System for monitoring operations of an ENUM system
First Claim
Patent Images
1. A tangible computer-readable storage medium, excluding propagating signals, comprising computer instructions to at least:
- cause a security management system to monitor queries submitted to a Telephone Number Mapping system by one or more Internet Protocol Multimedia Subsystem network elements, the security management system separate from the Telephone Number Mapping system and the Internet Protocol Multimedia Subsystem network elements;
cause the security management system to detect one or more faults in the queries submitted by at least one among the one or more Internet Protocol Multimedia Subsystem network elements;
cause the security management system to prevent the at least one of the one or more Internet Protocol Multimedia Subsystem network elements from submitting subsequent queries to the Telephone Number Mapping system in response to the faults exceeding a threshold, wherein the one or more faults detected in the queries cause the Telephone Number Mapping system to generate an alarm corresponding to a Denial of Service attack;
cause the security management system to direct another one of the Internet Protocol Multimedia Subsystem network elements to replace the at least one of the one or more Internet Protocol Multimedia Subsystem network elements; and
cause the security management system to instruct the at least one of the one or more Internet Protocol Multimedia Subsystem network elements to autonomously repair itself.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for monitoring operations of a Telephone Number Mapping (ENUM) system is disclosed. A system that incorporates teachings of the present disclosure may include, for example, an ENUM system having a controller element to monitor queries received from one or more network elements, detect one or more faults in the queries submitted by at least one among the one or more network elements, and prevent the at least one of the one or more network elements from submitting subsequent queries to the ENUM system. Additional embodiments are disclosed.
-
Citations
18 Claims
-
1. A tangible computer-readable storage medium, excluding propagating signals, comprising computer instructions to at least:
-
cause a security management system to monitor queries submitted to a Telephone Number Mapping system by one or more Internet Protocol Multimedia Subsystem network elements, the security management system separate from the Telephone Number Mapping system and the Internet Protocol Multimedia Subsystem network elements; cause the security management system to detect one or more faults in the queries submitted by at least one among the one or more Internet Protocol Multimedia Subsystem network elements; cause the security management system to prevent the at least one of the one or more Internet Protocol Multimedia Subsystem network elements from submitting subsequent queries to the Telephone Number Mapping system in response to the faults exceeding a threshold, wherein the one or more faults detected in the queries cause the Telephone Number Mapping system to generate an alarm corresponding to a Denial of Service attack; cause the security management system to direct another one of the Internet Protocol Multimedia Subsystem network elements to replace the at least one of the one or more Internet Protocol Multimedia Subsystem network elements; and cause the security management system to instruct the at least one of the one or more Internet Protocol Multimedia Subsystem network elements to autonomously repair itself. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus, comprising:
-
a memory storing machine readable instructions; and a processor to execute the instructions to; cause a security management system to monitor queries received at a Telephone Number Mapping system from one or more network elements, the security management system separate from the Telephone Number Mapping system and from the one or more network elements; cause the security management system to detect one or more faults in the queries submitted by at least one of the one or more network elements; cause the security management system to submit an alarm to another system to prevent the at least one of the one or more network elements from submitting subsequent queries to the Telephone Number Mapping system, wherein the one or more faults detected in the queries cause the Telephone Number Mapping system to generate an alarm corresponding to a Denial of Service attack; cause the security management system to direct another one of the network elements to replace the at least one of the one or more network elements; and cause the security management system to instruct the at least one of the one or more network elements to autonomously repair itself. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A method, comprising:
-
using a security management system to monitor data exchanged between a plurality of Internet Protocol Multimedia Subsystem network elements, the security management system separate from the plurality of Internet Protocol Multimedia Subsystem network elements and a Telephone Number Mapping system; using the security management system to detect faulted data submitted by at least one of the Internet Protocol Multimedia Subsystem network elements; using the security management system to detect a frequency of occurrence from a collection of faulted data submitted by the at least one Internet Protocol Multimedia Subsystem network element to another Internet Protocol Multimedia Subsystem network element; using the security management system to prevent the at least one Internet Protocol Multimedia Subsystem network element from submitting subsequent faulted data in response to the frequency of occurrence of the faulted data exceeding a threshold, wherein the faulted data causes the Telephone Number Mapping system to generate an alarm corresponding to a Denial of Service attack; using the security management system to direct another one of the Internet Protocol Multimedia Subsystem network elements to replace the at least one Internet Protocol Multimedia Subsystem network element; and using the security management system to instruct the at least one Internet Protocol Multimedia Subsystem network element to autonomously repair itself. - View Dependent Claims (17, 18)
-
Specification