MESH COMMUNICATION NETWORK PROVISION

    公开(公告)号:US20220078087A1

    公开(公告)日:2022-03-10

    申请号:US17435362

    申请日:2020-02-26

    发明人: Robert GRANT

    IPC分类号: H04L12/24 H04L12/26

    摘要: A method of provisioning mesh communication networks is disclosed. The method involves simulating the performance of a proposed network design to ensure the proposed network design meets service level criteria before provisioning a network in accordance with the proposed network design. Such simulations are required to be comprehensive because highly improbable events can be sufficient to result in a mesh network not meeting the stringent performance criteria which such networks are required to meet. Known methods of provisioning rely on exhaustively listing the mesh network states which would adversely impact the service offered by a proposed network design as part of simulating the performance of the proposed network design—this is an error prone exercise since relevant network states can be missed. A simulation technique is proposed in which the network state after each event is represented by a weighted graph indicating a measure of path cost for each of the links in the mesh network. A graph searching algorithm is applied to seek a path across the graph, thereby systematically exploring paths over mesh network which could provide a suitable route for the service in the simulated network state represented in the graph. Networks are thus provisioned which meet stringent performance criteria without being over-engineered.

    THREAT FORECASTING
    33.
    发明申请

    公开(公告)号:US20220060485A1

    公开(公告)日:2022-02-24

    申请号:US17417571

    申请日:2019-12-11

    发明人: Xiao-Si WANG Zhan CUI

    IPC分类号: H04L29/06

    摘要: A computer implemented method of protecting a network of computer systems, the method comprising: receiving security data for the network, the security data comprising threat event data for threat events detected within the network over a period of time; extracting, from the received security data, one or more features indicative of a computer system being compromised by a particular threat; generating a forecast of a number of computer systems in the network compromised by the particular threat at a future point in time based on the one or more features; determining whether action should be taken to mitigate the particular threat based on the forecast; and in response to determining that action should be taken, causing one or more predetermined actions to be taken to mitigate the particular threat.

    PACKET ANALYSIS AND FILTERING
    34.
    发明申请

    公开(公告)号:US20220060448A1

    公开(公告)日:2022-02-24

    申请号:US17309769

    申请日:2019-12-18

    发明人: Catherine WHITE

    IPC分类号: H04L29/06

    摘要: A network device detecting possible malicious traffic and enlists the help of a co-operative group of downstream routers to perform enhanced deep packet analysis and firewalling in parallel with the transport of the packet through the network. The routers may also use other remote computational resource to perform some of the analysis along or close to the route 80 of the packet through the network. The packets are cached at the exit edge router, which does not release the packet from the cooperative group until all analyzers report the traffic is safe, or deletes the traffic if identified as malicious. By buffering at the remote end the packet can be forwarded promptly if approved, but protects downstream components if the traffic is malicious. Routing policies through the network are chosen according to initial estimates of the likelihood that a packet will be permitted to be forwarded from the downstream router, and of the time likely to be taken to reach a decision, allowing cache capacity requirements to be minimized by using higher-latency routes for packets unlikely to be forwarded promptly.

    Authentication of data transmission devices

    公开(公告)号:US11206260B2

    公开(公告)日:2021-12-21

    申请号:US16067203

    申请日:2017-01-05

    摘要: An intermediate data transmission device arranges for mutual authentication between itself and a remote terminal to allow data to be exchanged between the remote terminal and a server through the device. The server sends first and second key codes to the intermediate device, the key codes both being derived from a shared secret known to the server and remote terminal but not to the intermediate device. In response to a challenge from the intermediate device the remote terminal uses the shared secret to generate a duplicate of the first key code and transmits the duplicate to the intermediate device. The intermediate device compares the first key code and the duplicate of the first key code received respectively from the server and the remote terminal to verify the authenticity of the remote terminal. The intermediate device then transmits the second key code to the remote terminal, to be compared by the remote terminal with a duplicate of the second key code to verify the authenticity of the intermediate device. This process allows the intermediate device to be used without itself having the shared secret. The codes generated by the server may be encoded with a network identity of the intermediate device using the shared secret, such that the remote terminal can only respond to the same intermediate device that transmitted the codes. This prevents a “man-in-the middle” attack by another intermediate device, as without the shared secret no intermediate device can modify the codes to include a different network identity.

    Malicious software identification
    36.
    发明授权

    公开(公告)号:US11201876B2

    公开(公告)日:2021-12-14

    申请号:US16065482

    申请日:2016-12-15

    摘要: A computer implemented method to identify malicious software in a computer system includes receiving an indication of a detection of malicious network traffic communicated via a computer network accessed by the computer system; identifying a software component involved in the malicious network traffic at the computer system; evaluating a measure of a correlation fractal dimension (CFD) for at least a portion of the software component; and storing the measure of CFD for subsequent comparison with a second measure of CFD for a corresponding portion of a second software component in the computer system to identify the second software component as a software component involved in malicious network communication.

    Processing local area network diagnostic data

    公开(公告)号:US11196649B2

    公开(公告)日:2021-12-07

    申请号:US17250243

    申请日:2019-06-21

    IPC分类号: H04L12/26

    摘要: Methods and apparatus are disclosed for processing local area network diagnostic data obtained in respect of a local area network (LAN). The method includes identifying, from local area network diagnostic data obtained in respect of the LAN, a set of data units including a first and an associated second data unit having a predetermined relationship; updating the first data unit of the set to include an indication that the associated second data unit of the set has been identified; and sending the updated first data unit without the associated second data unit from the LAN for performance analysis at a remote network diagnostic device outside the LAN.

    Telecommunications network
    39.
    发明授权

    公开(公告)号:US11171855B2

    公开(公告)日:2021-11-09

    申请号:US16494179

    申请日:2018-02-09

    IPC分类号: H04L12/26 H04L12/24

    摘要: A method of dimensioning a link in a telecommunications network, and a device for implementing the method, the method including determining, for a first plurality of sets of traffic observations, wherein each set of the first plurality of sets includes a series of traffic observations each indicating the amount of traffic on a link within an observation interval of a particular duration for that set, a peak value of a traffic observation of the series of traffic observations within each set of the first plurality of sets and an average value of the series of traffic observations within each set of the first plurality of sets; calculating a first peak to average ratio for each observation interval duration based on the determined peak and average values within each set of the first plurality of sets; determining a goodness of fit value for a power function of the first peak to average ratio against its respective observation interval duration; selecting a dimensioning interval duration based on the determined goodness of fit value; and estimating a capacity of the link based on the selected dimensioning interval duration.

    CELLULAR TELECOMMUNICATIONS NETWORK

    公开(公告)号:US20210337440A1

    公开(公告)日:2021-10-28

    申请号:US17250978

    申请日:2019-09-06

    IPC分类号: H04W36/00 H04W36/38 H04W72/04

    摘要: This disclosure relates to a method in a cellular telecommunications network, the cellular telecommunications network having a plurality of base stations each having at least one transmitter, each transmitter having at least one coverage area, the method including a first transmitter operating in a first state so as to transmit within a first coverage area according to a first cellular communications protocol only; receiving a request for service according to a second cellular communications protocol in the first coverage area; and, in response, the first transmitter operating in a second state so as to transmit within the first coverage area according to both the first cellular communications protocol and a second cellular communications protocol, wherein the second cellular communications protocol is an older generation than the first cellular communications protocol.