-
公开(公告)号:US11588850B2
公开(公告)日:2023-02-21
申请号:US16847031
申请日:2020-04-13
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Deon Ogle , Yaron Koral , Cagatay Buyukkoc , Nicholas Arconati , Jitendra Patel , Bogdan Ungureanu
IPC: H04L9/40 , H04W12/00 , H04W12/122 , G06N20/00 , G06N5/04
Abstract: Malicious attacks by certain devices against a radio access network (RAN) can be detected and mitigated, while allowing communication of priority messages. A security management component (SMC) can determine whether a malicious attack against the RAN is occurring based on a defined baseline that indicates whether a malicious attack is occurring. The defined baseline is determined based on respective characteristics associated with respective devices that are determined based on analysis of information relating to the devices. In response to determining there is a malicious attack, SMC determines whether to block connections of devices to the RAN based on respective priority levels associated with respective messages being communicated by the devices. SMC blocks connections of devices communicating messages associated with priority levels that do not satisfy a defined threshold priority level, while managing communication connections to allow messages satisfying the defined threshold priority level to be communicated via the RAN.
-
公开(公告)号:US11477163B2
公开(公告)日:2022-10-18
申请号:US16551059
申请日:2019-08-26
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Thusitha Jayawardena , Christopher Van Wart , Leonard Russo , Nicholas Arconati , Robert Chin
IPC: H04L29/06 , H04L9/40 , H04L67/1097 , G06F9/455
Abstract: Concepts and technologies directed to scrubbed internet protocol domain for enhanced cloud security are disclosed herein. In various aspects, a system can include a processor and memory storing instructions that, upon execution, cause performance of operations. The operations can include exposing an application to a service provider network that provides an internet connection, where the application is provided by a datacenter that communicates with the service provider network. The operations can include monitoring traffic flows to the application during an observation time period, where the traffic flows include probe traffic that attempts to reach the application. The operations can include constructing a scrubbed internet protocol domain such that detected probe traffic is prevented from reaching a plurality of virtual machines provided by the datacenter.
-
公开(公告)号:US11202254B1
公开(公告)日:2021-12-14
申请号:US16944439
申请日:2020-07-31
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Tarun Chaki , Thusitha Jayawardena , Nicholas Arconati
Abstract: Aspects of the subject disclosure may include, for example, selecting, a group of International Mobile Subscriber Identities (IMSIs), selecting a group of traffic simulator devices, and provisioning each of the group of IMSIs to each of the group of traffic simulator devices. Further embodiments can include providing first instructions to a first portion of the group of traffic simulator devices. The first instructions cause the first portion of the group of traffic simulator devices to generate simulated voice traffic over a first plurality of time periods. Additional embodiments can include providing second instructions to a second portion of the group of traffic simulator devices. The second instructions cause the second portion of the group of traffic simulator devices to generate simulated data traffic over a second plurality of time periods. Other embodiments are disclosed.
-
公开(公告)号:US20210067489A1
公开(公告)日:2021-03-04
申请号:US16551059
申请日:2019-08-26
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Thusitha Jayawardena , Christopher Van Wart , Leonard Russo , Nicholas Arconati , Robert Chin
Abstract: Concepts and technologies directed to scrubbed internet protocol domain for enhanced cloud security are disclosed herein. In various aspects, a system can include a processor and memory storing instructions that, upon execution, cause performance of operations. The operations can include exposing an application to a service provider network that provides an internet connection, where the application is provided by a datacenter that communicates with the service provider network. The operations can include monitoring traffic flows to the application during an observation time period, where the traffic flows includes probe traffic that attempts to reach the application. The operations can include constructing a scrubbed internet protocol domain such that detected probe traffic is prevented from reaching a plurality of virtual machines provided by the datacenter.
-
-
-