Intra-Carrier And Inter-Carrier Network Security System
    3.
    发明申请
    Intra-Carrier And Inter-Carrier Network Security System 审中-公开
    载波内和运营商间网络安全系统

    公开(公告)号:US20170034220A1

    公开(公告)日:2017-02-02

    申请号:US14812656

    申请日:2015-07-29

    Abstract: A system and method for identifying distributed attacks, such as, but not limited to, distributed denial of service attacks and botnet attacks, in a first network serviced by a first carrier and configured to alert a second network serviced by a second carrier that is different from the first carrier is disclosed. Once an attack has been identified, an attack alert is generated and provided to the second network or other aspects of the first network, or both. The attack alerts may be distributed dynamically with the second network via diameter based security protocol Rs. Such system and method may mitigate distributed malicious attacks by sharing destination internet protocol and bad international mobile subscriber identity information across carriers.

    Abstract translation: 一种用于在由第一载体服务的第一网络中识别分布式攻击(例如但不限于分布式拒绝服务攻击和僵尸网络攻击)的系统和方法,并且被配置为警告由第二载体所服务的不同的第二网络 从第一载波公开。 一旦已经识别出攻击,就会生成攻击警报并将其提供给第二个网络或第一个网络的其他方面,或者两者。 攻击警报可以通过基于直径的安全协议Rs与第二网络动态分布。 这样的系统和方法可以通过跨运营商共享目的地互联网协议和不良的国际移动用户身份信息来减轻分布式恶意攻击。

    Methods, Devices, Systems, and Computer Program Products for Edge Driven Communications Network Security Monitoring
    5.
    发明申请
    Methods, Devices, Systems, and Computer Program Products for Edge Driven Communications Network Security Monitoring 有权
    边缘驱动通信网络安全监控的方法,设备,系统和计算机程序产品

    公开(公告)号:US20130055343A1

    公开(公告)日:2013-02-28

    申请号:US13663202

    申请日:2012-10-29

    CPC classification number: H04L63/0209 H04L63/1416

    Abstract: An edge monitoring approach can be utilized to detect an attack which includes a plurality of relatively low bandwidth attacks, which are aggregated at a victim sub-network. The aggregated low bandwidth attacks can generate a relatively high bandwidth attack including un-solicited data traffic directed to the victim' so that the aggregated attack becomes more detectable at an edge monitor circuit located proximate to the victim. Related systems, devices, and computer program products are also disclosed.

    Abstract translation: 可以利用边缘监控方法来检测包括多个相对低带宽的攻击的攻击,这些攻击在受害子网络处被聚合。 聚合的低带宽攻击可以产生相对较高的带宽攻击,包括针对受害者的非请求数据流量,使得聚合攻击在位于受害者附近的边缘监视器电路更可检测。 还公开了相关系统,设备和计算机程序产品。

    SHORT MESSAGE SERVICE CONGESTION MANAGER

    公开(公告)号:US20230137949A1

    公开(公告)日:2023-05-04

    申请号:US17453083

    申请日:2021-11-01

    Abstract: The described technology is generally directed towards a short message service (SMS) congestion manager that can evaluate, predict, and mitigate SMS congestion. The SMS congestion manager can be implemented within a short message services function (SMSF) of a fifth generation (5G) or subsequent generation cellular network. The SMS congestion manager can monitor a volume of non-access stratum (NAS) SMS messages in order to detect potential overload conditions wherein the volume of messages exceeds a capability of a network function. In response to detecting potential overload conditions, the SMS congestion manager can inhibit messages directed to the network function in order to prevent overloads from developing. The SMS congestion manager can use machine learning to learn to detect the potential overload conditions as well as to learn actions to take to address the potential overload conditions.

    Insider Attack Resistant System and Method for Cloud Services Integrity Checking

    公开(公告)号:US20200053107A1

    公开(公告)日:2020-02-13

    申请号:US16658508

    申请日:2019-10-21

    Abstract: An insider attack resistant system for providing cloud services integrity checking is disclosed. In particular, the system utilizes an automated integrity checking script and virtual machines to check the integrity of a service. The system may utilize the integrity checking script and virtual machines to execute a set of operations associated with the service so as to check the integrity of the service. When executing the set of operations, the system may only have access to the minimum level of access to peripherals that is required for each operation in the set of operations to be executed. After each operation is executed, the system may log each result for each operation, and analyze each result to determine if a failure exists for any of the operations. If a failure exists, the system may determine that a change in an expected system behavior associated with the service has occurred.

    Insider Attack Resistant System and Method For Cloud Services Integrity Checking
    10.
    发明申请
    Insider Attack Resistant System and Method For Cloud Services Integrity Checking 有权
    内部防攻击系统和云服务完整性检查方法

    公开(公告)号:US20170046211A1

    公开(公告)日:2017-02-16

    申请号:US14825419

    申请日:2015-08-13

    Abstract: An insider attack resistant system for providing cloud services integrity checking is disclosed. In particular, the system utilizes an automated integrity checking script and virtual machines to check the integrity of a service. The system may utilize the integrity checking script and virtual machines to execute a set of operations associated with the service so as to check the integrity of the service. When executing the set of operations, the system may only have access to the minimum level of access to peripherals that is required for each operation in the set of operations to be executed. After each operation is executed, the system may log each result for each operation, and analyze each result to determine if a failure exists for any of the operations. If a failure exists, the system may determine that a change in an expected system behavior associated with the service has occurred.

    Abstract translation: 公开了一种用于提供云服务完整性检查的内部攻击防御系统。 特别地,该系统利用自动完整性检查脚本和虚拟机来检查服务的完整性。 系统可以使用完整性检查脚本和虚拟机执行与服务相关联的一组操作,以便检查服务的完整性。 当执行该组操作时,系统可能只能访问要执行的操作集中的每个操作所需的对外围设备的最小访问级别。 执行每个操作后,系统可以记录每个操作的每个结果,并分析每个结果以确定是否存在任何操作的故障。 如果存在故障,系统可能会确定发生了与服务相关联的预期系统行为的更改。

Patent Agency Ranking