到数据合成服务器,核心网控制面网元将中心节点控制面采集的数据转发到数据合成服务器,5G保密专网管理平台根据5G专网信令流(例如用户注册、认证;服务请求及建立等),对数据合成服务器提供的5G移动通信接口(例如N1、N2、N8、N11、N4等接口)的用户身份字段、数据字段及参数值建立关系型数据库;针对不同区域内人员和业务监管安全需求,基于用户面采集解析设备和控制面采集解析设备的数据解析和合成,生成全量XDR原始数据和关系型数据库列表,汇聚所有信令流程、接口消息及字段。除此之外,参照图16所示,可基于5G基站的策略报告(Measurement Report,MR)报告或者NR定位协议(NRPPa),或者5G定位服务模块对终端侧的网络信号强度参数采集及上报。Exemplarily, in a scenario of regional security control that can be realized, in combination with FIG16, the UPF of branch node ① and branch node ② forwards the user data collected by the data plane to the data synthesis server, and the core network control plane network element forwards the data collected by the central node control plane to the data synthesis server. The 5G confidential private network management platform establishes a relational database for the user identity field, data field and parameter value of the 5G mobile communication interface (such as N1, N2, N8, N11, N4 and other interfaces) provided by the data synthesis server according to the 5G private network signaling flow (such as user registration, authentication; service request and establishment, etc.); for the personnel and business supervision security requirements in different regions, based on the data analysis and synthesis of the user plane collection and analysis device and the control plane collection and analysis device, the full amount of XDR raw data and the relational database list are generated, and all signaling processes, interface messages and fields are aggregated. In addition, as shown in FIG16, the network signal strength parameters on the terminal side can be collected and reported based on the 5G base station's policy report (Measurement Report, MR) report or the NR positioning protocol (NRPPa), or the 5G positioning service module.

参见图16所示,本申请基于采集的“5G核心网的控制面数据、用户面数据”、“5G基站的定位测量基础数据”,借助5G保密专网管理平台支持的“定位解算平台”和“用户业务分析”两大功能模块,实现特定区域的用户识别和业务分析,进一步地,用户识别和业务分析的结果可以可视化显示。这里,5G基站的定位测量基础数据包括但不限于图16所示的用户身份、小区ID、型号分配码(Tac)、传输/接收点标识(Trp ID)、参考信号接收功率(Reference Signal Receiving Power,RSRP)、到达时间差(Time Difference ofArrival,TDOA)。As shown in Figure 16, this application is based on the collected "control plane data and user plane data of the 5G core network" and "basic positioning measurement data of 5G base stations", with the help of the two major functional modules of "positioning solution platform" and "user service analysis" supported by the 5G confidential private network management platform, to achieve user identification and service analysis in a specific area. Furthermore, the results of user identification and service analysis can be displayed visually. Here, the basic positioning measurement data of the 5G base station includes but is not limited to the user identity, cell ID, model allocation code (Tac), transmission/reception point identification (Trp ID), reference signal receiving power (RSRP), and arrival time difference (TDOA) shown in Figure 16.

参见图16所示,用户业务分析基于5G日志系统的业务话单基础数据,包括:对数据合成服务器传输的数据流进行协议识别和/还原接口处理,得到的用户业务分析结果。其中,协议识别包括但不限于对如下的用户请求协议进行识别:HTTP、HTTPS、FTP等。还原接口包括但不限于如下接口:TEID、会话初始协议(Session Initiation Protocol,SIP)、数据通道(Digital Path,DIP)、来源端口(Sport)、目的端口(Dport)等。As shown in Figure 16, user business analysis is based on the basic data of the business call list of the 5G log system, including: protocol identification and/or restoration interface processing of the data stream transmitted by the data synthesis server to obtain the user business analysis results. Among them, protocol identification includes but is not limited to the identification of the following user request protocols: HTTP, HTTPS, FTP, etc. The restoration interface includes but is not limited to the following interfaces: TEID, Session Initiation Protocol (SIP), Data Channel (Digital Path, DIP), Source Port (Sport), Destination Port (Dport), etc.

本申请一些实施例中,全量用户话单数据包括无线专网的至少两个基站测量的和/或特定区域中待测终端上报的终端侧的无线信号关联参数,步骤102基于全量用户话单数据对多分支节点进行安全协同管理,生成无线专网安全防护信息,可以通过如下步骤实现:In some embodiments of the present application, the full user call list data includes wireless signal associated parameters on the terminal side measured by at least two base stations of the wireless private network and/or reported by the terminal to be tested in a specific area. Step 102 performs security collaborative management of multiple branch nodes based on the full user call list data to generate wireless private network security protection information, which can be achieved by the following steps:

C31、基于无线信号关联参数,建立待测终端与至少两个基站之间的关联关系。C31. Establish an association relationship between the terminal to be tested and at least two base stations based on the wireless signal association parameter.

本申请实施例中,无线信号关联参数包括但不限于TOA、TDOA、到达角度(Time ofArrival,AOA)、接收的信号强度指示(Received Signal Strength Indication,RSSI)。In the embodiment of the present application, the wireless signal associated parameters include but are not limited to TOA, TDOA, Time of Arrival (AOA), and Received Signal Strength Indication (RSSI).

其中,待测终端与至少两个基站之间的关联关系包括待测终端与至少两个基站之间的位置关联关系。The association relationship between the terminal to be tested and the at least two base stations includes a position association relationship between the terminal to be tested and the at least two base stations.

C32、基于关联关系,识别特定区域中待测终端的位置。C32. Based on the association relationship, identify the location of the terminal to be tested in a specific area.

其中,无线专网安全防护信息包括特定区域中待测终端的位置。Among them, the wireless private network security protection information includes the location of the terminal to be tested in a specific area.

需要说明的是,跨多园区或跨厂区的特定区域安全管控信息包括上述待测终端的位置。It should be noted that the specific area security management and control information across multiple parks or factories includes the location of the above-mentioned terminal to be tested.

本申请实施例中,定位解算平台可以根据蜂窝网络中基站测量或终端上报的无线信号关联参数,来建立待测终端和基站之间的位置关联关系,进而基于位置关联关系,推导出待测终端的地理坐标。In an embodiment of the present application, the positioning solution platform can establish a position association relationship between the terminal to be measured and the base station according to the wireless signal association parameters measured by the base station in the cellular network or reported by the terminal, and then derive the geographic coordinates of the terminal to be measured based on the position association relationship.

在一个可实现的区域安全管控的场景中,示例性的,给出一个特定区域用户识别的场景示例:In a feasible scenario of regional security control, an example of a scenario of user identification in a specific area is given as an example:

不同岗位的工作内容、工作性质不同,有权限接触到的信息也各不相同,重点涉密信息同时需针对不同密级员工进行保密工作。作为示例,特殊行业用户将园区分为:“生产区”、“办公管理区”、“研发区”等,每个区域涉密等级不同,并且与不同密级员工等级适配;为了避免有意或无意进入与员工不匹配的涉密区域,也避免核心资料泄露风险。本申请侧重研究5G终端用户区域性定位,为特殊行业管理人员提供特定区域用户识别系统及业务分析识别,同时记录每个用户轨迹以及业务服务,为园区安全审计提供基础数据支撑,实现基于5G保密专网的区域用户信息安全监管。Different positions have different work content and nature, and the information they are authorized to access is also different. Key confidential information must also be kept confidential for employees with different confidentiality levels. As an example, special industry users divide the park into: "Production Area", "Office Management Area", "R&D Area", etc. Each area has a different level of confidentiality and is adapted to the different levels of employees; in order to avoid intentional or unintentional entry into confidential areas that do not match the employees, and to avoid the risk of core data leakage. This application focuses on the regional positioning of 5G terminal users, providing special industry managers with a specific area user identification system and business analysis identification, while recording each user's trajectory and business services, providing basic data support for park security audits, and realizing regional user information security supervision based on 5G confidential private networks.

本申请一些实施例中,C32基于关联关系,识别特定区域中待测终端的位置,可以通过如下步骤实现:In some embodiments of the present application, C32 identifies the location of the terminal to be tested in a specific area based on the association relationship, which can be achieved by the following steps:

C321、基于无线信号关联参数,得到至少两个基站中每两个基站之间接收待测终端的上行探测参考信号的时间差。C321. Based on the wireless signal association parameter, obtain a time difference between at least two base stations in receiving an uplink sounding reference signal of the terminal to be tested.

C322、获得待测终端的信号到达每两个基站的对应时间。C322. Obtain the corresponding time when the signal of the terminal to be tested arrives at every two base stations.

其中,关联关系包括时间差和每两个基站中每一基站的对应时间。The association relationship includes the time difference and the corresponding time of each of every two base stations.

C323、基于时间差、每两个基站中每一基站的对应时间、每一基站的位置和光速,确定待测终端的位置。C323. Determine the position of the terminal to be measured based on the time difference, the corresponding time of each of the two base stations, the position of each base station and the speed of light.

上述定位解算平台可根据蜂窝网络中基站测量或终端上报的无线信号相关参数,来建立未知目标即待测终端和基站之间的位置关联关系,进行推导出未知目标终端的地理坐标。无线信号关联参数包括:TOA、TDOA、AOA、RSSI中的一种或多种的组合。The above positioning solution platform can establish the position association relationship between the unknown target, i.e. the terminal to be measured, and the base station based on the wireless signal related parameters measured by the base station in the cellular network or reported by the terminal, and derive the geographical coordinates of the unknown target terminal. The wireless signal related parameters include: one or more combinations of TOA, TDOA, AOA, and RSSI.

在一个可实现的定位解算平台确定待测终端的位置的场景中,以采用TDOA定位方式为例,使用两个及以上基站到待测终端的位置的时间差作为计算参数,依托各基站如微型射频拉远单元/皮站射频拉远单元(Pico Remote Radio Unit,pRRu)时钟高度同步性,这里,参见图17所示,以三个基站为例,采集上行链路探测参考信号(UL-SRS)导频信号获得不同时间戳信息,例如:基站pRRu①对应的到达时间①Time_Stamp1、基站pRRu②对应的到达时间②Time_Stamp2、基站pRRu③对应的到达时间③Time_Stamp3等等。Time_Stamp1、Time_Stamp2、Time_Stamp3分别为三个基站对应的UL-SRS导频信号上报时间戳。In a scenario where a realizable positioning solution platform determines the position of the terminal to be tested, taking the TDOA positioning method as an example, the time difference between two or more base stations and the position of the terminal to be tested is used as a calculation parameter, relying on the high synchronization of the clocks of each base station such as a micro radio remote unit/pico base station radio remote unit (Pico Remote Radio Unit, pRRu), here, referring to FIG. 17, taking three base stations as an example, the uplink sounding reference signal (UL-SRS) pilot signal is collected to obtain different timestamp information, for example: the arrival time ① Time_Stamp1 corresponding to the base station pRRu①, the arrival time ② Time_Stamp2 corresponding to the base station pRRu②, the arrival time ③ Time_Stamp3 corresponding to the base station pRRu③, etc. Time_Stamp1, Time_Stamp2, and Time_Stamp3 are the reporting timestamps of the UL-SRS pilot signals corresponding to the three base stations.

本申请实施例中,结合图17所示,以三个基站为例,三个基站坐标分别为:(X1,Y1)、(X2,Y2)、(X3,Y3),为了便于描述,后续以(Xi,Yi)、(Xj,Yj)来区分任意两个基站坐标。本申请中多个pRRU之间的时间同步,保障相同UL-SRS导频信号下,时间差为终端到不同pRRU距离差。In the embodiment of the present application, as shown in FIG17, taking three base stations as an example, the coordinates of the three base stations are: ( X1 , Y1 ), ( X2 , Y2 ), ( X3 , Y3 ), and for the convenience of description, ( Xi , Yi ), ( Xj , Yj ) are used to distinguish the coordinates of any two base stations. In the present application, the time synchronization between multiple pRRUs ensures that under the same UL-SRS pilot signal, the time difference is the distance difference between the terminal and different pRRUs.

终端到基站坐标点位距离可表示为公式1:The distance between the terminal and the base station coordinate point can be expressed as formula 1:

Ri 2=(X-Xi)2+(Y-Yi)2(公式1)R i 2 =(XX i ) 2 +(YY i ) 2 (Formula 1)

终端到两两基站间的距离差可以表示为公式2:The distance difference between the terminal and each base station can be expressed as formula 2:

对公式进行简化得到公式3:Simplifying the formula, we get formula 3:

进一步地,终端到基站①和基站②的距离差可以表示为公式4:Furthermore, the distance difference between the terminal and base station ① and base station ② can be expressed as formula 4:

终端UE到基站①和基站③的距离差可以表示为公式5:The distance difference between the terminal UE and base station ① and base station ③ can be expressed as formula 5:

终端UE到基站②和基站③的距离差可以表示为公式6:The distance difference between the terminal UE and base station ② and base station ③ can be expressed as formula 6:

将方程组公式以矩阵形式表示,过程如下:The equation system is expressed in matrix form as follows:

其中,Rj代表终端到基站j的距离、Ri代表终端到基站i的距离、(Xi,Yi)和(Xj,Yj)代表不同基站的坐标(i≥2)、X和Y为求解终端位置信息、C为光速、Δti,1为基站i与基站1之间接收到UL-SRS导频信号时间差、TA1为终端到达基站1时间、TAi为终端到达基站i时间,Wherein, Rj represents the distance from the terminal to base station j, Ri represents the distance from the terminal to base station i, ( Xi , Yi ) and ( Xj , Yj ) represent the coordinates of different base stations (i≥2), X and Y are the terminal location information to be solved, C is the speed of light, Δt i,1 is the time difference between base station i and base station 1 when the UL-SRS pilot signal is received, TA1 is the time when the terminal arrives at base station 1, and TAi is the time when the terminal arrives at base station i.

针对上述公式3,由于基站(Xi,Yi)坐标已知:令/>其中,Ri-R1=c×Δti、Ri+R1=c×(TA1+TAi);According to the above formula 3, Since the coordinates of the base station (X i ,Y i ) are known: Let/> Among them, R i - R 1 = c×Δt i , R i + R 1 = c×(TA 1 +TA i );

线性方程组优化为:M=ΑN;The linear equation system is optimized as follows: M = ΑN;

其中,N=[X,Y]TWhere, N = [X, Y] T ;

Q-1为协方差矩阵(A Simple and Efficient Estimator);Q -1 is the covariance matrix (A Simple and Efficient Estimator);

通过双曲线定位估计法(线性方程组):By hyperbolic positioning estimation method (linear equation system):

N=(ATA)-1AT MN=( ATA ) -1ATM

N=(ATQ-1A)-1ATQ-1MN=( ATQ - 1A) -1ATQ - 1M

得到两个基站条件下的方程组X解。The solution of the equation group X under the condition of two base stations is obtained.

相关技术中,在识别到终端的网络攻击较为简单,处理方式包括PDU会话释放、UE去注册、UE-AMBR限制,可识别网络攻击包括:DHCP请求次数、无效DHCP请求、DNS查询请求次数。相关技术并未如本申请一般,考虑重复性PDU会话请求过程中的SM上下文建立、SM签约数据获取等请求的网络攻击判定。除此之外,未考虑针对特殊行业区域管控要求,未与终端所处位置进行关联,用户终端网络攻击没有区域限制。In the related technology, it is relatively simple to identify network attacks on terminals. The processing methods include PDU session release, UE deregistration, and UE-AMBR restriction. Identifiable network attacks include: number of DHCP requests, invalid DHCP requests, and DNS query request times. The related technology does not consider the network attack determination of requests such as SM context establishment and SM contract data acquisition during repetitive PDU session requests as in this application. In addition, it does not consider the control requirements for special industry areas, is not associated with the location of the terminal, and there is no regional restriction on user terminal network attacks.

本申请一些实施例中,全量用户话单数据还包括业务话单数据,C32基于关联关系,识别特定区域中待测终端的位置之后,无线专网的中心节点还可以执行如下操作:In some embodiments of the present application, the full user call record data also includes service call record data. After C32 identifies the location of the terminal to be tested in a specific area based on the association relationship, the central node of the wireless private network can also perform the following operations:

基于待测终端的位置和业务话单数据,对特定区域中用户的应用服务许可进行评估,生成评估结果。其中,业务话单数据包括但不限于5G日志系统的业务话单基础数据。Based on the location of the terminal to be tested and the service call data, the application service license of the user in the specific area is evaluated to generate an evaluation result. The service call data includes but is not limited to the basic service call data of the 5G log system.

本申请实施例中,评估结果留存归档,保障用户不同涉密区域内的业务使用合规性审计。In the embodiment of the present application, the evaluation results are retained and archived to ensure compliance audit of business usage in different confidential areas of users.

在一个可实现的区域安全管控的场景中,示例性的,给出一个用户业务分析的场景示例:In a feasible regional security control scenario, an example of a user business analysis scenario is given as an example:

用户业务分析基于5G日志系统的业务话单基础数据,包括:用户请求协议(HTTP、HTTPS、DNS、MMS、FTP、SIP、Email等)、业务话单(GTP-TEID、MSISDN、IMSI、IMEI、APN、源IP、源端口、目标IP、目标端口、发生时间)等基础数据。User business analysis is based on the basic data of business call records in the 5G log system, including: user request protocols (HTTP, HTTPS, DNS, MMS, FTP, SIP, Email, etc.), business call records (GTP-TEID, MSISDN, IMSI, IMEI, APN, source IP, source port, target IP, target port, occurrence time) and other basic data.

示例性的,结合定位解算平台的位置信息以及业务话单的目标IP,对区域用户的应用服务许可进行评估,可以建立如下关系:For example, by combining the location information of the positioning solution platform and the target IP address of the service call record, the application service license of the regional user is evaluated, and the following relationship can be established:

业务话单基础数据表Business call bill basic data table

通过业务话单上报用户访问服务的目标IP、端口对应用服务进行区分,根据应用服务区域使用范围,对用户IMSI身份进行核定和记录,留存归档,保障用户不同涉密区域内的业务使用合规性审计。Application services are differentiated by reporting the target IP and port of user access services through business call records. The user's IMSI identity is verified and recorded according to the scope of use of the application service area, and archived to ensure compliance audit of business use in different confidential areas of users.

