×

Radio access technology based security in service provider networks

  • US 10,693,918 B2
  • Filed: 06/15/2017
  • Issued: 06/23/2020
  • Est. Priority Date: 06/15/2017
  • Status: Active Grant
First Claim
Patent Images

1. A system, comprising:

  • a processor configured to;

    monitor network traffic on a service provider network at a security platform to identify a Radio Access Technology (RAT) type for a new session wherein the security platform monitors wireless interfaces including a plurality of interfaces for a GPRS Tunneling Protocol (GTP) in a mobile core network for a 3G and/or 4G network, or a control protocol and user data traffic in a mobile core network for a 3G and/or 4G network, and wherein the monitoring of the network traffic comprises to;

    identify a create session request message or a create PDP context request message from the network traffic; and

    extract location from the create session request message or the create PDP context request message, the location including one or more of the following;

    CGI (Cell Global Identifier), SAI (Service Area Identifier), RAI (Routing Area Identifier), TAI (Tracking Area Identifier), ECGI (E-UTRAN Cell Global Identifier), or LAC (Location Area Identifier);

    associate the RAT type with the new session at the security platform, wherein the RAT type includes 3G, 4G, 5G, or any combination thereof;

    determine an application identifier for user traffic associated with the new session at the security platform, comprising to;

    monitor, via deep packet inspection, tunneled user traffic after the new session has been created to obtain the application identifier, wherein the application identifier relates to web browsing using HyperText Transfer Protocol (HTTP), a Domain Name System (DNS) request, a file transfer using File Transfer Protocol (FTP), Telnet, Dynamic Host Configuration Protocol (DHCP), Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Trivial File Transfer Protocol (TFTP), or any combination thereof, and wherein the tunneled user traffic includes GPRS Tunneling Protocol User Plane (GTP-U) traffic;

    determine a security policy to apply at the security platform to the new session based on the application identifier, the location, and the RAT type, wherein the security policy includes allowing or passing the new session, blocking or dropping the new session, or restricting access of the new session; and

    perform threat detection and/or threat prevention based on the security policy; and

    a memory coupled to the processor and configured to provide the processor with instructions.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×