-
公开(公告)号:WO2023048857A1
公开(公告)日:2023-03-30
申请号:PCT/US2022/040730
申请日:2022-08-18
Applicant: QUALCOMM INCORPORATED
Inventor: PETIT, Jonathan , MONTEUUIS, Jean-Philippe , ANSARI, Mohammad Raashid , CHEN, Cong
IPC: G06F21/14 , G06F21/55 , G06F21/57 , H04L9/40 , G06K9/62 , H04W4/38 , H04W4/40 , H04W4/44 , H04W12/122
Abstract: Methods, systems, and devices for wireless communications are described. A communication device may detect vehicle-to-everything (V2X) fuzzing attacks. The communication device may receive a set of packets. Each packet of the set of packets includes a set of information element (IE) fields. The communication device may determine a change to one or more IE fields of the set of IE fields and associated with at least a subset of packets of the set of packets based on comparing a respective value associated with each of the one or more IE fields to a respective default value associated with each of the one or more IE fields. As a result, the communication device may transmit a report indicating a plurality of fuzzing attacks at the communication device.
-
2.
公开(公告)号:WO2023038756A1
公开(公告)日:2023-03-16
申请号:PCT/US2022/039977
申请日:2022-08-10
Applicant: ORACLE INTERNATIONAL CORPORATION
Inventor: RAJPUT, Jay , SINGH, Virendra , SRIVASTAVA, Ankit
IPC: H04L63/40 , H04W12/122
Abstract: The subject matter described herein includes a method for reducing the likelihood of successful denial of service (DoS) attacks by validating overload control information (OCI) scope information against network function (NF) profile information obtained using target resource identification information. The method includes receiving a service based interface (SB I) request message, obtaining, from the SBI request message, target resource identification information, obtaining NF profile information using the target resource identification information and storing the NF profile information, receiving an SBI response message including overload control information and scope information for the overload control information, using the stored NF profile information to determine whether the scope information for the overload control information is valid, and, in response to determining that the scope information for the overload control information is invalid, rejecting the SBI response message.
-
公开(公告)号:WO2023034689A1
公开(公告)日:2023-03-09
申请号:PCT/US2022/075145
申请日:2022-08-18
Applicant: QUALCOMM INCORPORATED
IPC: H04L9/40 , H04K3/00 , H04W12/037 , H04W12/122
Abstract: Methods, systems, and devices for wireless communications are described. In some wireless communications systems, a user equipment (UE) may receive, from a base station, control signaling identifying a configuration of a set of time intervals for communication with the base station, the set of time intervals including a subset of the time intervals for which the UE is to perform a physical layer security procedure. In some cases, the UE may activate a timer associated with performing the physical layer security procedure in response to a trigger. The UE and the base station may communicate one or more messages using the physical layer security procedure, for example, in the subset of the time intervals identified by the control signaling, while the timer is active, or both. The physical layer security procedure may involve the UE performing physical layer security encoding, signal jamming, or both.
-
公开(公告)号:WO2022244658A1
公开(公告)日:2022-11-24
申请号:PCT/JP2022/019896
申请日:2022-05-11
Applicant: 株式会社デンソー
Inventor: ▲高▼橋 秀明
IPC: H04W74/08 , H04W12/122
Abstract: 基地局(200)は、競合ベースランダムアクセスプロシージャにおいてユーザ装置(100)から上りリンク共有チャネル上で送信されるメッセージを受信し、前記受信したメッセージが所定フォーマットに準拠している場合、前記受信したメッセージを前記競合ベースランダムアクセスプロシージャにおける競合解決用の識別データとして前記ユーザ装置に送り返すエコーバック処理を行う。前記基地局(200)は、前記受信したメッセージが前記所定フォーマットに準拠していない場合、前記エコーバック処理を行わない。
-
5.
公开(公告)号:WO2022207093A1
公开(公告)日:2022-10-06
申请号:PCT/EP2021/058438
申请日:2021-03-31
Applicant: NOKIA TECHNOLOGIES OY
Inventor: KRIAA, Siwar , FEKI, Afef , HALEBID, Arunkumar , PAPILLON, Serge
IPC: H04L29/06 , H04W12/122
Abstract: In a communication network, a device is configured to predict attacks and detect attacks from data logs received (71) from the network and generate (77, 81) a response to an attack upon prediction or detection of an attack. Graph representations of data logs are generated (72) based on a predefined schema. Attacks are detected (74) by applying inference rules to a graph representation of the data logs. Attacks are predicted (73) by using a graph neural network trained with subgraphs obtained by querying a graph representation of training data corresponding to normal traffic and attacks.
