Mitigating the impact from internet attacks in a RAN using internet transport
First Claim
1. A method, performed in a network node in a Radio Access Network (RAN) and using Internet transport to provide services to user equipments (UEs) served by the RAN, of mitigating impacts from Internet attacks, the method comprising:
- obtaining intrusion detection information informing the network node that the network node is under attack via an Internet connection to the network node;
selecting, based on the intrusion detection information, a mitigation action, the mitigation action mitigating the impact of the attack on a RAN service provided by the RAN; and
performing the selected mitigation action to mitigate the impact on a service level for the RAN service.
1 Assignment
0 Petitions
Accused Products
Abstract
The present disclosure relates to methods and devices for mitigating the impact from Internet attacks in a Radio Access Network, RAN, using Internet transport. This object is obtained by a method performed in network node in a RAN, using Internet transport. The method comprises obtaining intrusion detection information informing the network node that the RAN is under attack. The method further comprises selecting, based on the intrusion detection information, a mitigation action, the mitigation action mitigating the impact of the attack on the RAN service. Further the method comprises performing the selected mitigation action to mitigate the impact on the RAN service level.
-
Citations
23 Claims
-
1. A method, performed in a network node in a Radio Access Network (RAN) and using Internet transport to provide services to user equipments (UEs) served by the RAN, of mitigating impacts from Internet attacks, the method comprising:
-
obtaining intrusion detection information informing the network node that the network node is under attack via an Internet connection to the network node; selecting, based on the intrusion detection information, a mitigation action, the mitigation action mitigating the impact of the attack on a RAN service provided by the RAN; and performing the selected mitigation action to mitigate the impact on a service level for the RAN service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A network node configured for use in a Radio Access Network (RAN) and to use Internet transport to provide services to user equipments (UEs) served by the RAN, the network node comprising a processor and a memory, said memory containing instructions executable by said processor, whereby said network node is configured to:
-
obtain intrusion detection information informing the network node that the network node is under attack via an Internet connection to the network node; select, based on the intrusion detection information, a mitigation action, the mitigation action mitigating the impact of the attack on a RAN service provided by the RAN; and perform the selected mitigation action to mitigate the impact on a service level for the RAN service. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A non-transitory computer-readable storage medium, having stored thereupon a computer program that, when run in a network node in a Radio Access Network (RAN) and using Internet transport to provide services to user equipments (UEs), causes the network node to:
-
obtain intrusion detection information informing the network node that the network node is under attack via an Internet connection to the network node; select, based on the intrusion detection information, a mitigation action, the mitigation action mitigating the impact of the attack on a RAN service provided by the RAN; and perform the selected mitigation action to mitigate the impact on a service level for the RAN service.
-
Specification