Methods and systems for handling malicious attacks in a wireless communication system
First Claim
1. A method for handling malicious attacks, comprisingidentifying, at a wireless device, packets received from a malicious source based at least in part on the packets received by the wireless device from the malicious source changing a state of the wireless device from a dormant state to a connected state;
- selectively disconnecting the wireless device from a packet data network (PDN) by releasing a first Internet Protocol (IP) address used to connect the wireless device to the PDN when a number of the packets identified as received from the malicious source changing the state of the wireless device reaches a threshold number within a monitoring period; and
reconnecting the wireless device to the PDN using a second IP address that is different from the first IP address.
1 Assignment
0 Petitions
Accused Products
Abstract
Certain aspects of the present disclosure relate to methods and apparatuses for handling malicious attacks. In one aspect, the methods and apparatuses are configured to identify packets received from a malicious source based at least in part on packets received by a wireless device that change a state of the wireless device from a dormant state to a connected state, selectively disconnect the wireless device from a packet data network (PDN) by releasing a first Internet Protocol (IP) address used to connect the wireless device to the PDN when a number of packets identified as received from the malicious source reaches a threshold number within a monitoring period, and reconnect the wireless device to the PDN using a second IP address that is different from the first IP address. In another aspect, a connection to an IP Multimedia Subsystem (IMS) PDN is maintained after the PDN is disconnected.
14 Citations
30 Claims
-
1. A method for handling malicious attacks, comprising
identifying, at a wireless device, packets received from a malicious source based at least in part on the packets received by the wireless device from the malicious source changing a state of the wireless device from a dormant state to a connected state; -
selectively disconnecting the wireless device from a packet data network (PDN) by releasing a first Internet Protocol (IP) address used to connect the wireless device to the PDN when a number of the packets identified as received from the malicious source changing the state of the wireless device reaches a threshold number within a monitoring period; and reconnecting the wireless device to the PDN using a second IP address that is different from the first IP address. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer program product for handling malicious attacks, comprising:
a non-transitory computer-readable medium comprising; code for causing a wireless device to identify packets received from a malicious source based at least in part on the packets received by the wireless device from the malicious source changing a state of the wireless device from a dormant state to a connected state; code for causing the wireless device to selectively disconnect the wireless device from a packet data network (PDN) by releasing a first Internet Protocol (IP) address used to connect the wireless device to the PDN when a number of the packets identified as received from the malicious source changing the state of the wireless device reaches a threshold number within a monitoring period; and code for causing the wireless device to reconnect to the PDN using a second IP address that is different from the first IP address.
-
16. An apparatus for handling malicious attacks, the apparatus comprising:
-
means for identifying, at a wireless device, packets received from a malicious source based at least in part on the packets received by the wireless device from the malicious source changing a state of the wireless device from a dormant state to a connected state; means for selectively disconnecting the wireless device from a packet data network (PDN) by releasing a first Internet Protocol (IP) address used to connect the wireless device to the PDN when a number of the packets identified as received from the malicious source changing the state of the wireless device reaches a threshold number within a monitoring period; and means for reconnecting the wireless device to the PDN using a second IP address that is different from the first IP address.
-
-
17. A wireless device for handling malicious attacks, the wireless device comprising:
at least one processor, wherein the at least one processor is configured to identify packets received from a malicious source based at least in part on the packets received by the wireless device from the malicious source changing a state of the wireless device from a dormant state to a connected state; selectively disconnect the wireless device from a packet data network (PDN) by releasing a first Internet Protocol (IP) address used to connect the wireless device to the PDN when a number of the packets identified as received from the malicious source changing the state of the wireless device reaches a threshold number within a monitoring period; and reconnect the wireless device to the PDN using a second IP address that is different from the first IP address. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
Specification