H04L2463/141

Configuring modular alert actions and reporting action performance information

Techniques and mechanisms are disclosed for configuring actions to be performed by a network security application in response to the detection of potential security incidents, and for causing a network security application to report on the performance of those actions. For example, users may use such a network security application to configure one or more modular alerts. As used herein, a modular alert generally represents a component of a network security application which enables users to specify security modular alert actions to be performed in response to the detection of defined triggering conditions, and which further enables tracking information related to the performance of modular alert actions and reporting on the performance of those actions.

Validating de-authentication requests

Systems, methods, and other embodiments associated with validating de-authentication requests to prevent spoofing are described. According to one embodiment, an apparatus includes a wireless controller configured to receive a de-authentication request and determine whether the de-authentication request is invalid based on the wireless controller's receipt of two or more responses to a timing request sent by the wireless controller. Only one response is expected. The two or more responses include the address of a first station.

SYSTEM AND METHOD FOR ANALYZING INTERNET TRAFFIC TO DETECT DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACK
20200280579 · 2020-09-03 ·

A system for analyzing internet traffic passing through an exposed computer device includes a preprocessing module for filtering the traffic so as to substantially isolate from the traffic features carrying data representative of a cyberattack, a perception module for extracting the data from the isolated features, a detection module for processing the extracted data to detect characteristics indicative of the cyberattack, and a mitigation module for generating responsive action if a cyberattack is detected.

METHODS AND SYSTEMS FOR MITIGATING DENIAL OF SERVICE (DOS) ATTACK IN A WIRELESS NETWORK
20200275279 · 2020-08-27 ·

The present disclosure relates to a pre-5.sup.th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond 4.sup.th-Generation (4G) communication system such as Long Term Evolution (LTE). Methods, network entities, and systems for mitigating Denial of Service (DoS) attack in a wireless network (e.g., access network (AN), core network (CN)). Embodiments herein disclose methods and systems for mitigating Denial of Service (DOS) attacks in wireless networks, by performing admission control by verifying a User Equipment's (UE's) registration request via a Closed Access Group (CAG) cell without performing a primary authentication. Embodiments herein disclose methods and system for verifying permissions of the UE to access a CAG cell based on the UE's Subscription identifier, before performing the primary authentication. Methods and systems for mitigating Denial of Service (DoS) attack in a wireless network. A method for mitigating Denial of Service (DOS) attacks in wireless networks includes requesting a public land mobile network (PLMN) for accessing a non-public network (NPN) through a Closed Access Group (CAG) cell, verifying the permissions of a user equipment (UE) to access the requested NPN through the CAG cell, and performing a primary authentication.

COMMUNICATIONS METHODS, SYSTEMS AND APPARATUS FOR PROTECTING AGAINST DENIAL OF SERVICE ATTACKS AND EFFICIENT ALLOCATION OF BANDWIDTH
20200259794 · 2020-08-13 ·

The present invention relates to methods, systems and apparatus for providing efficient packet flow fillrate adjustments and providing protection against distributed denial of service attacks. One exemplary embodiment in accordance with the invention is a method of operating a communication system including the steps of receiving, at a session border controller, a first SIP invite request message; making a decision, at the session border controller, as to whether the first SIP invite request originated from an Integrated Access Device or an IP-PBX device; generating, at the SBC, a packet flow fillrate based on said decision as to whether the SIP invite request originated at an Integrated Access Device or an Internet Protocol-Private Branch Exchange (IP-PBX) device.

DENIAL OF SERVICE ATTACK MITIGATION THROUGH DIRECT ADDRESS CONNECTION
20200259859 · 2020-08-13 ·

A method, computer program product, and a system where a processor(s) determines that a destination has been retained as a link in an application. The processor(s) monitors connections of the application to the destination retained as the link, where connecting is providing a locator of the destination to a server(s) to obtain an address for the destination. The processor(s) determines an average time period measured from providing the locator to the server(s) to obtaining the address. The processor(s) retains the returned address for each connection within a given time period. The processor(s) determines that the application has initiated a new connection to the destination and the new connection is incomplete after a time period calculated relative to the average time period has lapsed. The processor(s) provides selectable options in a user interface of the application that are the retained address(es).

System and method for cyber security threat detection
10728261 · 2020-07-28 · ·

A cyber security threat detection system for one or more endpoints within a computing environment is disclosed. The system includes one or more collector engines. Each of the collector engines includes a service and an agent operating on a corresponding system endpoint of the system endpoints. The service is configured to take a first snapshot of the corresponding system endpoint. The first snapshot includes event activity information associated with the system endpoint. The agent is configured to take a second snapshot of the corresponding system endpoint. The second snapshot includes behavioral activity information associated with the corresponding system endpoint. The system further includes an aggregator engine configured to aggregate the first snapshot and the second snapshot from each of the system endpoints into an aggregated snapshot. The system further includes one or more analytics engines configured to: generate and store baseline profiles associated with the system endpoints based on a previously received aggregated snapshot, receive the aggregated snapshot from the aggregator engine, determine deviation values for each of the system endpoints based on the received aggregated snapshot and the stored baseline profiles, and generate, for each of the system endpoints, a cumulative risk value based on the deviation values. The system further includes one or more alerting engines configured to determine whether to issue one or more alerts indicating one or more security threats have occurred for each of the endpoints in response to the cumulative risk value.

Systems and methods for mitigation of permanent denial of service attacks

Systems, methods, and non-transitory computer-readable media can perform verification of a currently stored BMC firmware on a remote access-enabled server based on a BMC security key. It can be determined that the currently stored BMC firmware cannot be verified based on the BMC security key. A replacement BMC firmware can be received over a network connection based on the determination that the currently stored BMC firmware cannot be verified. The currently stored BMC firmware can be replaced with the replacement BMC firmware.

System and method for cyber security threat detection
10701089 · 2020-06-30 · ·

A cyber security threat detection system for one or more endpoints within a computing environment is disclosed. The system comprises a plurality of collector engines. Each of the collector engines is previously installed on an endpoint of a plurality of endpoints and configured to acquire statistical information at the endpoint. The statistical information includes behavioral information, resource information, and metric information associated with the endpoint. The system further comprises an aggregator engine configured to aggregate the statistical information from each of the endpoints into aggregated information. The system further comprises an analytics engine configured to receive the aggregated information, and to invoke learning models to output deviation information for each of the endpoints based on the aggregated information and expected fingerprints associated with the endpoints. The system further comprises an alerting engine configured to issue one or more alerts indicating one or more security threats have occurred for each of the endpoints in response to the deviation information for the endpoint.

USING A BLOCKCHAIN FOR DISTRIBUTED DENIAL OF SERVICE ATTACK MITIGATION

Particular embodiments described herein provide for a system that can be configured to facilitate the use of a blockchain for distributed denial of service attack mitigation, the system can include a network security provider and a validating node. The network security provider can recognize that a distributed denial of service (DDoS) attack is occurring, create a block that includes data related to the DDoS attack, and publish the block that includes the data related to the DDoS attack for addition to a blockchain. The validating node can validate the block that includes the data related to the DDoS attack and the block that includes the data related to the DDoS attack can be added to the blockchain. The block that includes the data related to the DDoS attack can be analyzed to determine how to mitigate a similar DDoS attack.