Abstract:
The invention deals with a method performed by a radio access network node (130) of a wireless communication network (100), for handling a wireless communication device (140) capable of alternating between an idle state and an active state. The method comprises receiving packets related to a communication between the wireless communication device (140) and an external node (170), and determining whether the packets are directed only from the external node (170) towards the wireless communication device (140). If so, the node (130) refrains from sending a paging notification to the device (140) for a first time period including a first in time occurring active state of the device after the determination, but if not, the node (130) sends the paging notification to the device (140) at the first in time occurring active state.
Abstract:
Systems and methods of the present invention provide for executing a first database query selecting a project objective data record storing a forecast maturity score and a forecast date earlier in time than a current date. The forecast maturity score defines a level of compliance with a cybersecurity framework and the forecast date identifies a date by which an organization will achieve the level of compliance. The system executes a remote procedure call to determine whether a system process is performing a project objective defined within the project objective data record, and responsive to a determination that the system process is not performing the project objective, execute a second database query updating the forecast date within the project objective data record.
Abstract:
Gerät enthaltend eine Schutzeinrichtung (203) zum Schutz eines mit dem Gerät (200) verbundenen Kommunikationsnetzwerks vor Angriffen durch das verbundene Gerät (200) selbst, wobei die Schutzeinrichtung (203) separiert von einer Software-Ausführungsumgebung (204) des Gerätes (200) ausgebildet ist und derart eingerichtet ist, eine bereitgestellte Zugangskennung zu überprüfen, mindestens eine bereitgestellte Zugangsregel, die den Zugang des Gerätes (200) zum Kommunikationsnetzwerk beschreibt, abhängig von der Zugangskennung zu aktivieren und einen Zugang des Gerätes (200) auf das Kommunikationsnetzwerk zum Senden von Daten gemäß der mindestens einen aktivierten Zugangsregel zu beschränken, sowie ein entsprechendes Verfahren. Dadurch wird eine Möglichkeit geschaffen potentiell für ein Kommunikationsnetzwerk gefährliche Geräte automatisch zu erkennen und die von Ihnen ausgehende Gefahr zu beseitigen oder zumindest zu minimieren.
Abstract:
Provided herein are systems and methods for establishing secure communications and connectivity between agents (client, user, or service) over any physical network topology. The system allows clients (client, user, or service agents) to connect to services in a secure manner reducing risks from third party trust attacks, denial-of-service, and anonymous attacks (either zero-day or using known vulnerabilities) while simultaneously improving the performance of the connectivity.
Abstract:
Use machine learning to train a classifier to classify entities to increase confidence with respect to an entity being part of a distributed denial of service attack. The method includes training a classifier to use a first classification method, to identify probabilities that entities from a set of entities are performing denial of service attacks. The method further includes identifying a subset of entities meeting a threshold probability of performing a denial of service attack. The method further includes using a second classification method, identifying similarity of entities in the subset of entities. The method further includes based on the similarity, classifying individual entities.
Abstract:
Disclosed are systems and methods for improving interactions with and between computers in a search system supported by or configured with search servers, applications or platforms. The systems interact to identify and retrieve data across platforms, which data can be used to improve the quality of results data used in processing interactions between or among processors in such systems. The disclosed systems and methods provide an incident management and response software (IMRS) system that accelerates security incident detection and response. The IMRS provides an adaptive, event-driven workflow automation platform that can be customized to suit a large range of infrastructure environments and asset classes. The IMRS encompasses the management, automation and orchestration technologies applied in the detection and remediation of a computer network security incident (e.g., malware, advanced persistent threat, insider crime, denial of service attack, and the like).
Abstract:
Aspects of security schemes (e.g., integrity protection, encryption, or both) are described. A measure of access stratum security can be realized without overhead associated with establishing and/or maintaining the per-cellular-device access stratum security context at a Cellular Internet of Things (CIoT) base station (C-BS). A gateway (e.g., a CIoT Serving Gateway Node (C-SGN)) may derive a first key. The first key may be only known to the C-SGN. The C-SGN may derive a second key from the first key and a parameter unique to the C-BS. The C-SGN may also derive a third key from the second key and an identity of a cellular device. The C-SGN may send the second and third keys to the C-BS and cellular device, respectively. Small data messages encrypted and/or integrity protected by the cellular device may be decrypted and/or verified by the C-BS.