Font Size: a A A

The Design And Implementation Of A NEL-Based GTP Analysis And Monitoring System

Posted on:2010-02-01Degree:MasterType:Thesis
Country:ChinaCandidate:Z H KangFull Text:PDF
GTID:2218330368499625Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the 3rd Generation network evolution and business developments, the network security has gained more and more attention from business circles. However, the protocol security of GTP, which is one of the most important bearing protocols for 3G core network, has not been taken into account when designed, this has greatly exacerbated the vulnerability of 3G core network. So it is important to study the GTP protocol and its security protection technologies, and then put forward effective and comprehensive solutions.First, the characteristics, application scenarios and security problems of GTP protocol were analyzed. On this basis, according to the features of NEL language, a GTP protocol analysis and monitoring soulution based on NEL has been proposed, and the prototype system has been implemented. The system can filter abnormal packets, monitor and maintain the GTP tunnels, filter packets according to the users' requirements, control user access, and monitor and control the network traffic. A test environment has been set up, and the prototype system is tested using a variety of testing tools, such as GTP Tester, which simulate different attack scenarios. The test results show that the NEL-based GTP protocol analysis and monitoring solution can effectively analysis and detect GTP packets, control user access and network traffic. The results also show that the prototype system could meet the security needs of GTP protocol.This work is supported by the National Natural Science Foundation of China.
Keywords/Search Tags:GTP, Protocol analysis, Anomaly detection, Message filter, Flow control
PDF Full Text Request
Related items