Abstract:
Certain aspects of the present disclosure relate to methods and apparatuses for handling malicious attacks. In one aspect, the methods and apparatuses are configured to identify packets received from a malicious source based at least in part on packets received by a wireless device that change a state of the wireless device from a dormant state to a connected state, selectively disconnect the wireless device from a packet data network (PDN) by releasing a first Internet Protocol (IP) address used to connect the wireless device to the PDN when a number of packets identified as received from the malicious source reaches a threshold number within a monitoring period, and reconnect the wireless device to the PDN using a second IP address that is different from the first IP address. In another aspect, a connection to an IP Multimedia Subsystem (IMS) PDN is maintained after the PDN is disconnected.
Abstract:
A method for wireless communication by a wireless relay device comprises receiving, over a first wireless connection of a first connection type between a first wireless device and the relay device, a request to establish a connection between the first wireless device and a network via the first wireless connection and a second wireless connection of a second connection type between the relay device and the network. The method further comprises determining a priority associated with the first wireless device based on at least one parameter associated with the first wireless device. The method further comprises establishing, at the relay device, the connection between the first wireless device and the network when the priority associated with the first wireless device is higher than a priority associated with at least one of a plurality of other wireless devices having a connection with the network via the second wireless connection.
Abstract:
Certain aspects of the present disclosure relate to methods and apparatuses for handling malicious attacks. In one aspect, the methods and apparatuses are configured to identify packets received from a malicious source based at least in part on packets received by a wireless device that change a state of the wireless device from a dormant state to a connected state, selectively disconnect the wireless device from a packet data network (PDN) by releasing a first Internet Protocol (IP) address used to connect the wireless device to the PDN when a number of packets identified as received from the malicious source reaches a threshold number within a monitoring period, and reconnect the wireless device to the PDN using a second IP address that is different from the first IP address. In another aspect, a connection to an IP Multimedia Subsystem (IMS) PDN is maintained after the PDN is disconnected.