-
公开(公告)号:US20210320944A1
公开(公告)日:2021-10-14
申请号:US16847031
申请日:2020-04-13
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Deon Ogle , Yaron Koral , Cagatay Buyukkoc , Nicholas Arconati , Jitendra Patel , Bogdan Ungureanu
Abstract: Malicious attacks by certain devices against a radio access network (RAN) can be detected and mitigated, while allowing communication of priority messages. A security management component (SMC) can determine whether a malicious attack against the RAN is occurring based on a defined baseline that indicates whether a malicious attack is occurring. The defined baseline is determined based on respective characteristics associated with respective devices that are determined based on analysis of information relating to the devices. In response to determining there is a malicious attack, SMC determines whether to block connections of devices to the RAN based on respective priority levels associated with respective messages being communicated by the devices. SMC blocks connections of devices communicating messages associated with priority levels that do not satisfy a defined threshold priority level, while managing communication connections to allow messages satisfying the defined threshold priority level to be communicated via the RAN.
-
公开(公告)号:US11588850B2
公开(公告)日:2023-02-21
申请号:US16847031
申请日:2020-04-13
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Deon Ogle , Yaron Koral , Cagatay Buyukkoc , Nicholas Arconati , Jitendra Patel , Bogdan Ungureanu
IPC: H04L9/40 , H04W12/00 , H04W12/122 , G06N20/00 , G06N5/04
Abstract: Malicious attacks by certain devices against a radio access network (RAN) can be detected and mitigated, while allowing communication of priority messages. A security management component (SMC) can determine whether a malicious attack against the RAN is occurring based on a defined baseline that indicates whether a malicious attack is occurring. The defined baseline is determined based on respective characteristics associated with respective devices that are determined based on analysis of information relating to the devices. In response to determining there is a malicious attack, SMC determines whether to block connections of devices to the RAN based on respective priority levels associated with respective messages being communicated by the devices. SMC blocks connections of devices communicating messages associated with priority levels that do not satisfy a defined threshold priority level, while managing communication connections to allow messages satisfying the defined threshold priority level to be communicated via the RAN.
-
公开(公告)号:US10681611B1
公开(公告)日:2020-06-09
申请号:US16193379
申请日:2018-11-16
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Thusitha Jayawardena , Christopher Van Wart , Donald Levy , Cristina Serban , David Gross , Deon Ogle , Shawn Hiemstra , Jayaraman Ramachandran
Abstract: Aspects of the subject disclosure may include, for example, determining a first access point name according to a first service set identifier associated with a first wireless message transmitted according to a first wireless protocol from a first device, where the first access point name is included in a set of access point names of a cellular communication system, and transmitting a second wireless message according to a second wireless protocol to a communication node of a guided wave communication system, where the guided wave communication system is communicatively coupled to the cellular communication system, where the second wireless message is associated with the first wireless message and includes the first access point name, and where the cellular communication system determines a first routing of first communications associated with the first device according to first access point name. Other embodiments are disclosed.
-
公开(公告)号:US12267336B2
公开(公告)日:2025-04-01
申请号:US17365448
申请日:2021-07-01
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Donald Levy , Jason Godfrey , Robert Kong , Deon Ogle
Abstract: Dynamic multi-network security controls are provided herein. A method can include receiving a report of malicious network traffic observed by first network equipment operating in a first communication network, where the report indicates a second communication network distinct from the first communication network as an originating network of the malicious network traffic, identifying second network equipment operating in the second communication network as a source of the malicious network traffic, and based on the identifying, blocking communications from the second network equipment for a defined time interval.
-
公开(公告)号:US20200162994A1
公开(公告)日:2020-05-21
申请号:US16193379
申请日:2018-11-16
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Thusitha Jayawardena , Christopher Van Wart , Donald Levy , Cristina Serban , David Gross , Deon Ogle , Shawn Hiemstra , Jayaraman Ramachandran
Abstract: Aspects of the subject disclosure may include, for example, determining a first access point name according to a first service set identifier associated with a first wireless message transmitted according to a first wireless protocol from a first device, where the first access point name is included in a set of access point names of a cellular communication system, and transmitting a second wireless message according to a second wireless protocol to a communication node of a guided wave communication system, where the guided wave communication system is communicatively coupled to the cellular communication system, where the second wireless message is associated with the first wireless message and includes the first access point name, and where the cellular communication system determines a first routing of first communications associated with the first device according to first access point name. Other embodiments are disclosed.
-
公开(公告)号:US11930040B2
公开(公告)日:2024-03-12
申请号:US18157914
申请日:2023-01-23
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Deon Ogle , Yaron Koral , Cagatay Buyukkoc , Nicholas Arconati , Jitendra Patel , Bogdan Ungureanu
IPC: H04L9/40 , G06N5/04 , G06N20/00 , H04W12/00 , H04W12/122
CPC classification number: H04L63/1458 , G06N5/04 , G06N20/00 , H04W12/009 , H04W12/122 , H04L2463/141
Abstract: Malicious attacks by certain devices against a radio access network (RAN) can be detected and mitigated, while allowing communication of priority messages. A security management component (SMC) can determine whether a malicious attack against the RAN is occurring based on a defined baseline that indicates whether a malicious attack is occurring. The defined baseline is determined based on respective characteristics associated with respective devices that are determined based on analysis of information relating to the devices. In response to determining there is a malicious attack, SMC determines whether to block connections of devices to the RAN based on respective priority levels associated with respective messages being communicated by the devices. SMC blocks connections of devices communicating messages associated with priority levels that do not satisfy a defined threshold priority level, while managing communication connections to allow messages satisfying the defined threshold priority level to be communicated via the RAN.
-
公开(公告)号:US20230164177A1
公开(公告)日:2023-05-25
申请号:US18157914
申请日:2023-01-23
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Deon Ogle , Yaron Koral , Cagatay Buyukkoc , Nicholas Arconati , Jitendra Patel , Bogdan Ungureanu
IPC: H04L9/40 , G06N20/00 , G06N5/04 , H04W12/00 , H04W12/122
CPC classification number: H04L63/1458 , G06N20/00 , G06N5/04 , H04W12/009 , H04W12/122 , H04L2463/141
Abstract: Malicious attacks by certain devices against a radio access network (RAN) can be detected and mitigated, while allowing communication of priority messages. A security management component (SMC) can determine whether a malicious attack against the RAN is occurring based on a defined baseline that indicates whether a malicious attack is occurring. The defined baseline is determined based on respective characteristics associated with respective devices that are determined based on analysis of information relating to the devices. In response to determining there is a malicious attack, SMC determines whether to block connections of devices to the RAN based on respective priority levels associated with respective messages being communicated by the devices. SMC blocks connections of devices communicating messages associated with priority levels that do not satisfy a defined threshold priority level, while managing communication connections to allow messages satisfying the defined threshold priority level to be communicated via the RAN.
-
公开(公告)号:US20230007018A1
公开(公告)日:2023-01-05
申请号:US17365448
申请日:2021-07-01
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Donald Levy , Jason Godfrey , Robert Kong , Deon Ogle
IPC: H04L29/06
Abstract: Dynamic multi-network security controls are provided herein. A method can include receiving, via an internet protocol network, a report of malicious network traffic observed by first network equipment operating in a first communication network communicatively coupled to the internet protocol network, wherein the report indicates a second communication network, communicatively coupled to the internet protocol network and distinct from the first communication network, as an originating network of the malicious network traffic; in response to receiving the report, identifying second network equipment operating in the second communication network as a source of the malicious network traffic; and causing a control device associated with the second communication network to prevent the second network equipment from transmitting network traffic, comprising the malicious network traffic, outside of the second communication network via the internet protocol network for a defined time interval.
-
-
-
-
-
-
-