Mitigating the impact from internet attacks in a RAN using internet transport
First Claim
1. A method, performed in a User Equipment (UE) associated with a Radio Access Network (RAN) using Internet transport, of mitigating impacts from Internet attacks, the method comprising:
- receiving, from a network node in the RAN, information associated with an Internet attack on a network node in the RAN and using Internet transport to provide services to UEs served by the RAN;
obtaining, based on the information, a mitigation action, the mitigation action mitigating the impact of the attack on a RAN service provided by the RAN; and
performing the obtained mitigation action to mitigate the impact on a service level for the RAN service.
1 Assignment
0 Petitions
Accused Products
Abstract
The present disclosure relates to methods and devices for mitigating the impact from Internet attacks in a Radio Access Network, RAN (10), using Internet transport. This object is obtained by a method performed in a User Equipment, UE (13) associated with the RAN (10) using Internet transport. The method comprises receiving from at least a network node (11, 12, 21, 22, 23) in the RAN (10), information associated with an Internet attack. Obtaining, based on the information, a mitigation action, the mitigation action mitigating the impact of the attack on the RAN service. The method further comprises to perform the obtained mitigation action to mitigate the impact on the RAN service level.
10 Citations
32 Claims
-
1. A method, performed in a User Equipment (UE) associated with a Radio Access Network (RAN) using Internet transport, of mitigating impacts from Internet attacks, the method comprising:
-
receiving, from a network node in the RAN, information associated with an Internet attack on a network node in the RAN and using Internet transport to provide services to UEs served by the RAN; obtaining, based on the information, a mitigation action, the mitigation action mitigating the impact of the attack on a RAN service provided by the RAN; and performing the obtained mitigation action to mitigate the impact on a service level for the RAN service. - View Dependent Claims (2, 3, 4)
-
-
5. A method, performed in a network node in a Radio Access Network (RAN) and using Internet transport to provide services to user equipments (UEs) served by the RAN, of mitigating impacts from Internet attacks, the method comprising:
-
obtaining intrusion detection information informing the network node that the network node is under an Internet attack via an Internet connection to the network node; selecting, based on the intrusion detection information, a mitigation action, wherein the mitigation action comprises sending a message comprising information associated with the Internet attack to a User Equipment (UE) connected to the RAN; and performing the selected mitigation action to mitigate the impact on a RAN service level. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A User Equipment (UE) configured for use with a Radio Access Network (RAN) using Internet transport, the UE comprising a processor and a memory, said memory containing instructions executable by said processor whereby said UE is configured to:
-
receive, from a network node in the RAN, information associated with an internet attack on a network node in the RAN and using Internet transport to provide services to UEs served by the RAN; obtain, based on the information, a mitigation action, the mitigation action mitigating the impact of the attack on a RAN service provided by the RAN; and perform the obtained mitigation action to mitigate the impact on a service level for the RAN service. - View Dependent Claims (17, 18, 19)
-
-
20. A network node configured for use in a Radio Access Network (RAN) and to use Internet transport to provide services to user equipments (UEs) served by the RAN, the network node comprising a processor and a memory, said memory containing instructions executable by said processor whereby said network node is configured to:
-
obtain intrusion detection information informing the network node that the network node is under an Internet attack via an Internet connection to the network node; select, based on the intrusion detection information, a mitigation action, wherein the mitigation action comprises sending a message comprising information associated with the internet attack to a User Equipment (UE) connected to the RAN; and perform the selected mitigation action to mitigate the impact on a RAN service level. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A non-transitory computer-readable storage medium, having stored thereupon a computer program that, when run in a network node in a Radio Access Network (RAN) and using Internet transport to provide services to user equipments (UEs) served by the RAN, causes the network node to:
-
obtain intrusion detection information informing the network node that the network node is under an Internet attack via an Internet connection to the network node; select, based on the intrusion detection information, a mitigation action, wherein the mitigation action comprises sending a message comprising information associated with the internet attack to a User Equipment (UE) connected to the RAN; and perform the selected mitigation action to mitigate the impact on a RAN service level.
-
-
32. A non-transitory computer-readable storage medium, having stored thereupon a computer program that, when run in a user equipment (UE) associated with a Radio Access Network (RAN) using Internet transport, causes the UE to:
-
receive, from a network node in the RAN, information associated with an internet attack on a network node in the RAN and using Internet transport to provide services to UEs served by the RAN; obtain, based on the information, a mitigation action, the mitigation action mitigating the impact of the attack on a RAN service provided by the RAN; and perform the obtained mitigation action to mitigate the impact on a service level for the RAN service.
-
Specification