System and method for providing network level and nodal level vulnerability protection in VoIP networks
First Claim
1. A method for protecting one or more communications devices comprising the steps of:
- receiving a communication;
filtering the received communication using three or more stages selected from the group comprising a media protection and filtering plane, a policy based filtering plane, a signature based filtering plane, a protocol anomaly detection and filtering plane and a behavioral learning based filtering plane; and
either allowing or denying the received communication based the filtering step.
19 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a system, method and apparatus for providing network level and nodal level vulnerability protection in VoIP networks by receiving a communication, filtering the received communication using three or more stages selected from the group comprising a media protection and filtering plane, a policy based filtering plane, a signature based filtering plane, a protocol anomaly detection and filtering plane and a behavioral learning based filtering plane, and either allowing or denying the received communication based the filtering step. The stages are applicable to one or more protocols including SIP, IMS, UMA, H.248, H.323, RTP, CSTA/XML or a combination thereof. In addition, the stages can be implemented within a single device or are distributed across a network (e.g., SIP network, a UMA network, an IMS network or a combination thereof).
-
Citations
20 Claims
-
1. A method for protecting one or more communications devices comprising the steps of:
-
receiving a communication;
filtering the received communication using three or more stages selected from the group comprising a media protection and filtering plane, a policy based filtering plane, a signature based filtering plane, a protocol anomaly detection and filtering plane and a behavioral learning based filtering plane; and
either allowing or denying the received communication based the filtering step. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program embodied on a computer readable medium for protecting one or more communications devices comprising:
-
a code segment for receiving a communication;
a code segment for filtering the received communication using three or more stages selected from the group comprising a media protection and filtering plane, a policy based filtering plane, a signature based filtering plane, a protocol anomaly detection and filtering plane and a behavioral learning based filtering plane; and
a code segment for either allowing or denying the received communication based the filtering step. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A system for protecting one or more communications devices comprising:
-
one or more signaling subsystems;
an intelligence subsystem communicably connected to the one or more signaling subsystems; and
wherein the signaling subsystem receives a communication, filters the received communication using three or more stages selected from the group comprising a media protection and filtering plane, a policy based filtering plane, a signature based filtering plane, a protocol anomaly detection and filtering plane and a behavioral learning based filtering plane, and either allows or denies the received communication based the filtering step. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification