Abstract:
Methods, devices, and storage media storing instructions to obtain logs from a security device and one or multiple service-providing devices, wherein the logs include information pertaining to traffic flow activity at an application layer associated with a service; store rules that identify behavior ranging from unintentional through intentional for one or multiple communication layers including an application layer; interpret the logs based on the rules; determine whether a violation exists based on the interpreting; and generate a notification that indicates the violation exists in response to a determination that the violation exists.
Abstract:
Methods, devices, and storage media storing instructions to obtain logs from a security device and one or multiple service-providing devices, wherein the logs include information pertaining to traffic flow activity at an application layer associated with a service; store rules that identify behavior ranging from unintentional through intentional for one or multiple communication layers including an application layer; interpret the logs based on the rules; determine whether a violation exists based on the interpreting; and generate a notification that indicates the violation exists in response to a determination that the violation exists.
Abstract:
One or more computing devices, systems, and/or methods for ringless voicemail detection are provided. In an example, a first call attempt to a phone number may be detected. In response to detecting a second call attempt to the phone number occurring within a first threshold timespan of the first call attempt being detected, first processing of the second call attempt is withheld. In response to the first call attempt being cancelled within a second threshold timespan of the first call attempt being detected, second processing of the second call attempt is performed based upon a policy.
Abstract:
Disclosed are systems and methods for robocall steering over voice-hosted traffic networks. The disclosed framework provides novel systems and methods for increasing the accuracy and efficiency in tracking, identifying, blocking and preventing robocalls and robocallers. The disclosed systems and methods provide mechanisms for identifying and removing unwanted voice traffic from networks. The disclosed systems and methods analyze voice traffic over a predetermined period of time (e.g., 1 day or 30 days, for example), and leverage this information into a “know your customer” (KYC) score. This score enables incoming calls to be routed, controlled and/or blocked as they are communicated over voice networks.
Abstract:
One or more computing devices, systems, and/or methods for ringless voicemail detection are provided. In an example, a first call attempt to a phone number may be detected. In response to detecting a second call attempt to the phone number occurring within a first threshold timespan of the first call attempt being detected, first processing of the second call attempt is withheld. In response to the first call attempt being cancelled within a second threshold timespan of the first call attempt being detected, second processing of the second call attempt is performed based upon a policy.
Abstract:
Disclosed are systems and methods for robocall steering over voice-hosted traffic networks. The disclosed framework provides novel systems and methods for increasing the accuracy and efficiency in tracking, identifying, blocking and preventing robocalls and robocallers. The disclosed systems and methods provide mechanisms for identifying and removing unwanted voice traffic from networks. The disclosed systems and methods analyze voice traffic over a predetermined period of time (e.g., 1 day or 30 days, for example), and leverage this information into a “know your customer” (KYC) score. This score enables incoming calls to be routed, controlled and/or blocked as they are communicated over voice networks.
Abstract:
One or more computing devices, systems, and/or methods for ringless voicemail detection are provided. In an example, a first call attempt to a phone number may be detected. In response to detecting a second call attempt to the phone number occurring within a first threshold timespan of the first call attempt being detected, first processing of the second call attempt is withheld. In response to the first call attempt being cancelled within a second threshold timespan of the first call attempt being detected, second processing of the second call attempt is performed based upon a policy.