其中,区域用户的动态管理策略可以参考如下方式:The dynamic management strategy for regional users can refer to the following methods:

在平台侧针对每个用户均建立2个参数,权重值K和门限阈值G。其中权重值K与现有业务类型和不同安全区域进行绑定,例如:现有业务有“移动办公OA”、“5G自动巡检系统”、“5G安防系统”等等(根据业务涉密等级,权重值分别为k1、k2、k3),同时用户移动区域可根据涉密等级不同权重值分别为:k100/k101/k102;那么根据业务和区域不同用户的涉密权重值则为K=K1×K100;然后与门限值G进行比较,如用户的涉密权重超过门限值G,则对相关使用应用进行远程遥毙;除此之外,平台侧可根据实际情况为用户开辟不同时刻的权重值和门限值,动态弹性管控。On the platform side, two parameters are established for each user, the weight value K and the threshold value G. The weight value K is bound to the existing business types and different security areas. For example, the existing businesses include "mobile office OA", "5G automatic inspection system", "5G security system", etc. (according to the confidentiality level of the business, the weight values are k1, k2, k3 respectively), and the user's mobile area can have different weight values according to the confidentiality level: k100/k101/k102; then the confidentiality weight value of different users according to the business and area is K=K1×K100; then it is compared with the threshold value G. If the user's confidentiality weight exceeds the threshold value G, the relevant application will be remotely killed; in addition, the platform side can open up weight values and threshold values for users at different times according to actual conditions, and dynamically and flexibly control.

如此设计,采集5G控制面的信令数据和数据面的业务数据,均为基础参数,作为算法参数输入(例如网络报错字段、用户面访问业务的目标IP、数据量以及基站侧的终端信号强度),经过“信令流及异常情况”分析后防止DDOS攻击、经过“核心网数据面的业务流”分析得到用户访问业务的IP等参数和“基站终端信号强度”分析得到用户区域位置坐标;通过平台侧设置用户的权重、门限值等参数作为算法过程变量,则可实现终端的区域安全动态管控,以此达到综合上述两个方面来判断园区的网络安全是否不稳定、或者是否受到了严重攻击。With this design, the signaling data of the 5G control plane and the business data of the data plane are collected as basic parameters and used as algorithm parameter inputs (such as network error fields, target IP addresses of user-side access services, data volume, and terminal signal strength on the base station side). After "signaling flow and abnormal conditions" analysis, DDOS attacks are prevented, and parameters such as the IP addresses of users accessing services are obtained through "business flow of the core network data plane" analysis, and user regional location coordinates are obtained through "base station terminal signal strength" analysis. By setting user weights, threshold values and other parameters on the platform side as algorithm process variables, dynamic regional security management and control of terminals can be achieved, so as to comprehensively judge whether the network security of the park is unstable or whether it has been seriously attacked by the above two aspects.

在本申请一些实施例中,也可以将时间纳入参考依据作为实施方式,例如:在不同的位置信息、不同的时间段中,业务话单分析得到的源和目标IP是相互匹配的,是安全的,可以结合参考“生产区”、“办公管理区”、“研发区”将对应的评估等级进行划分,建议以实际场景划分等级,例如“生产区”划分为“一级安全区”、“办公管理区”划分为“一级安全区”、“研发区”划分为“三级安全区”,因此,需要明确的具体方案为:设置的动态评估策略,分别针对一级安全区、二级安全区和三级安全区的适配情况,例如,针对“三级安全区”,不能允许任何条件下的“源和目标IP”不匹配发生,已经原本应该属于该区域的源IP去到其他区域,以表明“三级安全区”的特殊性,请结合园区实际情况,基于实际业务需求对动态策略进行设置。In some embodiments of the present application, time can also be included as a reference basis for implementation. For example, in different location information and different time periods, the source and target IPs obtained by analyzing the business call records match each other and are safe. The corresponding evaluation levels can be divided with reference to the "production area", "office management area" and "R&D area". It is recommended to divide the levels according to the actual scenarios. For example, the "production area" is divided into a "first-level security area", the "office management area" is divided into a "first-level security area", and the "R&D area" is divided into a "third-level security area". Therefore, the specific plan that needs to be clarified is: the dynamic evaluation strategy set is respectively adapted to the first-level security area, the second-level security area and the third-level security area. For example, for the "third-level security area", the "source and target IP" mismatch under any conditions cannot be allowed to occur. The source IP that should have belonged to this area goes to other areas to indicate the particularity of the "third-level security area". Please set the dynamic strategy based on the actual business needs in combination with the actual situation of the park.

本次申请通过构建统一归档管控的5G专网架构,分别在分支节点下沉部署“用户面采集解析设备”收集多个分支节点的用户业务事件、流量统计,实现统一归档、统一管控便于特殊行业的多分支节点安全协同,避免5G网络用户面的信令风暴。This application builds a 5G private network architecture with unified archiving and control, and deploys "user plane collection and analysis equipment" at branch nodes to collect user business events and traffic statistics of multiple branch nodes, so as to achieve unified archiving and unified control to facilitate the safe collaboration of multiple branch nodes in special industries and avoid signaling storms on the user plane of 5G networks.

而相关技术针对用户面PDU会话建立请求过程中,触发SMF网元重复性的上行分类器插入操作、DHCP UE IP地址分配的请求信令,造成5G系统的信令被DOS占用,无法为UE提供服务。相比于相关技术中的方案,本申请不仅考虑PDU会话请求过程中重复性的SM上下文建立、SM签约数据获取等请求的网络攻击判定。除此之外,针对特殊行业区域管控要求,可与终端所处位置进行关联,为特殊行业管理人员提供特定区域用户识别系统及业务分析识别,同时记录每个用户轨迹以及业务服务,为园区安全审计提供基础数据支撑,实现基于5G保密专网的区域用户信息安全监管。However, in the related technology, during the user-side PDU session establishment request process, the SMF network element repeatedly inserts uplink classifiers and the request signaling for DHCP UE IP address allocation is triggered, causing the 5G system's signaling to be occupied by DOS and unable to provide services to the UE. Compared with the solutions in the related technology, this application not only considers the network attack determination of requests such as repeated SM context establishment and SM contract data acquisition during the PDU session request process. In addition, in response to the requirements for special industry area management and control, it can be associated with the location of the terminal to provide special industry managers with a specific area user identification system and business analysis and identification, while recording each user's trajectory and business services, providing basic data support for campus security audits, and realizing regional user information security supervision based on 5G confidential private networks.

相关技术中,SMF在识别到终端的网络攻击的情况下,限制终端对目标协议数据单元PDU会话的使用;其中,目标PDU会话承载有目标消息,目标消息是触发核心网网元向SMF发起网络攻击的消息。通过本申请提供的多园区的无线专网安全防护方法,使得UE不能无限制地向核心网发送具有网络攻击能力的目标消息,从而防御异常UE发起的DOS攻击,尽可能保障移动通信系统为更多的UE提供服务。In the related art, when SMF identifies a network attack on a terminal, it restricts the terminal's use of a target protocol data unit PDU session; wherein the target PDU session carries a target message, which is a message that triggers the core network element to launch a network attack on the SMF. Through the multi-campus wireless private network security protection method provided by this application, the UE cannot send target messages with network attack capabilities to the core network without restriction, thereby preventing DOS attacks initiated by abnormal UEs and ensuring that the mobile communication system provides services to as many UEs as possible.

本申请其他实施例中,中心节点和各分支节点之间,还可以进行“安全能力整合”构建多维安全防护体系,结合图18所示,安全能力整合可基于成研院现有“5G控制面安全增强以及用户面数据的加密传输”方案,在中心节点部署自研的5G保密专网安全增强型网元和算法加密服务器,配合终端侧定制化的安全增强客户身份识别卡(Subscriber IdentityModule,SIM),实现专网内的用户主认证安全增强。In other embodiments of the present application, "security capability integration" can also be carried out between the central node and each branch node to build a multi-dimensional security protection system. As shown in Figure 18, the security capability integration can be based on the existing "5G control plane security enhancement and encrypted transmission of user plane data" solution of Chengdu Research Institute. The self-developed 5G confidential private network security-enhanced network elements and algorithm encryption servers are deployed at the central node, and the customized security-enhanced customer identity card (Subscriber Identity Module, SIM) on the terminal side is used to achieve security enhancement of user master authentication in the private network.

面向特殊行业用户的多园区组网多维安全防护示意图如图18所示,该防护体系具有如下特点:用户面本地应用在本地终结,对本地业务数据安全进行网络防护和审计;中心节点可管控各分支节点的网络安全及终端;通过核心交换机实现控制面分支节点信令汇聚中心核心网侧;各节点业务数据和信令可以通过中心节点中转后访问其他节点应用。需要说明的是,图18所示的中心节点和各分支节点中,与图2中相同模块具有的功能相同。The schematic diagram of multi-park networking and multi-dimensional security protection for users in special industries is shown in Figure 18. The protection system has the following characteristics: local applications on the user plane are terminated locally, and network protection and auditing are performed on local business data security; the central node can control the network security and terminals of each branch node; the control plane branch node signaling convergence center core network side is realized through the core switch; the business data and signaling of each node can access other node applications after being transferred through the central node. It should be noted that the central node and each branch node shown in Figure 18 have the same functions as the same modules in Figure 2.

