Intra-Carrier And Inter-Carrier Network Security System
    3.
    发明申请
    Intra-Carrier And Inter-Carrier Network Security System 审中-公开
    载波内和运营商间网络安全系统

    公开(公告)号:US20170034220A1

    公开(公告)日:2017-02-02

    申请号:US14812656

    申请日:2015-07-29

    Abstract: A system and method for identifying distributed attacks, such as, but not limited to, distributed denial of service attacks and botnet attacks, in a first network serviced by a first carrier and configured to alert a second network serviced by a second carrier that is different from the first carrier is disclosed. Once an attack has been identified, an attack alert is generated and provided to the second network or other aspects of the first network, or both. The attack alerts may be distributed dynamically with the second network via diameter based security protocol Rs. Such system and method may mitigate distributed malicious attacks by sharing destination internet protocol and bad international mobile subscriber identity information across carriers.

    Abstract translation: 一种用于在由第一载体服务的第一网络中识别分布式攻击(例如但不限于分布式拒绝服务攻击和僵尸网络攻击)的系统和方法,并且被配置为警告由第二载体所服务的不同的第二网络 从第一载波公开。 一旦已经识别出攻击,就会生成攻击警报并将其提供给第二个网络或第一个网络的其他方面,或者两者。 攻击警报可以通过基于直径的安全协议Rs与第二网络动态分布。 这样的系统和方法可以通过跨运营商共享目的地互联网协议和不良的国际移动用户身份信息来减轻分布式恶意攻击。

    Scrubbed Internet Protocol Domain for Enhanced Cloud Security

    公开(公告)号:US20230024436A1

    公开(公告)日:2023-01-26

    申请号:US17956930

    申请日:2022-09-30

    Abstract: Concepts and technologies directed to scrubbed internet protocol domain for enhanced cloud security are disclosed herein. In various aspects, a system can include a processor and memory storing instructions that, upon execution, cause performance of operations. The operations can include exposing an application to a service provider network that provides an internet connection, where the application is provided by a datacenter that communicates with the service provider network. The operations can include monitoring traffic flows to the application during an observation time period, where the traffic flows include probe traffic that attempts to reach the application. The operations can include constructing a scrubbed internet protocol domain such that detected probe traffic is prevented from reaching a plurality of virtual machines provided by the datacenter.

    METHOD AND APPARATUS FOR MANAGING COMMUNICATION ROUTINGS IN A COMMUNICATION SYSTEM

    公开(公告)号:US20200162994A1

    公开(公告)日:2020-05-21

    申请号:US16193379

    申请日:2018-11-16

    Abstract: Aspects of the subject disclosure may include, for example, determining a first access point name according to a first service set identifier associated with a first wireless message transmitted according to a first wireless protocol from a first device, where the first access point name is included in a set of access point names of a cellular communication system, and transmitting a second wireless message according to a second wireless protocol to a communication node of a guided wave communication system, where the guided wave communication system is communicatively coupled to the cellular communication system, where the second wireless message is associated with the first wireless message and includes the first access point name, and where the cellular communication system determines a first routing of first communications associated with the first device according to first access point name. Other embodiments are disclosed.

    Intra-carrier and inter-carrier network security system

    公开(公告)号:US10547647B2

    公开(公告)日:2020-01-28

    申请号:US16260315

    申请日:2019-01-29

    Abstract: A system and method for identifying distributed attacks, such as, but not limited to, distributed denial of service attacks and botnet attacks, in a first network serviced by a first carrier and configured to alert a second network serviced by a second carrier that is different from the first carrier is disclosed. Once an attack has been identified, an attack alert is generated and provided to the second network or other aspects of the first network, or both. The attack alerts may be distributed dynamically with the second network via diameter based security protocol Rs. Such system and method may mitigate distributed malicious attacks by sharing destination internet protocol and bad international mobile subscriber identity information across carriers.

    Insider Attack Resistant System and Method for Cloud Services Integrity Checking

    公开(公告)号:US20200053107A1

    公开(公告)日:2020-02-13

    申请号:US16658508

    申请日:2019-10-21

    Abstract: An insider attack resistant system for providing cloud services integrity checking is disclosed. In particular, the system utilizes an automated integrity checking script and virtual machines to check the integrity of a service. The system may utilize the integrity checking script and virtual machines to execute a set of operations associated with the service so as to check the integrity of the service. When executing the set of operations, the system may only have access to the minimum level of access to peripherals that is required for each operation in the set of operations to be executed. After each operation is executed, the system may log each result for each operation, and analyze each result to determine if a failure exists for any of the operations. If a failure exists, the system may determine that a change in an expected system behavior associated with the service has occurred.

Patent Agency Ranking