GB201111326D0 - Telecommunication network - Google Patents
Telecommunication networkInfo
- Publication number
- GB201111326D0 GB201111326D0 GBGB1111326.3A GB201111326A GB201111326D0 GB 201111326 D0 GB201111326 D0 GB 201111326D0 GB 201111326 A GB201111326 A GB 201111326A GB 201111326 D0 GB201111326 D0 GB 201111326D0
- Authority
- GB
- United Kingdom
- Prior art keywords
- thresholds
- erroneous operation
- traffic
- mobile
- telecommunication network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/40—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- H04L29/06884—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5003—Managing SLA; Interaction between SLA and QoS
- H04L41/5019—Ensuring fulfilment of SLA
- H04L41/5025—Ensuring fulfilment of SLA by proactively reacting to service quality change, e.g. by reconfiguration after service quality degradation or upgrade
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/535—Tracking the activity of the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/128—Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/08—Testing, supervising or monitoring using real traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/12—Access point controller devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/14—Backbone network devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0805—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
- H04L43/0817—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/10—Flow control between communication endpoints
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Quality & Reliability (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A wireless communications network between mobile user equipment and a core network includes multiple nodes base stations (BTS, nodeB), controllers (BSC) and gateways (GGSN, SGSN). Each of these may include an application which monitors data/traffic from the mobile terminals to determine if any are malfunctioning. The malfunction may be due to a fault, virus/malware infection or other reason. The monitor compares mobile terminal behaviour with thresholds for correct and erroneous operation A,B,C,D and if it is determined F that the device is misbehaving a management event (eg. blocking/limiting network traffic access) is triggered H. The normal/erroneous operation thresholds may be based on historical records G or uploaded signatures. The thresholds may be specific to a device, a device family or a particular application running on a device.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB1011167.2A GB201011167D0 (en) | 2010-07-02 | 2010-07-02 | Virus control in telecommunication networks |
GB1015219.7A GB2473717B (en) | 2009-09-16 | 2010-09-13 | Telecommunication network |
Publications (3)
Publication Number | Publication Date |
---|---|
GB201111326D0 true GB201111326D0 (en) | 2011-08-17 |
GB2481900A GB2481900A (en) | 2012-01-11 |
GB2481900B GB2481900B (en) | 2015-02-11 |
Family
ID=42669102
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GBGB1011167.2A Ceased GB201011167D0 (en) | 2010-07-02 | 2010-07-02 | Virus control in telecommunication networks |
GB1111326.3A Active GB2481900B (en) | 2010-07-02 | 2011-07-04 | Telecommunication networks |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GBGB1011167.2A Ceased GB201011167D0 (en) | 2010-07-02 | 2010-07-02 | Virus control in telecommunication networks |
Country Status (1)
Country | Link |
---|---|
GB (2) | GB201011167D0 (en) |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030149887A1 (en) * | 2002-02-01 | 2003-08-07 | Satyendra Yadav | Application-specific network intrusion detection |
US20040162781A1 (en) * | 2003-02-14 | 2004-08-19 | Kennsco, Inc. | Monitoring and alert systems and methods |
US7761923B2 (en) * | 2004-03-01 | 2010-07-20 | Invensys Systems, Inc. | Process control methods and apparatus for intrusion detection, protection and network hardening |
US7904960B2 (en) * | 2004-04-27 | 2011-03-08 | Cisco Technology, Inc. | Source/destination operating system type-based IDS virtualization |
GB2421142A (en) * | 2004-12-09 | 2006-06-14 | Agilent Technologies Inc | Detecting malicious traffic in a communications network |
FI20050561A0 (en) * | 2005-05-26 | 2005-05-26 | Nokia Corp | Processing of packet data in a communication system |
US7496348B2 (en) * | 2005-06-07 | 2009-02-24 | Motorola, Inc. | Wireless communication network security method and system |
US20070206546A1 (en) * | 2006-03-02 | 2007-09-06 | Alberth William P Jr | Method and apparatus for preventing denial of service attacks on cellular infrastructure access channels |
US8180873B2 (en) * | 2006-11-14 | 2012-05-15 | Fmr Llc | Detecting fraudulent activity |
-
2010
- 2010-07-02 GB GBGB1011167.2A patent/GB201011167D0/en not_active Ceased
-
2011
- 2011-07-04 GB GB1111326.3A patent/GB2481900B/en active Active
Also Published As
Publication number | Publication date |
---|---|
GB2481900A (en) | 2012-01-11 |
GB201011167D0 (en) | 2010-08-18 |
GB2481900B (en) | 2015-02-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2014168835A3 (en) | Application traffic pairing | |
WO2012064729A3 (en) | SURGE PROTECTION DEVICE USING METAL OXIDE VARISTORS (MOVs) AS THE ACTIVE ENERGY CONTROL MULTIPLE GAP DISCHARGING CHAIN | |
WO2011139923A3 (en) | Mobile device bandwidth throttling | |
EP3955519A3 (en) | Methods and systems for protecting a secured network | |
WO2014052436A3 (en) | Heterogeneous self-organizing network for access and backhaul | |
WO2007121375A3 (en) | Systems and methods for characterizing the performance of a wireless network | |
WO2014052044A3 (en) | Congestion control for radio access networks (ran) | |
EP2704375B1 (en) | Network device, communication system, method for detecting abnormal traffic, and program | |
NZ603631A (en) | Device- assisted services for protecting network capacity | |
EP2842363B1 (en) | Heterogeneous network policy based management with probability reporting and policy self-allocation | |
IN2014KN02343A (en) | ||
EP2571327A4 (en) | Method and system for reporting fixed network access information | |
WO2012153951A3 (en) | User equipment and method for managing backoff time in the user equipment | |
WO2013028002A3 (en) | Processing state information | |
EP3625932A4 (en) | Wireless communication access node (wcan) device based policy enforcement and statistics collection in anchorless communication systems | |
ES2825649T3 (en) | Policy generation method and apparatus to improve network system performance | |
MX2015016113A (en) | METHODS AND SYSTEMS FOR DYNAMIC SPECTRUM ARBITRAGE WITH HOME eNodeBs. | |
EP3963867A4 (en) | Device data protection based on network topology | |
US8929243B2 (en) | Network monitoring device | |
MY171606A (en) | Server and method for managing access of terminal to connection blocked reaource, and terminal | |
MX360505B (en) | System and method of performance measurements for wireless local area network access points. | |
MX2017004365A (en) | Monitoring an ability of a high latency wireless device to receive downlink data. | |
WO2014165374A3 (en) | Management of communications with multiple access points based on inter-access point communications | |
BR112013008077A2 (en) | mobile communication method, mobility management node, server access circuit appliance, packet data network access circuit appliance, policy controller, and packet switch | |
GB201111326D0 (en) | Telecommunication network |