Responding to malicious traffic using separate detection and notification methods
First Claim
1. A method for responding to malicious traffic in a mobile network comprising:
- detecting malicious traffic being communicated to and from a mobile subscriber unit via a first method; and
notifying the mobile subscriber unit using a second method being different than the first method.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and a system for responding to malicious traffic in a mobile IP network are provided. The method may detect malicious traffic communicated to and from a mobile subscriber via a first method, and notify the mobile subscriber using a second method. The system may include a network interface coupled to the mobile network, and a processor executing the method. An embodiment of the present invention may intrusively or non-intrusively monitor the mobile subscriber'"'"'s data traffic for malicious traffic and security intrusion attempts. Another embodiment of the present invention may report to an operator the identity of the mobile subscriber sending malicious traffic. Yet another embodiment of the present invention may block the mobile subscriber'"'"'s subscription or alert the mobile subscriber. One embodiment of the present invention may be applied to mobile networks where the mobile subscriber'"'"'s identity is known by an unique identifier and where a subscriber may be notified by a messaging service.
40 Citations
16 Claims
-
1. A method for responding to malicious traffic in a mobile network comprising:
-
detecting malicious traffic being communicated to and from a mobile subscriber unit via a first method; and
notifying the mobile subscriber unit using a second method being different than the first method. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus for responding to malicious traffic in a mobile network comprising;
-
an network interface coupled to the mobile network; and
a processor which executes a method for responding to malicious traffic in the mobile network, wherein the method for responding to malicious traffic in the mobile network comprises;
detecting malicious traffic being communicated to and from a mobile subscriber unit via a first method; and
notifying the mobile subscriber unit using a second method being different than the first method. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification