Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for processing an alert message indicating the detection of an anomaly in traffic transmitted via a network

A technology of network devices and processing methods, which is applied in the direction of security devices, transmission systems, electrical components, etc., and can solve problems such as service quality and network performance impact

Pending Publication Date: 2021-12-03
ORANGE SA (FR)
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 5G mobile networks are opening unprecedented prospects for use with the advanced communication technologies they implement and specifically the new capabilities they offer in terms of data rates, information volumes and connections, which pose real challenges in terms of cybersecurity
This architecture causes a lot of overhead (or leftovers) in the network, which can negatively impact quality of service and network performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for processing an alert message indicating the detection of an anomaly in traffic transmitted via a network
  • Method and device for processing an alert message indicating the detection of an anomaly in traffic transmitted via a network
  • Method and device for processing an alert message indicating the detection of an anomaly in traffic transmitted via a network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0095] figure 1 A monitoring system 1 according to the invention for monitoring a communication network NW is shown in its context in a particular embodiment.

[0096] exist figure 1 In the example envisaged in , the network NW is a 5G (fifth generation) communication network comprising a core network CN to which user equipment of the network can be connected via an access network, eg a cellular mobile access network. However, these assumptions are not limiting, and the invention is applicable to other types of networks, such as 2G, 3G or even 4G networks.

[0097] In a manner known per se, a 5G network such as a network NW provides the option for a variety of user equipment (often referred to herein as UE) to benefit from connectivity (i.e. be "connected"): Vehicles (e.g. land vehicles or aircraft ); IoT (for "Internet of Things") objects such as sensors and watches; smart terminals such as smartphones, digital tablets, and laptops. These user devices are of a highly diver...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for processing, by a device (AP) in a network (NW), a message received by user equipment (UE) connected to the network, said alert message indicating the detection of an anomaly by the user equipment in traffic transmitted via the network, said processing method comprising: - a step of obtaining from the alert message at least one piece of information which is representative of at least one user equipment constraint; - a step of processing, by means of an algorithm for detecting cyber attacks, traffic characteristics provided by the user equipment and associated with the detected anomaly, the algorithm for detecting cyber attacks being chosen and / or configured according to the at least one piece of information; and - a step of determining from the at least one piece of information, according to an outcome of the processing step, and if a cyber attack is detected, a response to the user equipment regarding the detected anomaly.

Description

technical field [0001] The invention relates to the field of telecommunications in general. [0002] More specifically, the present invention relates to a mechanism for detecting cyber-attacks in electronic communication networks. Background technique [0003] There are no additional restrictions on the nature of the network. However, the invention is preferably applicable to mobile networks, and in particular fifth generation or 5G mobile networks. [0004] With the advanced communication technologies it implements and specifically the new capabilities it offers in terms of data rate, information volume and connectivity, 5G mobile networks are opening unprecedented prospects for use, which pose real challenges in terms of cybersecurity. Over the past few years, many intrusion detection techniques (or IDS, for "Intrusion Detection System") and defense techniques have been developed based on proactive approaches which on the one hand enable the prediction and reduction of v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/14H04L63/1408H04W12/121H04W12/122H04L63/1416
Inventor H.塞德杰尔马奇T.卡波-奇奇
Owner ORANGE SA (FR)