DENIAL OF SERVICE DETECTION AND MITIGATION IN A MULTI-ACCESS EDGE COMPUTING ENVIRONMENT

    公开(公告)号:US20210306372A1

    公开(公告)日:2021-09-30

    申请号:US16830694

    申请日:2020-03-26

    Abstract: A device includes a processor and a memory. The processor effectuates operations including monitoring enterprise network traffic associated with one or more user equipment (UE). The processor further effectuates operations including comparing the enterprise network traffic to a UE profile associated with each of the one or more UE. The processor further effectuates operations including determining whether the comparison indicates that a predetermined threshold has been exceeded. The processor further effectuates operations including in response to the indication that the predetermined threshold has been exceeded, generating an alert, wherein exceeding the predetermined threshold is indicative of a denial of service attack on an enterprise network or an attempt to remove enterprise data via the one or more UE.

    INCREASING BLADE UTILIZATION IN A DYNAMIC VIRTUAL ENVIRONMENT

    公开(公告)号:US20200034173A1

    公开(公告)日:2020-01-30

    申请号:US16047571

    申请日:2018-07-27

    Abstract: Mobility service providers and others can use cloud platforms to meet customer demand Due to changing demand or changing technology numerous issues arise. For example, server utilization within the cloud platform can become less efficient over time. As another example, virtual machines and virtual network functions processed by the cloud platform typically need to be extensively tested and certified, which can be expensive. Moreover, intra-platform communication can play a significant role in the costs to operate a cloud platform. Techniques detailed herein can address many of these issues, e.g., by providing mechanisms for increasing host or server utilization in response to changing demand, introducing a container technique for virtual machines to mitigate testing costs, and modeling bandwidth resources.

    PLACING COMPONENTS FOR A VIRTUAL RADIO ACCESS NETWORK BASED ON RESOURCE AVAILABILITY AND PERFORMANCE

    公开(公告)号:US20240040394A1

    公开(公告)日:2024-02-01

    申请号:US17875252

    申请日:2022-07-27

    CPC classification number: H04W16/18

    Abstract: The technologies described herein are generally directed to placing edge hub equipment for virtual radio access networks based on resource availability and performance in advanced networks, such as a fifth generation (5G) network or other next generation networks. For example, a method described herein can include receiving a request to select, for deployment of hub equipment, between site locations, with the deployment of the hub equipment being to connect, in a fronthaul segment, radio unit equipment of the network at a radio location to a backhaul connection equipment. The method can further include, based on the request, the radio location, and the backhaul location, comparing a characteristic of the site locations. Further, the method can include responding to the request with a selected site location that was selected based on a result of the comparing.

    FACILITATION OF PROTECTION FROM 5G OR OTHER NEXT GENERATION NETWORK USER EQUIPMENT DENIAL OF SERVICE ATTACKS

    公开(公告)号:US20220377558A1

    公开(公告)日:2022-11-24

    申请号:US17326130

    申请日:2021-05-20

    Abstract: Misconfigured user equipment (UE) can cause additional traffic generation to server devices (e.g., 911 server device) and overload the server devices. Thus, detecting these UEs and blocking them before they hit the application servers in the mobility network can be facilitated via an identification and blocking approach. The system can comprise an identification correlator that can correlate S1 interface application protocol identification (S1-APID) associated with the UE to an international mobile subscriber identity (IMSI) of the UE. When the identification correlator collects data feeds from a network, the identification correlator can share this data with a call data record engine to determine if the UE is a misconfigured UE and prompt the network core to drop/block the misconfigured UE from a communication.

    DETECTION AND MITIGATION OF MALICIOUS WIRELESS DEVICES

    公开(公告)号:US20210352484A1

    公开(公告)日:2021-11-11

    申请号:US16870250

    申请日:2020-05-08

    Abstract: The present disclosure describes detection and mitigation of malicious wireless devices, in a wireless communication network including a radio access network (RAN) and a core network (CN), in a manner for selectively preventing the malicious wireless devices from using the wireless communication network based on identification of the malicious wireless devices in the wireless communication network. In one example, detection and mitigation of malicious wireless devices may include detecting a malicious wireless device based on identification of malicious activity by the malicious wireless device, identifying the malicious wireless device within the RAN based on correlation of one or more CN-based identifiers of the malicious wireless device within the CN and one or more RAN-based identifiers of the malicious wireless device within the RAN, and preventing the malicious wireless device from using the wireless communication network based on the one or more RAN-based identifiers of the malicious wireless device.

Patent Agency Ranking