×

Dynamic and selective response to cyber attack for telecommunications carrier networks

  • US 9,363,278 B2
  • Filed: 05/11/2011
  • Issued: 06/07/2016
  • Est. Priority Date: 05/11/2011
  • Status: Active Grant
First Claim
Patent Images

1. A network device, comprising:

  • a memory that stores executable instructions; and

    a processor, coupled to the memory, that facilitates execution of the executable instructions to perform operations, comprising;

    receiving information comprising network traffic data at the network device, from a mobile device, to facilitate a response to a detected network attack, wherein the network device is located between a radio access network device and a serving general packet radio service support node device and the network device does not have a network address causing it to be network transparent;

    analyzing the network traffic data of the information to determine a value related to a probability of the mobile device participating in the detected network attack;

    facilitating an updating of a variable related to an access privilege employed in determining access to another network device by the mobile device;

    in response to a defined condition relating to the variable being determined to be satisfied, altering the access privilege for the mobile device to access the other network device comprising decreasing a data rate of at least a portion of the information received from the mobile device, wherein the portion of the information is related to a type of the network traffic data corresponding to with the mobile device participating in the detected network attack; and

    in response to another defined condition relating to the variable being determined to be satisfied, not altering at least another portion of the information received from the mobile device and generating an indicator facilitating disabling of a feature of the mobile device, wherein the other portion of the information is not related to the type of the network traffic data corresponding to the mobile device participating in the detected network attack.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×