-
公开(公告)号:WO2022205132A1
公开(公告)日:2022-10-06
申请号:PCT/CN2021/084561
申请日:2021-03-31
Applicant: 华为技术有限公司
IPC: H04W4/20 , H04W12/122
Abstract: 本申请公开了一种确定攻击路径的防护方案的方法和装置,属于网联汽车安全技术领域。该方法包括:在攻击路径的多个攻击路径防护方案中,确定满足信息安全条件的攻击路径防护方案;在满足所述信息安全条件的攻击路径防护方案中,确定满足防护成本条件的攻击路径防护方案,作为所述攻击路径的待使用防护方案。通过该方法可以使最终选择出的待使用防护方案既可以满足一定的信息安全要求达到较好的防护效果,又可以在一定程度上节省投入的防护成本。
-
公开(公告)号:WO2022103160A1
公开(公告)日:2022-05-19
申请号:PCT/KR2021/016367
申请日:2021-11-10
Applicant: SAMSUNG ELECTRONICS CO., LTD.
Inventor: RAJADURAI, Rajavelsamy , PARAMBATH SASI, Nivedya , RAJENDRAN, Rohini
IPC: H04W12/122 , H04W12/69 , H04W12/037 , H04W60/00 , H04W36/08 , H04W88/14 , H04W88/02
Abstract: The present disclosure relates to a communication method and system for converging a 5th Generation (5G) communication system for supporting higher data rates beyond a 4th Generation (4G) system with a technology for Internet of Things (IoT). The method includes comparing plurality of parameters (e.g. TAI) received in message (e.g. initial NAS message, registration request, first protected NAS message) from UE and plurality of parameters (e.g. TAI) broadcasted/received/stored by AMF entity and/or genuine gNB. AMF entity and/or genuine gNB sends an accept message (e.g. NAS accept) or reject message (e.g. NAS reject, RRC reject or RRC reconfiguration.) with appropriate error cause value to UE to mitigate the MitM attack. Based on received message from AMF entity and/or genuine gNB, UE detects that UE is camped on genuine gNB or fake gNB. UE performs action(s) (e.g. cell reselection), when UE is camped on fake gNB/eNB to mitigate MitM attack.
-
公开(公告)号:WO2022045332A1
公开(公告)日:2022-03-03
申请号:PCT/JP2021/031696
申请日:2021-08-30
Applicant: 日本電気株式会社
Inventor: 庄司 拓也
IPC: H04W24/04 , H04W76/19 , H04W12/06 , H04W12/08 , H04W12/122
Abstract: 基地局で障害が発生した場合に、端末が不適切なシステムに接続されることを抑制するために、本発明の中継装置は、基地局で障害が生じた場合に、前記基地局を介してネットワークに接続していた端末に認証情報を含む接続要求を送信する送信手段と、前記接続要求を受信した前記端末から接続を許可する旨の通知を受信する受信手段と、前記受信手段から前記通知を受信した旨が通知された場合、前記端末と前記ネットワークとの間の通信を中継する中継手段と、を備える。
-
公开(公告)号:WO2022018581A1
公开(公告)日:2022-01-27
申请号:PCT/IB2021/056352
申请日:2021-07-14
Applicant: NOKIA TECHNOLOGIES OY
Inventor: KHARE, Saurabh , PULIPATI, Narasimha Rao , NAIR, Suresh
IPC: H04L29/06 , H04L9/32 , H04W12/122 , H04W12/06
Abstract: Techniques for preventing rogue network functions in a communication network are provided. For example, a method comprises obtaining information identifying one or more network entities suspected of malicious activity operating within the communication network, causing a re-authorization of the one or more network entities suspected of malicious activity, and in response to a re- authorization failure of at least one of the one or more network entities suspected of malicious activity, causing one or more remedial actions to occur within the communication network to prevent the at least one network entity that failed re-authorization from accessing other network entities in the communication network.
-
公开(公告)号:WO2021240054A1
公开(公告)日:2021-12-02
申请号:PCT/FI2021/050367
申请日:2021-05-21
Applicant: NOKIA SOLUTIONS AND NETWORKS OY
Inventor: GEORGE, Jos , CHIARONI, Dominique
IPC: H04L29/06 , H04B10/116 , H04W12/122 , H04W88/08
Abstract: There is provided an apparatus coupled to one or more wireless access devices and a backbone network comprising at least one processor; and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least: monitoring traffic to and/or from one or more user devices served by the one or more wireless access devices.
-
-
-
-
-
-
-
-
-