摘要:
Detecting attempted intrusions in a telecommunications signaling network and assessing the vulnerability of the network to attempted intrusions. Intrusion rules are applied to received messages in the network in real-time, using a known protocol for the network, in order to detect anomalies tending to indicate an attempted intrusion. In order to assess the vulnerability of the network, vulnerability rules are applied to rankings of particular parameters relating to elements in the network. The rankings provide an indication of susceptibility of a network element to an attempted intrusion relative to other network elements.
摘要:
A fuzzy-logic-based evidence fusion tool for predicting function levels of a switch in a telecommunications network. Confidence factors related to the geographical location and to the physical characteristics of the switch are acquired and mapped into fuzzy membership values. The membership values activate a set of fuzzy evidence fusion rules at each function level, and a degree of truth for each rule is inferred. A defuzzification scheme combines the degree of truth of each rule into a single combined confidence factor for each function level. Finally, the maximum combined confidence factor for each rule is determined, and the switch function level corresponding to that confidence factor is assigned to the switch.