同时参照图18所示,在用户数据面加密和安全防护方面,可在各节点UPF和MEC的数据交换器中嵌入部署三方合作伙伴的“数据VPN加密”、“入侵检测系统”、“入侵防御系统(Intrusion Prevention System,IPS)”、“网络安全审计系统(Network SecurityAdministration,NSA)”等设备能力。通过对网络数据链路层(L2,Data link layer)到应用层(L7,Application layer)的数据流进行协议识别和解析,精确实时识别和阻断病毒、木马、拒绝服务(Denial of Service,Dos)/分布式拒绝服务(Distributed Denial ofService,DDos)、扫描等安全威胁,并且依据统一安全策略配置实现精确阻断,主动而高效保护用户网络安全。本申请在每个分支节点(成都、南京)的内网边界及内网接入处,以串行接入方式或旁路部署多套设备,通过三方提供的集中入侵管控平台对每个设备实体接口配置不同安全规则集,对源IP和目的IP等条件进行检测,保护5G专网内网免受攻击及抑制内网恶意流量,从而满足终端侧到网关侧加密数据隧道和入侵防护,构建多维安全防护体系。Meanwhile, as shown in FIG18 , in terms of user data plane encryption and security protection, the “data VPN encryption”, “intrusion detection system”, “intrusion prevention system (IPS)”, “network security audit system (NSA)” and other equipment capabilities of the three-party partners can be embedded in the data exchangers of each node UPF and MEC. By performing protocol identification and parsing on the data stream from the network data link layer (L2, Data link layer) to the application layer (L7, Application layer), security threats such as viruses, Trojans, denial of service (Dos)/distributed denial of service (DDos), and scanning can be accurately identified and blocked in real time, and accurate blocking can be achieved based on unified security policy configuration, actively and efficiently protecting user network security. This application deploys multiple sets of equipment in serial access or bypass mode at the intranet boundary and intranet access point of each branch node (Chengdu, Nanjing), configures different security rule sets for each device physical interface through the centralized intrusion control platform provided by the third party, and detects conditions such as source IP and destination IP to protect the 5G private network from attacks and suppress malicious traffic in the intranet, thereby meeting the encrypted data tunnel and intrusion protection from the terminal side to the gateway side, and building a multi-dimensional security protection system.

本申请提供的多园区的无线专网安全防护方法,至少支持如下三个方面的能力,统一归档管控的5G专网总体架构及业务流、信令流及异常情况、特定区域用户识别及业务分析。The multi-campus wireless private network security protection method provided in this application supports at least the following three capabilities: unified archiving and control of the 5G private network overall architecture and business flows, signaling flows and abnormal situations, and user identification and business analysis in specific areas.

为特殊行业的跨多园区或多厂区的涉密区域安全,提供用户业务可追溯,可分析、可记录,实现涉密区域用户的常去地、活动轨迹及终端运行状态等监控。为特殊行业客户的集团网络管理人员可针对特定安全事件进行网络监控、调度、分析,保障跨园区多终端的安全协同管理和敏感区域管控。For the security of confidential areas across multiple parks or factories in special industries, the system provides traceability, analysis and recording of user services, and monitors the frequented locations, activity trajectories and terminal operation status of users in confidential areas. Group network managers of special industry customers can monitor, dispatch and analyze specific security events to ensure the coordinated security management of multiple terminals across parks and the control of sensitive areas.

结合前述内容可知,本申请提供了一种基于用户话单构建安全管控及信令管理架构,又称为基于用户话单构建安全管控及信令管理系统,参见图19所示,该架构包括四层结构:平台层即全球广域网(World Wide Web,WEB)平台、5G日志留存系统、网络层、终端层;其中,网络层包括5G基站和5G核心网;终端层包括5G手机、5G用户端设备(5G CustomerPremise Equipment,CPE)、5G工业模组;该架构平台层至少支持三大功能:区域安全管控、统一归档及异常分析、地图管理以及可视化;基于架构支持的功能,5G日志留存系统实现数据汇聚,包括控制面数据采集和用户面数据采集。该架构可以解决5G专网在特殊领域依然面临的如下高安全问题,包括:缺乏跨多园区或跨厂区间专网的数据与信令安全协同管理、缺乏对跨多园区或跨厂区的特殊敏感区域安全管控。本申请提供的多园区的无线专网安全防护方法,面向特殊行业多园区的安全防护场景,从“基于用户话单构建安全管控及信令管理”、“安全能力整合”等方面,共同构建产业生态及推动行业发展。Combined with the above content, it can be seen that the present application provides a security control and signaling management architecture based on user call records, also known as a security control and signaling management system based on user call records, as shown in Figure 19, the architecture includes a four-layer structure: a platform layer, namely a global wide area network (World Wide Web, WEB) platform, a 5G log retention system, a network layer, and a terminal layer; wherein the network layer includes 5G base stations and 5G core networks; the terminal layer includes 5G mobile phones, 5G customer premises equipment (5G Customer Premise Equipment, CPE), and 5G industrial modules; the platform layer of the architecture supports at least three functions: regional security control, unified archiving and anomaly analysis, map management, and visualization; based on the functions supported by the architecture, the 5G log retention system realizes data aggregation, including control plane data collection and user plane data collection. This architecture can solve the following high security problems that 5G private networks still face in special fields, including: lack of data and signaling security collaborative management of private networks across multiple parks or across factories, and lack of security control of special sensitive areas across multiple parks or across factories. The multi-park wireless private network security protection method provided in this application is aimed at the security protection scenarios of multiple parks in special industries. It jointly builds an industrial ecology and promotes industry development from aspects such as "building security control and signaling management based on user call records" and "security capability integration".

本申请提供的多园区的无线专网安全防护方法,还考虑到特殊行业的跨多园区或多厂区的用户数量和人员移动频繁度均比较大,分析并记录用户的常去地、活动轨迹及终端运行状态等,保障园区内涉密区域安全以及数据可追溯。在终端用户入网下,特殊行业用户的集团网络管理人员可针对特定安全事件进行网络监控、调度、分析,保障跨园区多终端的安全协同管理和敏感区域管控。The multi-park wireless private network security protection method provided by this application also takes into account the large number of users and the frequency of personnel movement across multiple parks or multiple factories in special industries. It analyzes and records the user's frequented places, activity tracks, and terminal operation status, etc., to ensure the security of confidential areas within the park and data traceability. With the terminal user access to the network, the group network management personnel of users in special industries can conduct network monitoring, scheduling, and analysis for specific security incidents to ensure the safe collaborative management of multiple terminals across parks and the control of sensitive areas.

本申请提供的多园区的无线专网安全防护方法,将5G接口XDR话单数据分为信令面和数据面两类。其中,本申请针对5G信令面(N1/N2、N4、N8、N11)接口的信令流程交互的数据字段进行归档留存,基于归档留存数据进行用户行为分析、敏感位置信息解析以及终端入网异常离线数据分析。采用“5G专网统一管控框架及业务流”、“信令异常分析”等技术,实现统一归档、统一管控便于特殊行业的多分支节点安全协同,避免5G网络信令风暴威胁风险。此创新点需要保护。The multi-campus wireless private network security protection method provided by this application divides the 5G interface XDR call record data into two categories: signaling plane and data plane. Among them, this application archives and retains the data fields of the signaling process interaction of the 5G signaling plane (N1/N2, N4, N8, N11) interface, and performs user behavior analysis, sensitive location information analysis, and abnormal offline data analysis of terminal network access based on the archived retained data. Adopting technologies such as "5G private network unified management and control framework and business flow" and "signaling anomaly analysis", unified archiving and unified management are realized to facilitate the safe coordination of multi-branch nodes in special industries and avoid the threat risk of 5G network signaling storms. This innovation needs to be protected.

本申请提供的多园区的无线专网安全防护方法,根据5G专网信令流(用户注册、服务建立请求等),对数据合成服务器提供的N1、N2、N8等接口的用户身份字段、数据字段及参数值建立关系型数据库。基于此关系型数据库可衍生进行按照时间维度的数据存储和终端错误分析,进行统一可视化显示。除此之外,可根据UE终端错误类型,进行分析判定联动5G核心网对终端进行黑名单处理操作,保护网络安全。The multi-campus wireless private network security protection method provided in this application establishes a relational database for the user identity fields, data fields and parameter values of the N1, N2, N8 and other interfaces provided by the data synthesis server according to the 5G private network signaling flow (user registration, service establishment request, etc.). Based on this relational database, data storage and terminal error analysis according to the time dimension can be derived for unified visual display. In addition, according to the UE terminal error type, analysis and judgment can be made to link the 5G core network to perform blacklist processing operations on the terminal to protect network security.

