Mitigating the impact from Internet attacks in a RAN using Internet transport
First Claim
1. A method, performed in a network node in a Core network (CN), of mitigating impacts from Internet attacks in a Radio Access Network (RAN) using Internet transport, the method comprising:
- receiving, from at least a network node in the RAN, an intrusion detection report, the intrusion detection report comprising information about an Internet attack in the RAN;
selecting based on the information, a mitigation action, the mitigation action mitigating the impact of the attack on the RAN service level; and
performing the selected mitigation action to mitigate the impact on the RAN service level.
1 Assignment
0 Petitions
Accused Products
Abstract
The present disclosure relates to methods and devices for mitigating the impact from Internet attacks in a Radio Access Network, RAN, using Internet transport. This object is obtained by a method performed in network node in a Core network, CN, of mitigating the impact from Internet attacks in a Radio Access Network, RAN, using Internet transport. The method comprises receiving, from at least a network node in a Radio Access Network, RAN, an intrusion detection report, the intrusion detection report comprises information about an Internet attack in the RAN. The method further comprises selecting based on the information, a mitigation action, the mitigation action mitigating the impact of the attack on the RAN service level. Further the method comprises performing the selected mitigation action to mitigate the impact on the RAN service level.
-
Citations
39 Claims
-
1. A method, performed in a network node in a Core network (CN), of mitigating impacts from Internet attacks in a Radio Access Network (RAN) using Internet transport, the method comprising:
-
receiving, from at least a network node in the RAN, an intrusion detection report, the intrusion detection report comprising information about an Internet attack in the RAN; selecting based on the information, a mitigation action, the mitigation action mitigating the impact of the attack on the RAN service level; and performing the selected mitigation action to mitigate the impact on the RAN service level. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method, performed in a network node in a Radio Access Network (RAN) using Internet transport, wherein the RAN is connected to a Core Network (CN), of mitigating impacts from Internet attacks, the method comprising:
-
obtaining intrusion detection information informing the network node that the RAN is under attack; compiling, based on the intrusion detection information, an intrusion detection report, the intrusion detection report comprising information about the Internet attack; transmitting the intrusion detection report to the CN. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable storage medium, having stored thereupon a computer program that, when run in a network node in a Core network (CN), causes the network node to of mitigate impacts from Internet attacks in a Radio Access Network (RAN) using Internet transport, by:
-
receiving, from at least a network node in the RAN, an intrusion detection report, the intrusion detection report comprising information about an Internet attack in the RAN; selecting based on the information, a mitigation action, the mitigation action mitigating the impact of the attack on the RAN service level; and performing the selected mitigation action to mitigate the impact on the RAN service level.
-
-
21. A non-transitory computer-readable storage medium, having stored thereupon a computer program that, when run in a network node in a Radio Access Network (RAN) using Internet transport, wherein the RAN is connected to a Core Network (CN), causes the network node to mitigating impacts from Internet attacks, by:
-
obtaining intrusion detection information informing the network node that the RAN is under attack; compiling, based on the intrusion detection information, an intrusion detection report, the intrusion detection report comprising information about the Internet attack; transmitting the intrusion detection report to the CN.
-
-
22. A network node in a Core network (CN) in a Radio Access Network (RAN) using Internet transport, the network node comprising a processor and a memory, said memory containing instructions executable by said processor whereby said network node is configured to:
-
receive, from at least one network node, an intrusion detection report, the intrusion detection report comprises information about an Internet attack in the RAN; select based on the information, a mitigation action, the mitigation action mitigating the impact of the attack on the RAN service level; and perform the selected mitigation action to mitigate the impact on the RAN service level. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A network node in a Radio Access Network (RAN) using Internet transport, wherein the RAN is connected to a Core Network (CN), the network node comprising a processor and a memory, said memory containing instructions executable by said processor whereby said network node is configured to:
-
obtain intrusion detection information informing the network node that the RAN is under attack; compile, based on the intrusion detection information, an intrusion detection report, the intrusion detection report comprising information about the Internet attack; transmit the intrusion detection report to the CN. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39)
-
Specification