H04L61/4552

Domain name service (DNS) server cache table validation

In some embodiments, a method stores domain name system (DNS) resolution mappings from a domain name to an address in a first table. The DNS resolution mappings are intercepted from DNS responses being sent by a DNS server. The first table is sent to a manager for validation of the DNS resolution mappings. Then, a second table is received from the manager that contains validated DNS resolution mappings. The method intercepts a DNS response that includes a domain name to address resolution mapping from the DNS server and validates the domain name to address resolution mapping using a validated DNS resolution mapping in the second table.

ETHERNET PDU SERVICE FOR 5G NETWORKS
20230033048 · 2023-02-02 ·

An Ethernet protocol data unit (PDU) over 5G service is provided. A network device in a core network stores addresses of advertised subnets, associated with multiple user equipment or customer premises equipment (UE/CPE) devices, in a subnet table that correlates a MAC address of each of the multiple UE/CPE devices to a subnet address. The network device receives an allocation and retention priority (ARP) request over a data link layer. The ARP request indicates an IP address for a target host of a data flow. The network device determines, based on the subnet table and the IP address, a MAC address of one UE/CPE device servicing the host address. The network device sends a directed ARP request to the UE/CPE device using the MAC address, receives in response a target MAC address for the target host, and sends a response to the ARP request with the target MAC address.

Method for protecting a private computer network
11489852 · 2022-11-01 · ·

The disclosure relates to a method of collecting data from a directory service used to administer a private network comprising a group of interconnected computers (PDS, PC), the directory service collecting data relating to objects in the network, the method comprising the steps of: connecting a terminal (PC) to a network server (PDS) including an instance of the directory service, configuring the instance of the directory service on the server by the terminal, so that the terminal is notified of modifications made to the directory service data, receiving by the terminal notification messages (NTF) containing modified directory service data transmitted by the server, and processing each of the received notification messages to determine the modifications made to the directory service data.

Method for protecting a private computer network
11489852 · 2022-11-01 · ·

The disclosure relates to a method of collecting data from a directory service used to administer a private network comprising a group of interconnected computers (PDS, PC), the directory service collecting data relating to objects in the network, the method comprising the steps of: connecting a terminal (PC) to a network server (PDS) including an instance of the directory service, configuring the instance of the directory service on the server by the terminal, so that the terminal is notified of modifications made to the directory service data, receiving by the terminal notification messages (NTF) containing modified directory service data transmitted by the server, and processing each of the received notification messages to determine the modifications made to the directory service data.

RESTRICTING ONBOARD TRAFFIC

Techniques for providing more efficient onboarding traffic protocols in a standalone non-public network architecture are provided. A network entity includes processing circuitry and at least one memory including computer program code. The at least one memory and the computer program code configured to, with the processing circuitry, cause the network entity at least to generate one or more traffic filter rules for a traffic filter set. The one or more traffic filter rules or traffic detection rules are generated based at least in part on domain name service query response information related to one or more user device originated domain name service queries. The network entity may further be configured to cause a user plane function to be provided with the one or more traffic filter rules.

System and method for providing network support services and premises gateway support infrastructure

A service management system communicates via wide area network with gateway devices located at respective user premises. The service management system remotely manages delivery of application services, which can be voice controlled, by a gateway, e.g. by selectively activating/deactivating service logic modules in the gateway. The service management system also may selectively provide secure communications and exchange of information among gateway devices and among associated endpoint devices. An exemplary service management system includes a router connected to the network and one or more computer platforms, for implementing management functions. Examples of the functions include a connection manager for controlling system communications with the gateway devices, an authentication manager for authenticating each gateway device and controlling the connection manager and a subscription manager for managing applications services and/or features offered by the gateway devices. A service manager, controlled by the subscription manager, distributes service specific configuration data to authenticated gateway devices.

System and method for providing network support services and premises gateway support infrastructure

A service management system communicates via wide area network with gateway devices located at respective user premises. The service management system remotely manages delivery of application services, which can be voice controlled, by a gateway, e.g. by selectively activating/deactivating service logic modules in the gateway. The service management system also may selectively provide secure communications and exchange of information among gateway devices and among associated endpoint devices. An exemplary service management system includes a router connected to the network and one or more computer platforms, for implementing management functions. Examples of the functions include a connection manager for controlling system communications with the gateway devices, an authentication manager for authenticating each gateway device and controlling the connection manager and a subscription manager for managing applications services and/or features offered by the gateway devices. A service manager, controlled by the subscription manager, distributes service specific configuration data to authenticated gateway devices.

Synchronizing Metadata A Cloud-Based Storage System

Symmetric storage using a cloud-based storage system, including: receiving, at a cloud-based storage system among storage systems synchronously replicating a dataset, an I/O operation directed to the dataset; determining, in dependence upon the I/O operation, a metadata update describing a mapping of segments of content to an address within a storage object, wherein the storage object includes the dataset; and synchronizing metadata on another storage system of the storage systems by sending the metadata update from the cloud-based storage system to the other storage system to update a metadata representation on the second storage system in accordance with the metadata update.

Synchronizing Metadata A Cloud-Based Storage System

Symmetric storage using a cloud-based storage system, including: receiving, at a cloud-based storage system among storage systems synchronously replicating a dataset, an I/O operation directed to the dataset; determining, in dependence upon the I/O operation, a metadata update describing a mapping of segments of content to an address within a storage object, wherein the storage object includes the dataset; and synchronizing metadata on another storage system of the storage systems by sending the metadata update from the cloud-based storage system to the other storage system to update a metadata representation on the second storage system in accordance with the metadata update.

UNSUPERVISED ENCODER-DECODER NEURAL NETWORK SECURITY EVENT DETECTION

A method may include a processing system having at least one processor obtaining a first plurality of domain name system traffic records, generating an input aggregate vector from the first plurality of domain name system traffic records, where the input aggregate vector comprises a plurality of features derived from the first plurality of domain name system traffic records, and applying an encoder-decoder neural network to the input aggregate vector to generate a reconstructed vector, where the encoder-decoder neural network is trained with a plurality of aggregate vectors generated from a second plurality of domain name system traffic records. In one example, the processing system may then calculate a distance between the input aggregate vector and the reconstructed vector, and apply at least one remedial action associated with the first plurality of domain name system traffic records when the distance is greater than a threshold distance.