本申请提供的多园区的无线专网安全防护方法,基于采集“5G核心网的控制面数据、用户面数据”、“5G基站的定位测量基础数据”,采用“定位解算平台”和“用户业务分析”技术,为特殊行业用户提供特定区域的用户识别和业务分析。The multi-campus wireless private network security protection method provided in this application is based on the collection of "control plane data and user plane data of the 5G core network" and "basic positioning measurement data of 5G base stations", and adopts "positioning solution platform" and "user business analysis" technologies to provide user identification and business analysis in specific areas for users in special industries.

由上述内容可知,本申请提供的多园区的无线专网安全防护方法,面向特殊行业,针对不同岗位的工作内容和性质,有权限接触到的信息也各不相同,重点涉密信息同时需针对不同密级员工进行保密工作。很多特殊行业用户将园区分为:“生产区”、“办公管理区”、“研发区”等,每个区域涉密等级不同与不同密级员工等级适配;为了避免有意或无意进入与员工不匹配的涉密区域,也避免核心资料泄露风险。本申请侧重研究5G终端用户区域性定位,为特殊行业管理人员提供特定区域用户识别系统及业务分析识别,同时记录每个用户轨迹以及业务服务,为园区安全审计提供基础数据支撑,实现基于5G保密专网的区域用户信息安全监管。From the above content, it can be seen that the multi-park wireless private network security protection method provided by this application is aimed at special industries. The work content and nature of different positions have different permissions to access different information, and key confidential information also needs to be kept confidential for employees with different confidentiality levels. Many users in special industries divide the park into: "production area", "office management area", "R&D area", etc. The confidentiality level of each area is different and adapted to the different confidentiality levels of employees; in order to avoid intentional or unintentional entry into confidential areas that do not match the employees, and to avoid the risk of core data leakage. This application focuses on the regional positioning of 5G terminal users, providing special industry managers with a specific area user identification system and business analysis and identification, while recording each user's trajectory and business services, providing basic data support for park security audits, and realizing regional user information security supervision based on 5G confidential private networks.

本申请的实施例提供一种网关设备,该网关设备可以应用于图1对应的实施例提供的一种多园区的无线专网安全防护方法中,参照图20所示,该多园区的无线专网安全防护装置900包括:An embodiment of the present application provides a gateway device, which can be applied to a multi-campus wireless private network security protection method provided in the embodiment corresponding to FIG. 1. As shown in FIG. 20, the multi-campus wireless private network security protection device 900 includes:

获得模块901,用于获得多个分支节点针对无线专网信令面接口的信令流程交互的全量用户话单数据;多个分支节点对应于不同的园区或厂区;The acquisition module 901 is used to obtain the full amount of user call list data of the signaling process interaction of multiple branch nodes for the wireless private network signaling interface; the multiple branch nodes correspond to different parks or factory areas;

处理模块902,用于基于全量用户话单数据对多分支节点进行安全协同管理,生成无线专网安全防护信息。The processing module 902 is used to perform security collaborative management of multiple branch nodes based on the full amount of user call record data and generate wireless private network security protection information.

本申请一些实施例中,获得模块901,用于接收每个分支节点下沉式部署的用户面采集解析设备,针对信令流程上报给中心节点的数据合成服务器的用户面数据;In some embodiments of the present application, the obtaining module 901 is used to receive the user plane data of the data synthesis server reported to the central node by the user plane collection and analysis device deployed in a sinking manner at each branch node for the signaling process;

处理模块902,用于通过中心节点的控制面解析设备对每个分支节点的控制面数据解析,生成控制面用户话单;Processing module 902, configured to parse the control plane data of each branch node through the control plane parsing device of the central node to generate a control plane user call list;

处理模块902,用于通过数据合成服务器对控制面用户话单和用户面数据进行关联处理,得到全量用户话单数据。The processing module 902 is used to associate the control plane user call record and the user plane data through the data synthesis server to obtain the full amount of user call record data.

本申请一些实施例中,处理模块902,用于对全量用户话单数据进行统一归档,以生成关系型数据库;基于关系型数据库,生成无线专网安全防护信息。In some embodiments of the present application, the processing module 902 is used to uniformly archive all user call record data to generate a relational database; and generate wireless private network security protection information based on the relational database.

本申请一些实施例中,处理模块902,用于基于关系型数据库,执行用户行为分析、敏感区域位置信息分析、终端入网异常离线数据分析中的至少一种安全防护分析,得到无线专网安全防护信息。In some embodiments of the present application, the processing module 902 is used to perform at least one security protection analysis of user behavior analysis, sensitive area location information analysis, and terminal network access abnormal offline data analysis based on a relational database to obtain wireless private network security protection information.

本申请一些实施例中,无线专网安全防护信息包括:对终端入网异常离线数据分析得到的终端错误分析信息;其中,终端错误分析信息中的错误类型包括用户注册、认证错误,服务请求及建立异常错误。In some embodiments of the present application, wireless private network security protection information includes: terminal error analysis information obtained by analyzing abnormal offline data of terminal network access; wherein, the error types in the terminal error analysis information include user registration, authentication errors, service requests and establishment abnormal errors.

本申请一些实施例中,处理模块902,用于通过无线专网的核心网基于终端错误类型,对终端执行相应的安全防护管理操作。In some embodiments of the present application, the processing module 902 is used to perform corresponding security protection management operations on the terminal based on the terminal error type through the core network of the wireless private network.

本申请一些实施例中,全量用户话单数据包括无线专网的至少两个基站测量的和/或特定区域中待测终端上报的终端侧的无线信号关联参数;处理模块,用于基于无线信号关联参数,建立待测终端与至少两个基站之间的关联关系;基于关联关系,识别特定区域中待测终端的位置;其中,无线专网安全防护信息包括特定区域中待测终端的位置。In some embodiments of the present application, the full user call record data includes wireless signal association parameters on the terminal side measured by at least two base stations of the wireless private network and/or reported by the terminal to be tested in a specific area; a processing module is used to establish an association relationship between the terminal to be tested and at least two base stations based on the wireless signal association parameters; based on the association relationship, identify the location of the terminal to be tested in the specific area; wherein the wireless private network security protection information includes the location of the terminal to be tested in the specific area.

本申请一些实施例中,处理模块902,用于基于无线信号关联参数,得到至少两个基站中每两个基站之间接收待测终端的上行探测参考信号的时间差;In some embodiments of the present application, the processing module 902 is used to obtain a time difference between each two base stations in at least two base stations in receiving an uplink sounding reference signal of the terminal to be tested based on the wireless signal association parameter;

获得模块901,用于获得待测终端的信号到达每两个基站的对应时间;其中,关联关系包括时间差和每两个基站中每一基站的对应时间;The obtaining module 901 is used to obtain the corresponding time when the signal of the terminal to be tested reaches each two base stations; wherein the association relationship includes the time difference and the corresponding time of each base station in each two base stations;

处理模块902,用于基于时间差、每两个基站中每一基站的对应时间、每一基站的位置和光速,确定待测终端的位置。The processing module 902 is used to determine the position of the terminal to be measured based on the time difference, the corresponding time of each base station in every two base stations, the position of each base station and the speed of light.

本申请一些实施例中,全量用户话单数据还包括业务话单数据,处理模块,用于基于待测终端的位置和业务话单数据,对特定区域中用户的应用服务许可进行评估,生成评估结果。In some embodiments of the present application, the full user call bill data also includes business call bill data, and the processing module is used to evaluate the application service license of users in a specific area based on the location of the terminal to be tested and the business call bill data, and generate an evaluation result.

需要说明的是,本实施例中与其它实施例中相同步骤和相同内容的说明,可以参照其它实施例中的描述,此处不再赘述。It should be noted that, for the description of the same steps and the same contents in this embodiment as those in other embodiments, reference can be made to the description in other embodiments and will not be repeated here.

本申请的实施例提供一种无线专网的中心节点,该无线专网的中心节点1000可以应用于图1对应的实施例提供的一种多园区的无线专网安全防护方法中,参照图21所示,该无线专网的中心节点包括:处理器1001、存储器1002和通信总线1003,其中:通信总线1003用于实现处理器1001和存储器1002之间的通信连接;The embodiment of the present application provides a central node of a wireless private network. The central node 1000 of the wireless private network can be applied to a multi-campus wireless private network security protection method provided in the embodiment corresponding to FIG. 1 . As shown in FIG. 21 , the central node of the wireless private network includes: a processor 1001, a memory 1002, and a communication bus 1003, wherein: the communication bus 1003 is used to realize the communication connection between the processor 1001 and the memory 1002;

处理器1001用于执行存储器1002中存储的云服务的接入程序,以实现以下步骤:The processor 1001 is used to execute the cloud service access program stored in the memory 1002 to implement the following steps:

获得多个分支节点针对无线专网信令面接口的信令流程交互的全量用户话单数据;多个分支节点对应于不同的园区或厂区;Obtain the full amount of user call list data of the signaling process interaction of multiple branch nodes for the wireless private network signaling interface; multiple branch nodes correspond to different parks or factory areas;

基于全量用户话单数据对多分支节点进行安全协同管理,生成无线专网安全防护信息。Based on the full amount of user call record data, multi-branch nodes are managed in a secure and collaborative manner to generate wireless private network security protection information.

