Method for malicious traffic recognition in IP networks with subscriber identification and notification
First Claim
1. A method for recognizing malicious traffic in a mobile network comprising:
- identifying a mobile subscriber by a mobile subscriber identity;
detecting a malicious traffic associated with the mobile subscriber; and
notifying the mobile subscriber of the malicious traffic associated with the mobile subscriber using the mobile subscriber identity.
2 Assignments
0 Petitions
Accused Products
Abstract
A technique for recognizing malicious traffic in IP networks coupled with an identification and notification of a mobile subscriber generating or receiving malicious traffic is provided. An embodiment of the present invention may include intrusively or non-intrusively monitoring in real-time the mobile subscriber'"'"'s data traffic for malicious traffic as well as mobile security intrusion attempts. Another embodiment of the present invention may report the identification of those mobile subscribers generating or receive malicious traffic to an operator. By knowing the identity of the mobile subscriber, an embodiment of the present invention may block the mobile subscriber'"'"'s subscription or alert the mobile subscriber in question about the malicious traffic. One embodiment of the present invention may be applied to mobile networks where the mobile subscriber'"'"'s identity is known by an unique identifier (e.g., an IMSI or a phone number) and where a notification system may be implemented using a messaging service e.g., SMS, MMS, IM, email, or voice.
60 Citations
30 Claims
-
1. A method for recognizing malicious traffic in a mobile network comprising:
-
identifying a mobile subscriber by a mobile subscriber identity;
detecting a malicious traffic associated with the mobile subscriber; and
notifying the mobile subscriber of the malicious traffic associated with the mobile subscriber using the mobile subscriber identity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method for recognizing malicious traffic in an IP network comprising:
-
analyzing an IP packet having a first portion and a second portion, the first portion having a source IP address and a destination IP address;
identifying a mobile subscriber from the second portion of the IP packet;
detecting a malicious traffic associated with the mobile subscriber from the second portion of the IP packet; and
notifying the mobile subscriber of the malicious traffic associated with the mobile subscriber using the second portion of the IP packet. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification