Methods and devices for defending a 3G wireless network against malicious attacks
First Claim
Patent Images
1. A method for detecting an attack against a wireless network comprising:
- generating a profile based on non-attack, wireless traffic conditions;
obtaining wireless state information comprising wireless data channel set-up and release information, the time that a mobile device is active and application based information from at least a radio network controller, wherein the application based information is categorized based on the type of multimedia service it provides to a user of the mobile device; and
comparing the obtained information to the profile to determine whether an attack is directed at an element in the wireless network.
12 Assignments
0 Petitions
Accused Products
Abstract
Wireless state information collected or inferred from a 3G wireless network is used to detect and prevent malicious attacks against the network.
-
Citations
14 Claims
-
1. A method for detecting an attack against a wireless network comprising:
-
generating a profile based on non-attack, wireless traffic conditions; obtaining wireless state information comprising wireless data channel set-up and release information, the time that a mobile device is active and application based information from at least a radio network controller, wherein the application based information is categorized based on the type of multimedia service it provides to a user of the mobile device; and comparing the obtained information to the profile to determine whether an attack is directed at an element in the wireless network. - View Dependent Claims (2, 3, 4, 9, 10, 11)
-
-
5. A device for detecting an attack against a wireless network operable to:
-
generate a profile based on non-attack, wireless traffic conditions; obtain wireless state information comprising wireless data channel set-up and release information, the time that a mobile device is active and application based information from at least a radio network controller, wherein the application based information is categorized based on the type of multimedia service it provides to a user of the mobile device; and compare the obtained information to the profile to determine whether an attack is directed at an element in the wireless network. - View Dependent Claims (6, 7, 8, 12, 13, 14)
-
Specification