本申请一些实施例中,处理器1001用于执行存储器1002中存储的云服务的接入程序,以实现以下步骤:接收每个分支节点下沉式部署的用户面采集解析设备,针对信令流程上报给中心节点的数据合成服务器的用户面数据;通过中心节点的控制面解析设备对每个分支节点的控制面数据解析,生成控制面用户话单;通过数据合成服务器对控制面用户话单和用户面数据进行关联处理,得到全量用户话单数据。In some embodiments of the present application, the processor 1001 is used to execute the access program of the cloud service stored in the memory 1002 to implement the following steps: receiving the user plane collection and analysis device deployed in a sinking manner at each branch node, and reporting the user plane data of the data synthesis server of the central node for the signaling process; parsing the control plane data of each branch node through the control plane analysis device of the central node to generate a control plane user call list; and associating the control plane user call list and the user plane data through the data synthesis server to obtain the full amount of user call list data.

本申请一些实施例中,处理器1001用于执行存储器1002中存储的云服务的接入程序,以实现以下步骤:对全量用户话单数据进行统一归档,以生成关系型数据库;基于关系型数据库,生成无线专网安全防护信息。In some embodiments of the present application, the processor 1001 is used to execute the access program of the cloud service stored in the memory 1002 to implement the following steps: uniformly archiving all user call record data to generate a relational database; and generating wireless private network security protection information based on the relational database.

本申请一些实施例中,处理器1001用于执行存储器1002中存储的云服务的接入程序,以实现以下步骤:基于关系型数据库,执行用户行为分析、敏感区域位置信息分析、终端入网异常离线数据分析中的至少一种安全防护分析,得到无线专网安全防护信息。In some embodiments of the present application, the processor 1001 is used to execute the access program of the cloud service stored in the memory 1002 to implement the following steps: based on the relational database, perform at least one security protection analysis of user behavior analysis, sensitive area location information analysis, and terminal network access abnormal offline data analysis to obtain wireless private network security protection information.

本申请一些实施例中,无线专网安全防护信息包括:对终端入网异常离线数据分析得到的终端错误分析信息;其中,终端错误分析信息中的错误类型包括用户注册、认证错误,服务请求及建立异常错误。In some embodiments of the present application, wireless private network security protection information includes: terminal error analysis information obtained by analyzing abnormal offline data of terminal network access; wherein, the error types in the terminal error analysis information include user registration, authentication errors, service requests and establishment abnormal errors.

本申请一些实施例中,处理器1001用于执行存储器1002中存储的云服务的接入程序,以实现以下步骤:通过无线专网的核心网基于终端错误类型,对终端执行相应的安全防护管理操作。In some embodiments of the present application, the processor 1001 is used to execute the access program of the cloud service stored in the memory 1002 to implement the following steps: performing corresponding security protection management operations on the terminal based on the terminal error type through the core network of the wireless private network.

本申请一些实施例中,全量用户话单数据包括无线专网的至少两个基站测量的和/或特定区域中待测终端上报的终端侧的无线信号关联参数,处理器1001用于执行存储器1002中存储的云服务的接入程序,以实现以下步骤:In some embodiments of the present application, the full user call list data includes wireless signal associated parameters on the terminal side measured by at least two base stations of the wireless private network and/or reported by the terminal to be tested in a specific area, and the processor 1001 is used to execute the access program of the cloud service stored in the memory 1002 to implement the following steps:

基于无线信号关联参数,建立待测终端与至少两个基站之间的关联关系;Establishing an association relationship between the terminal to be tested and at least two base stations based on the wireless signal association parameter;

基于关联关系,识别特定区域中待测终端的位置;其中,无线专网安全防护信息包括特定区域中待测终端的位置。Based on the association relationship, the location of the terminal to be tested in the specific area is identified; wherein the wireless private network security protection information includes the location of the terminal to be tested in the specific area.

本申请一些实施例中,处理器1001用于执行存储器1002中存储的云服务的接入程序,以实现以下步骤:基于无线信号关联参数,得到至少两个基站中每两个基站之间接收待测终端的上行探测参考信号的时间差;In some embodiments of the present application, the processor 1001 is used to execute the access program of the cloud service stored in the memory 1002 to implement the following steps: based on the wireless signal association parameter, obtain the time difference of receiving the uplink sounding reference signal of the terminal to be tested between each two base stations in at least two base stations;

获得待测终端的信号到达每两个基站的对应时间;其中,关联关系包括时间差和每两个基站中每一基站的对应时间;Obtaining the corresponding time when the signal of the terminal to be tested reaches each two base stations; wherein the association relationship includes the time difference and the corresponding time of each of the two base stations;

基于时间差、每两个基站中每一基站的对应时间、每一基站的位置和光速,确定待测终端的位置。The position of the terminal to be measured is determined based on the time difference, the corresponding time of each of the two base stations, the position of each base station and the speed of light.

本申请一些实施例中,全量用户话单数据还包括业务话单数据,处理器1001用于执行存储器1002中存储的云服务的接入程序,以实现以下步骤:基于待测终端的位置和业务话单数据,对特定区域中用户的应用服务许可进行评估,生成评估结果。In some embodiments of the present application, the full user call bill data also includes business call bill data, and the processor 1001 is used to execute the access program of the cloud service stored in the memory 1002 to implement the following steps: based on the location of the terminal to be tested and the business call bill data, the application service license of the user in the specific area is evaluated to generate an evaluation result.

需要说明的是,本实施例中与其它实施例中相同步骤和相同内容的说明,可以参照其它实施例中的描述,此处不再赘述。It should be noted that, for the description of the same steps and the same contents in this embodiment as those in other embodiments, reference can be made to the description in other embodiments and will not be repeated here.

本申请的实施例提供一种计算机存储介质,该计算机存储介质存储有一个或者多个程序,该一个或者多个程序可被一个或者多个处理器执行,以实现如下步骤:An embodiment of the present application provides a computer storage medium, which stores one or more programs. The one or more programs can be executed by one or more processors to implement the following steps:

获得多个分支节点针对无线专网信令面接口的信令流程交互的全量用户话单数据;多个分支节点对应于不同的园区或厂区;Obtain the full amount of user call list data of the signaling process interaction of multiple branch nodes for the wireless private network signaling interface; multiple branch nodes correspond to different parks or factory areas;

基于全量用户话单数据对多分支节点进行安全协同管理,生成无线专网安全防护信息。Based on the full amount of user call record data, multi-branch nodes are managed in a secure and collaborative manner to generate wireless private network security protection information.

本申请一些实施例中,该一个或者多个程序可被一个或者多个处理器执行,以实现如下步骤:接收每个分支节点下沉式部署的用户面采集解析设备,针对信令流程上报给中心节点的数据合成服务器的用户面数据;通过中心节点的控制面解析设备对每个分支节点的控制面数据解析,生成控制面用户话单;通过数据合成服务器对控制面用户话单和用户面数据进行关联处理,得到全量用户话单数据。In some embodiments of the present application, the one or more programs may be executed by one or more processors to implement the following steps: receiving user plane collection and analysis equipment deployed in a sinking manner at each branch node, and reporting user plane data of the data synthesis server of the central node for the signaling process; parsing the control plane data of each branch node through the control plane analysis equipment of the central node to generate a control plane user call list; and associating the control plane user call list and the user plane data through the data synthesis server to obtain the full amount of user call list data.

本申请一些实施例中,该一个或者多个程序可被一个或者多个处理器执行,以实现如下步骤:对全量用户话单数据进行统一归档,以生成关系型数据库;In some embodiments of the present application, the one or more programs may be executed by one or more processors to implement the following steps: uniformly archiving all user call record data to generate a relational database;

基于关系型数据库,生成无线专网安全防护信息。Generate wireless private network security protection information based on relational database.

本申请一些实施例中,该一个或者多个程序可被一个或者多个处理器执行,以实现如下步骤:基于关系型数据库,执行用户行为分析、敏感区域位置信息分析、终端入网异常离线数据分析中的至少一种安全防护分析,得到无线专网安全防护信息。In some embodiments of the present application, the one or more programs may be executed by one or more processors to implement the following steps: based on a relational database, perform at least one security protection analysis of user behavior analysis, sensitive area location information analysis, and terminal network access abnormal offline data analysis to obtain wireless private network security protection information.

本申请一些实施例中,无线专网安全防护信息包括:对终端入网异常离线数据分析得到的终端错误分析信息;其中,终端错误分析信息中的错误类型包括用户注册、认证错误,服务请求及建立异常错误。In some embodiments of the present application, wireless private network security protection information includes: terminal error analysis information obtained by analyzing abnormal offline data of terminal network access; wherein, the error types in the terminal error analysis information include user registration, authentication errors, service requests and establishment abnormal errors.

本申请一些实施例中,该一个或者多个程序可被一个或者多个处理器执行,以实现如下步骤:通过无线专网的核心网基于终端错误类型,对终端执行相应的安全防护管理操作。In some embodiments of the present application, the one or more programs may be executed by one or more processors to implement the following steps: performing corresponding security protection management operations on the terminal based on the terminal error type through the core network of the wireless private network.

