INTRUSION RESPONSE DETERMINATION
    22.
    发明公开

    公开(公告)号:US20240073241A1

    公开(公告)日:2024-02-29

    申请号:US18256438

    申请日:2021-11-29

    IPC分类号: H04L9/40

    CPC分类号: H04L63/1441 H04L63/1416

    摘要: An intrusion response system (IRS) can include a knowledge-based intrusion response (IR) component configured to use knowledge of prior responses to prior behavior of at least one computer system to determine a first response to behavior of a target computer system; a prediction-based IR component configured to use at least one trained machine learning (ML) model of behavior of the target computer system to predict a second response to the behavior of the target computer system; and a response component configured to determine an output response to the behavior of the target computer system based on at least one of the first response and the second response.

    Wireless telecommunications network

    公开(公告)号:US11876572B2

    公开(公告)日:2024-01-16

    申请号:US17759027

    申请日:2020-12-09

    摘要: A method of determining performance of a Radio Access Network (RAN) of a telecommunications network is disclosed in which the RAN covers an area that is divided into a plurality of unit cells. The method includes receiving a measured performance value of the RAN within at least one unit cell of the plurality of unit cells; receiving a simulated performance value of the RAN within each of the plurality of unit cells; identifying a unit cell that is associated with both a measured performance value and a simulated performance value; calculating, for the identified unit cell, a difference function between the simulated performance value and the measured performance value; and applying the difference function to the simulated performance value of at least one adjacent unit cell to the identified unit cell to determine a modified simulated performance value for the at least one adjacent unit cell.

    Computer-implemented security methods and systems

    公开(公告)号:US11856029B2

    公开(公告)日:2023-12-26

    申请号:US17346987

    申请日:2021-06-14

    IPC分类号: H04L9/40 G06F16/23 G06N20/00

    摘要: The present disclosure relates to securing networks against attacks launched via connection of peripheral devices to networked devices. According to one aspect, there is provided a computer-implemented method of automatically updating a network security policy, the method comprising: running a machine learning algorithm to continuously update a plurality of weighting coefficients associated with a respective plurality of threat factors, the threat factors each having values defined for each of a plurality of requests for respective peripheral devices to connect to one or more networked devices which are communicably coupled to a secure network; and automatically updating a security policy associated with the secure network in respect of a particular threat factor when that threat factor's associated weighting coefficient changes by more than a predetermined amount in a predetermined period, wherein requests for peripheral devices to connect to the networked devices are automatically approved or denied in dependence on that policy.

    MIMO systems
    25.
    发明授权

    公开(公告)号:US11838079B2

    公开(公告)日:2023-12-05

    申请号:US17250977

    申请日:2019-09-13

    摘要: According to the present disclosure there is provided a multiple-input-multiple-output (MIMO) transmitter for transmitting wireless communication signals over a communication channel to a receiver, the transmitter including a digital signal processor configured to perform pre-coding on a plurality Ns of data streams; a plurality NRF of radio-frequency (RF) chains each configured to pass a pre-coded data stream from the digital signal processor to generate a signal representing that data stream; a lens antenna array comprising an array of NT antenna elements; and a selecting unit coupled between the plurality NRF of RF chains and the lens antenna array, the selecting unit including a plurality of separate coupling units each configured to couple a respective RF chain to a selective sub-array of NTBRF antenna elements concurrently for transmitting the signal representing the data stream passed through that RF chain.

    INTERNET OF THINGS SECURITY
    26.
    发明公开

    公开(公告)号:US20230379355A1

    公开(公告)日:2023-11-23

    申请号:US18247128

    申请日:2021-09-29

    IPC分类号: H04L9/40

    摘要: A computer implemented security method for a set of internet-of-things (IoT) devices, the set of devices comprising network-connected sensors and actuators, wherein a data repository stores data about the devices, actions performable by each of the devices and one or more network attacks to which at least a subset of the devices are susceptible, the method comprising: defining, for each network attack, one or more responsive actions for the attack, each responsive action identifying one or more performable actions for performance by one or more devices to mitigate the attack; detecting a device in a compromised state, the compromised state being determined based on a threshold number of occurrences of an attack perpetrated against the device; selecting responsive actions for the perpetrated attack; and triggering the responsive actions to mitigate the perpetrated attack.

    WIRELESS TELECOMMUNICATIONS NETWORK
    29.
    发明公开

    公开(公告)号:US20230344501A1

    公开(公告)日:2023-10-26

    申请号:US18254431

    申请日:2021-10-12

    IPC分类号: H04B7/06 H04W52/14 H04W52/28

    摘要: A network node for a wireless telecommunications network, and a method of operating a network node, are disclosed. The wireless telecommunications network includes a first access point having a first transmitter configured to transmit in a first coverage area, and the method can include receiving, from a sensor, data indicative of an object within the first coverage area of the first access point's first transmitter; determining, from the data, that the object is an illegitimate user; and, in response, causing a modification of the first access point so that the object cannot successfully receive a transmission from the first transmitter.

    Security configuration determination

    公开(公告)号:US11775653B2

    公开(公告)日:2023-10-03

    申请号:US16762283

    申请日:2018-10-11

    摘要: A computer implemented method to determine a security configuration for a target virtual machine (VM) in a virtualized computing environment, the method including training a machine learning algorithm to determine a vector of security vulnerabilities for the target VM based on a vector of configuration characteristics for the target VM, the machine learning algorithm being trained using training examples each including a configuration for a training VM and an associated vulnerability vector based on an observed security occurrence at the training VM, wherein each training example further includes an identification of one of set of security configurations for the training VM; selecting at least a subset of the set of security configurations and, for each security configuration in the subset, executing the machine learning algorithm with the vector of configuration characteristics for the target VM and an identification of the security configuration, so as to generate a set of vulnerability vectors including a vulnerability vector for each security configuration in the selected subset; and selecting a security configuration for the target VM based on the set of vulnerability vectors.