首页> 外国专利> METHODS, NODES AND OPERATOR NETWORK FOR ENABLING MANAGEMENT OF AN ATTACK TOWARDS AN APPLICATION

METHODS, NODES AND OPERATOR NETWORK FOR ENABLING MANAGEMENT OF AN ATTACK TOWARDS AN APPLICATION

机译:方法,节点和操作网络,用于使攻击攻击攻击

摘要

Methods, a user data node (120), a policy node (150), an application node (170) and an operator network (101) for enabling management of an attack towards an application (190) hosted by the application node (170) are disclosed. The policy node (150) receives (3) attack information and an identifier of the application (190) to which the attack information applies. The attack information relates to the management of the attack and the attack information comprises a type of attack, a set of detection conditions relating to detection of attacks of the type of attack, and a mitigation action to be invoked when at least one detection condition of the set of detection conditions is fulfilled. In this manner, degeneration of the application (190) caused by the attacks of the type of attack is mitigatable. The policy node (150) generates (13) at least one rule based on the attack information. Moreover, the operator network (101) transfers (14, 15), from the policy node to the user data node (120), said at least one rule. The user data node (120) detects (18), in traffic towards the application (190), the attack while utilizing said at least one rule. Corresponding computer programs and computer program carriers are also disclosed.
机译:方法,用户数据节点( 120 ),策略节点( 150 ),应用节点( 170 )和操作员网络(< B> 101 用于使管理攻击朝向应用节点( 170 )托管的应用程序( 190 )。策略节点( 150 )接收( 3 )攻击信息和攻击信息适用的应用程序的标识符( 190 )。攻击信息涉及攻击的管理和攻击信息包括一种攻击类型,一组与攻击类型的攻击有关的检测条件,以及当至少一个检测条件时要调用的缓解动作满足了检测条件集。以这种方式,由攻击类型的攻击引起的应用( 190 )的退化是可期待的。策略节点( 150 )基于攻击信息生成至少一个规则( 13 )。此外,从策略节点到用户数据节点( 120 ),操作员网络( 101 )转移( 14,15 )至少一个规则。用户数据节点( 120 )检测到( 18 ),在流量到应用程序( 190 ),攻击在利用所述至少一个规则。还公开了相应的计算机程序和计算机程序载波。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号