本申请一些实施例中,全量用户话单数据包括无线专网的至少两个基站测量的和/或特定区域中待测终端上报的终端侧的无线信号关联参数;该一个或者多个程序可被一个或者多个处理器执行,以实现如下步骤:基于无线信号关联参数,建立待测终端与至少两个基站之间的关联关系;基于关联关系,识别特定区域中待测终端的位置;其中,无线专网安全防护信息包括特定区域中待测终端的位置。In some embodiments of the present application, the full user call record data includes wireless signal association parameters on the terminal side measured by at least two base stations of the wireless private network and/or reported by the terminal to be tested in a specific area; the one or more programs can be executed by one or more processors to implement the following steps: based on the wireless signal association parameters, establishing an association relationship between the terminal to be tested and at least two base stations; based on the association relationship, identifying the location of the terminal to be tested in the specific area; wherein, the wireless private network security protection information includes the location of the terminal to be tested in the specific area.

本申请一些实施例中,该一个或者多个程序可被一个或者多个处理器执行,以实现如下步骤:基于无线信号关联参数,得到至少两个基站中每两个基站之间接收待测终端的上行探测参考信号的时间差;In some embodiments of the present application, the one or more programs may be executed by one or more processors to implement the following steps: based on the wireless signal association parameter, obtaining a time difference between at least two base stations in receiving an uplink sounding reference signal of the terminal to be tested between each two base stations;

获得待测终端的信号到达每两个基站的对应时间;其中,关联关系包括时间差和每两个基站中每一基站的对应时间;Obtaining the corresponding time when the signal of the terminal to be tested reaches each two base stations; wherein the association relationship includes the time difference and the corresponding time of each of the two base stations;

基于时间差、每两个基站中每一基站的对应时间、每一基站的位置和光速,确定待测终端的位置。The position of the terminal to be measured is determined based on the time difference, the corresponding time of each of the two base stations, the position of each base station and the speed of light.

本申请一些实施例中,全量用户话单数据还包括业务话单数据,该一个或者多个程序可被一个或者多个处理器执行,以实现如下步骤:In some embodiments of the present application, the full amount of user call record data also includes service call record data, and the one or more programs may be executed by one or more processors to implement the following steps:

基于待测终端的位置和业务话单数据,对特定区域中用户的应用服务许可进行评估,生成评估结果。Based on the location of the terminal to be tested and the service call record data, the application service license of the user in the specific area is evaluated and the evaluation result is generated.

需要说明的是,本实施例中与其它实施例中相同步骤和相同内容的说明,可以参照其它实施例中的描述,此处不再赘述。It should be noted that, for the description of the same steps and the same contents in this embodiment as those in other embodiments, reference can be made to the description in other embodiments and will not be repeated here.

需要说明的是,上述计算机存储介质/存储器可以是只读存储器(Read OnlyMemory,ROM)、可编程只读存储器(Programmable Read-Only Memory,PROM)、可擦除可编程只读存储器(Erasable Programmable Read-Only Memory,EPROM)、电可擦除可编程只读存储器(Electrically Erasable Programmable Read-Only Memory,EEPROM)、磁性随机存取存储器(Ferromagnetic Random Access Memory,FRAM)、快闪存储器(Flash Memory)、磁表面存储器、光盘、或只读光盘(Compact Disc Read-Only Memory,CD-ROM)等存储器;也可以是包括上述存储器之一或任意组合的各种终端,如移动电话、计算机、平板设备、个人数字助理等。It should be noted that the above-mentioned computer storage medium/memory can be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), a magnetic random access memory (FRAM), a flash memory (Flash Memory), a magnetic surface memory, an optical disc, or a compact disc read-only memory (CD-ROM) and other memories; it can also be various terminals including one or any combination of the above-mentioned memories, such as mobile phones, computers, tablet devices, personal digital assistants, etc.

在本申请所提供的几个实施例中,应该理解到,所揭露的设备和方法,可以通过其它的方式实现。以上所描述的设备实施例仅仅是示意性的,例如,单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,如:多个单元或组件可以结合,或可以集成到另一个系统,或一些特征可以忽略,或不执行。另外,所显示或讨论的各组成部分相互之间的耦合、或直接耦合、或通信连接可以是通过一些接口,设备或单元的间接耦合或通信连接,可以是电性的、机械的或其它形式的。In the several embodiments provided in the present application, it should be understood that the disclosed devices and methods can be implemented in other ways. The device embodiments described above are only schematic. For example, the division of units is only a logical function division. There may be other division methods in actual implementation, such as: multiple units or components can be combined, or can be integrated into another system, or some features can be ignored or not executed. In addition, the coupling, direct coupling, or communication connection between the components shown or discussed can be through some interfaces, and the indirect coupling or communication connection of devices or units can be electrical, mechanical or other forms.

上述作为分离部件说明的单元可以是、或也可以不是物理上分开的,作为单元显示的部件可以是、或也可以不是物理单元,即可以位于一个地方,也可以分布到多个网络单元上;可以根据实际的需要选择其中的部分或全部单元来实现本实施例方案的目的。The units described above as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place or distributed on multiple network units; some or all of the units may be selected according to actual needs to achieve the purpose of the present embodiment.

另外,在本申请各实施例中的各功能单元可以全部集成在一个处理模块中,也可以是各单元分别单独作为一个单元,也可以两个或两个以上单元集成在一个单元中;上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能单元的形式实现。本领域普通技术人员可以理解:实现上述方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成,前述的程序可以存储于一计算机可读取存储介质中,该程序在执行时,执行包括上述方法实施例的步骤;而前述的存储介质包括:移动存储设备、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。In addition, all functional units in the embodiments of the present application can be integrated into one processing module, or each unit can be a separate unit, or two or more units can be integrated into one unit; the above integrated unit can be implemented in the form of hardware or in the form of hardware plus software functional units. A person of ordinary skill in the art can understand that all or part of the steps of implementing the above method embodiments can be completed by hardware related to program instructions, and the aforementioned program can be stored in a computer-readable storage medium, which, when executed, executes the steps of the above method embodiments; and the aforementioned storage medium includes: mobile storage devices, read-only memory (ROM), random access memory (RAM), disks or optical disks, and other media that can store program codes.

本申请所提供的几个方法实施例中所揭露的方法,在不冲突的情况下可以任意组合,得到新的方法实施例。The methods disclosed in several method embodiments provided in this application can be arbitrarily combined without conflict to obtain new method embodiments.

本申请所提供的几个产品实施例中所揭露的特征,在不冲突的情况下可以任意组合,得到新的产品实施例。The features disclosed in several product embodiments provided in this application can be arbitrarily combined without conflict to obtain new product embodiments.

本申请所提供的几个方法或设备实施例中所揭露的特征,在不冲突的情况下可以任意组合,得到新的方法实施例或设备实施例。The features disclosed in several method or device embodiments provided in this application can be arbitrarily combined without conflict to obtain new method embodiments or device embodiments.

以上,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以权利要求的保护范围为准。The above are only specific implementations of the present application, but the protection scope of the present application is not limited thereto. Any technician familiar with the technical field can easily think of changes or substitutions within the technical scope disclosed in the present application, which should be included in the protection scope of the present application. Therefore, the protection scope of the present application should be based on the protection scope of the claims.

Claims (11)

