FIRST NODE, SECOND NODE, COMMUNICATIONS SYSTEM AND METHODS PERFORMED, THEREBY FOR HANDLING SECURITY IN A COMMUNICATIONS SYSTEM

    公开(公告)号:WO2022167105A1

    公开(公告)日:2022-08-11

    申请号:PCT/EP2021/060946

    申请日:2021-04-27

    IPC分类号: H04L29/06 H04W12/12

    摘要: A computer-implemented method, by a first node (111), for handling security in a communications system (100). The first node (111) receives (301), from another node (115), a first message. The first message requests subscription to receive at least one indication indicating a security attack, of at least one of: i) a first indication of one or more applications, and ii) a second indication of one or more devices (130), that are a target or a source of the attack. The first node (111) initiates (302) instructing, based on the first message, at least one of: one or more additional nodes (112, 113) and a first device (131), to monitor information indicative of the attack. The first node (111) initiates (307) sending, with the proviso that the security attack is detected, another message to the another node (115) comprising the at least one of the first and the second indication.

    A METHOD FOR PREDICTING POSSIBLE ATTACKS ON WIRELESS COMMUNICATION SYSTEMS

    公开(公告)号:WO2022146362A1

    公开(公告)日:2022-07-07

    申请号:PCT/TR2021/051504

    申请日:2021-12-24

    摘要: The invention relates to a method (100) that enables the following steps to be performed in any order to ensure that at least one attack to be made to any at least one OSI layer and/or to any at least one sub-layer of said OSI layer in communication systems can be predicted/detected and thus precautions are taken in advance; - Creating the training dataset by determining the machine inputs (G) and machine outputs (Ç) in the first step - Making the training datasets understandable by the machine (computer) in the second step - Designing machine learning in the third step - Creating the validation dataset in the fourth step - Training the machine (or trained machine) in the fifth step - Obtaining test data (or sets) in the sixth step - In the seventh step, estimating (or testing) the machine outputs (Ç) using the machine trained in the fifth step and the test input set obtained in the sixth step.

    METHOD AND NETWORK NODE FOR DETECTING ANOMALOUS ACCESS BEHAVIOURS

    公开(公告)号:WO2022144908A1

    公开(公告)日:2022-07-07

    申请号:PCT/IN2020/051071

    申请日:2020-12-30

    摘要: Embodiments of the present disclosure provide a method, a network node, and a computer program product for detecting anomalous access behaviours in a plurality of network nodes in a communication network (100). The method is performed in a network node (10) in the communication network. The method comprises obtaining (S11) session logs associated with the plurality of network nodes (10a-10n) in the communication network (100). The method comprises extracting (S12) session features for each session by evaluating the session logs associated with the plurality of network nodes (10a-10n). Further, the method comprises determining (S13) access behaviours associated with each session based on the extracted session features, the access behaviours associated with each session comprising a representation indicative of one or more of session characteristics, user access characteristics, network node access characteristics and command usage characteristics. The method further comprises detecting (S14) anomalous access behaviours by analysing the determined access behaviours.

    SYSTEMS AND METHODS FOR ELECTRONIC SIGNATURE TRACKING

    公开(公告)号:WO2022132563A1

    公开(公告)日:2022-06-23

    申请号:PCT/US2021/062619

    申请日:2021-12-09

    申请人: SELEX ES INC.

    摘要: A system and method to identify and track one or more targets of interest. The system may include a plurality of collection systems to capture information related to visual identifiers and/or electronic signatures associated with targets in selected locations. The system may further include an intelligence system to determine a target of interest based on the information related to visual identifiers and/or electronic signatures and to track the target of interest.

    PROCÉDÉ ET DISPOSITIF DE PRIORISATION DE FLUX DE PAQUETS

    公开(公告)号:WO2022084624A1

    公开(公告)日:2022-04-28

    申请号:PCT/FR2021/051828

    申请日:2021-10-20

    申请人: ORANGE

    IPC分类号: G06F21/55 H04W12/12

    摘要: L'invention concerne un procédé de priorisation d'un flux de paquets, le procédé étant mis en œuvre par le nœud routeur connecté au nœud récepteur et comprenant : • la réception d'un message comprenant la valeur attendue du paramètre de protection, en provenance d'un dispositif associé au nœud récepteur, • la priorisation des paquets comprenant la valeur attendue du paramètre de protection.