1.一种多园区的无线专网安全防护方法,其特征在于,应用于无线专网的中心节点,所述方法包括:1. A multi-campus wireless private network security protection method, characterized in that it is applied to the central node of the wireless private network, and the method includes: 获得多个分支节点针对无线专网信令面接口的信令流程交互的全量用户话单数据;其中,所述多个分支节点对应于不同的园区或厂区;Obtaining full user call list data of signaling process interactions of multiple branch nodes for wireless private network signaling plane interfaces; wherein the multiple branch nodes correspond to different parks or factory areas; 基于所述全量用户话单数据对多分支节点进行安全协同管理,生成无线专网安全防护信息。Based on the full amount of user call record data, multi-branch nodes are managed in a secure and collaborative manner to generate wireless private network security protection information. 2.根据权利要求1所述的方法,其特征在于,所述获得多个分支节点针对无线专网信令面接口的信令流程交互的全量用户话单数据,包括:2. The method according to claim 1, characterized in that the step of obtaining the full amount of user call record data of the signaling process interaction of multiple branch nodes for the wireless private network signaling plane interface comprises: 接收每个所述分支节点下沉式部署的用户面采集解析设备,针对所述信令流程上报给所述中心节点的数据合成服务器的用户面数据;Receiving user plane data collected and analyzed by the user plane collection and analysis device deployed in a sinking manner at each branch node, and synthesizing user plane data reported to the central node according to the signaling process; 通过所述中心节点的控制面解析设备对每个所述分支节点的控制面板数据解析,生成控制面用户话单;The control plane parsing device of the central node parses the control panel data of each branch node to generate a control plane user call list; 通过所述数据合成服务器对所述控制面用户话单和所述用户面数据进行关联处理,得到所述全量用户话单数据。The control plane user call record and the user plane data are associated with each other through the data synthesis server to obtain the full amount of user call record data. 3.根据权利要求1或2所述的方法,其特征在于,所述基于所述全量用户话单数据对多分支节点进行安全协同管理,生成无线专网安全防护信息,包括:3. The method according to claim 1 or 2, characterized in that the secure collaborative management of multiple branch nodes based on the full amount of user call list data to generate wireless private network security protection information includes: 对所述全量用户话单数据进行统一归档,以生成关系型数据库;Archiving all the user call record data in a unified manner to generate a relational database; 基于所述关系型数据库,生成所述无线专网安全防护信息。Based on the relational database, the wireless private network security protection information is generated. 4.根据权利要求3所述的方法,其特征在于,所述基于所述关系型数据库,生成所述无线专网安全防护信息,包括:4. The method according to claim 3, characterized in that the generating the wireless private network security protection information based on the relational database comprises: 基于所述关系型数据库,执行用户行为分析、敏感区域位置信息分析、终端入网异常离线数据分析中的至少一种安全防护分析,得到所述无线专网安全防护信息。Based on the relational database, at least one security protection analysis among user behavior analysis, sensitive area location information analysis, and terminal network access abnormal offline data analysis is performed to obtain the wireless private network security protection information. 5.根据权利要求4所述的方法,其特征在于,所述无线专网安全防护信息包括:对终端入网异常离线数据分析得到的终端错误分析信息;其中,所述终端错误分析信息中的错误类型包括用户注册、认证错误,服务请求及建立异常错误。5. The method according to claim 4 is characterized in that the wireless private network security protection information includes: terminal error analysis information obtained by analyzing abnormal offline data of terminal network access; wherein the error types in the terminal error analysis information include user registration, authentication errors, service requests and establishment abnormal errors. 6.根据权利要求5所述的方法,其特征在于,所述方法还包括:6. The method according to claim 5, characterized in that the method further comprises: 通过所述无线专网的核心网基于终端错误类型,对终端执行相应的安全防护管理操作。Based on the terminal error type, the core network of the wireless private network performs corresponding security protection management operations on the terminal. 7.根据权利要求1或2所述的方法,其特征在于,所述全量用户话单数据包括无线专网的至少两个基站测量的和/或特定区域中待测终端上报的终端侧的无线信号关联参数,所述基于所述全量用户话单数据对多分支节点进行安全协同管理,生成无线专网安全防护信息包括:7. The method according to claim 1 or 2, characterized in that the full user call list data includes wireless signal association parameters on the terminal side measured by at least two base stations of the wireless private network and/or reported by the terminal to be tested in a specific area, and the security collaborative management of multiple branch nodes based on the full user call list data to generate wireless private network security protection information includes: 基于所述无线信号关联参数,建立所述待测终端与至少两个基站之间的关联关系;Establishing an association relationship between the terminal to be tested and at least two base stations based on the wireless signal association parameter; 基于所述关联关系,识别所述特定区域中所述待测终端的位置;其中,所述无线专网安全防护信息包括所述特定区域中所述待测终端的位置。Based on the association relationship, the location of the terminal to be tested in the specific area is identified; wherein the wireless private network security protection information includes the location of the terminal to be tested in the specific area. 8.根据权利要求7所述的方法,其特征在于,所述基于所述关联关系,确定所述待测终端的位置,包括:8. The method according to claim 7, wherein determining the location of the terminal to be tested based on the association relationship comprises: 基于所述无线信号关联参数,得到至少两个基站中每两个基站之间接收所述待测终端的上行探测参考信号的时间差;Based on the wireless signal association parameter, obtaining a time difference between each two base stations in at least two base stations for receiving an uplink sounding reference signal of the terminal to be tested; 获得所述待测终端的信号到达所述每两个基站的对应时间;其中,所述关联关系包括所述时间差和所述每两个基站中每一基站的对应时间;Obtaining the corresponding time when the signal of the terminal to be tested reaches each of the two base stations; wherein the association relationship includes the time difference and the corresponding time of each of the two base stations; 基于所述时间差、所述每两个基站中每一基站的对应时间、所述每一基站的位置和光速,确定所述待测终端的位置。The position of the terminal to be measured is determined based on the time difference, the corresponding time of each of the two base stations, the position of each base station and the speed of light. 9.根据权利要求7或8所述的方法,其特征在于,所述全量用户话单数据还包括业务话单数据,所述基于所述关联关系,识别所述特定区域中所述待测终端的位置之后,所述方法还包括:9. The method according to claim 7 or 8, characterized in that the full amount of user call bill data also includes service call bill data, and after identifying the location of the terminal to be tested in the specific area based on the association relationship, the method further includes: 基于所述待测终端的位置和所述业务话单数据,对所述特定区域中用户的应用服务许可进行评估,生成评估结果。Based on the location of the terminal to be tested and the service call record data, the application service permission of the user in the specific area is evaluated to generate an evaluation result. 10.一种多园区的无线专网安全防护装置,其特征在于,包括:10. A multi-campus wireless private network security protection device, characterized by comprising: 获得模块,用于获得多个分支节点针对无线专网信令面接口的信令流程交互的全量用户话单数据;其中,所述多个分支节点对应于不同的园区或厂区;An acquisition module is used to obtain the full amount of user call list data of the signaling process interaction of multiple branch nodes for the wireless private network signaling interface; wherein the multiple branch nodes correspond to different parks or factory areas; 处理模块,用于基于所述全量用户话单数据对多分支节点进行安全协同管理,生成无线专网安全防护信息。The processing module is used to perform security collaborative management of multiple branch nodes based on the full amount of user call record data and generate wireless private network security protection information. 11.一种无线专网的中心节点,其特征在于,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求1至9中任一项所述的方法。11. A central node of a wireless private network, characterized in that it comprises: a processor and a memory, the memory being used to store a computer program, the processor being used to call and run the computer program stored in the memory to execute the method as described in any one of claims 1 to 9.
CN202211528805.4A 2022-11-30 2022-11-30 Multi-park wireless private network safety protection method and device and central node Pending CN118118907A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211528805.4A CN118118907A (en) 2022-11-30 2022-11-30 Multi-park wireless private network safety protection method and device and central node

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211528805.4A CN118118907A (en) 2022-11-30 2022-11-30 Multi-park wireless private network safety protection method and device and central node

Publications (1)

Publication Number Publication Date
CN118118907A true CN118118907A (en) 2024-05-31

Family

ID=91214611

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211528805.4A Pending CN118118907A (en) 2022-11-30 2022-11-30 Multi-park wireless private network safety protection method and device and central node

Country Status (1)

Country Link
CN (1) CN118118907A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119729491A (en) * 2025-02-25 2025-03-28 南京烽火星空通信发展有限公司 Signaling abstract generating method based on N11 and N16 interfaces of 5G core network
CN120104851A (en) * 2025-05-09 2025-06-06 浙江业视数智科技有限公司 A big data visualization processing method and system for smart radio and television projects

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119729491A (en) * 2025-02-25 2025-03-28 南京烽火星空通信发展有限公司 Signaling abstract generating method based on N11 and N16 interfaces of 5G core network
CN120104851A (en) * 2025-05-09 2025-06-06 浙江业视数智科技有限公司 A big data visualization processing method and system for smart radio and television projects

Similar Documents

Publication Publication Date Title
US11516239B2 (en) System, device, and method of adaptive network protection for managed internet-of-things services
US11751056B2 (en) Methods, systems, and computer readable media for 5G user equipment (UE) historical mobility tracking and security screening using mobility patterns
CN105933279B (en) system, method, apparatus, and machine-readable medium for enterprise wireless calling
CN113206814B (en) Network event processing method and device and readable storage medium
US20250031129A1 (en) SIM Whitelisting and Multi-Operator Core Networks
CN112219381A (en) Method for data analysis-based message filtering in edge nodes
US11337064B2 (en) Systems and methods for enhanced authentication techniques using network-implemented location determination
EP4055896A1 (en) Methods and apparatuses for managing compromised communication devices in a communication network
US12126658B2 (en) Security enforcement and assurance utilizing policy control framework and security enhancement of analytics function in communication network
CN118118907A (en) Multi-park wireless private network safety protection method and device and central node
US20220368521A1 (en) Systems and methods for blockchain-based secure key exchange
KR20150067037A (en) The methods and apparatuses of optimization for criteria of subscription in M2M Systems
Farsund et al. LTE for military communication—Business models and vulnerabilities
Guezguez et al. Observation-based detection of femtocell attacks in wireless mobile networks
CN116471590A (en) Terminal access method, device and authentication service function network element
Pejanović-Djurišić et al. 5g security landscape: Concept and remaining challenges
de Carvalho Macedo et al. Attacks to mobile networks using SS7 vulnerabilities: a real traffic analysis
KR20150014348A (en) The Method and system for providing customized M2M service by using personal device information
US20250119746A1 (en) Global mobile communication event ids for improved network and security operations
Gonçalves A flexible framework for rogue access point detection
US20220368524A1 (en) Systems and methods for blockchain-based secure key exchange with key escrow fallback
Ozhelvaci et al. Security for Handover and D2D Communication in 5G HetNets
Shaik Towards secure 4G and 5G access network protocols
Lopez Giron Analysis of Machine Learning Techniques to Secure 5G Networks
Ozhelvaci Secure and efficient authentication schemes for 5G heterogeneous networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination