Abstract:
The invention relates to a protection unit for protecting a packet-based network from attacks, comprising: a signature analyzer for analyzing a packet stream received in a security border node of the packet-based network and for detecting attacks by comparing signatures of the packet stream with a set of signatures of previously identified attacks, an anomaly detector for detecting anomalies in the packet stream, and a signature interference unit for updating the set of signatures when anomalies in the packet stream are detected, the updated set of signatures being subsequently used for performing the signature analysis. A distribution unit distributes at least one signature of the updated set of signatures to at least one further security border node of the packet-based network. The invention also relates to a security border node comprising such a protection unit, a network comprising at least two such protection units, and a corresponding protection method.
Abstract:
The invention concerns a method of providing a Push-to-Talk (=PTT) service within one or more telecommunication networks (1, 2, 3, 4) by means of a gateway-server (5) which sets up a virtual connection per PTT connection. The virtual connection provides information about the participating terminals (10, 20, 30, 40) of the PTT connection, the service type to reach each terminal (10, 20, 30, 40), and the connection status of each terminal (10, 20, 30, 40). Thus, the gateway-server (5) is capable of providing the PTT service within and/or across different telecommunication networks comprising radio access telecommunication networks (1), fixed wire-line telecommunication networks (2), circuit-switched telecommunication networks (3), and packet-switched telecommunication networks (4).
Abstract:
A method to establish an Internet connection between a first (1) and a second (2) user agent is described, wherein a NAT-table entry in a controllable NAT (7) located in the Internet (3) is generated, wherein said NAT-table entry comprises public IP-address:Port pairs that are communicated to the user agents (1, 2), wherein the user agents (1, 2) use said public IP-address:port pairs for establishing an Internet connection between each other via the controllable NAT (7).
Abstract:
For traffic mixing, an implementation involves generating a random element in a device that detects nondeterministic events already occurring in operation of the device and mapping them to the random element by means of an assignment rule. The traffic mixing in an ATM switching element (SE) is achieved by cyclically writing data packets into a buffer (MEM) and cyclically reading data packets out of a buffer (MEM). The write cycle in this case is clocked by the arrival of a data packet, that is, by a nondeterministic event. The read cycle is clocked by a stable clock signal.
Abstract:
To be able to load an ATM switching network as efficiently as possible, the successive cells of one and the same connection are routed to the output by as many different paths as possible; however, mutual overtaking of successive cells must be avoided or corrected. Each cell is held at the output until it is certain that no older cell can be buffered in the switching network. Before the cell is passed on, a check is made to determine whether the cells received from the switching network later include an older cell which must be passed on before that cell. At the input end, consecutive numbers ("Sequence Numbers") are allocated to the cells. A buffer (1) at the output end is operated, at least in part (1 . . . d), in the manner of a shift register, thereby introducing a predetermined delay. Prior to the output of a cell, at least the shift-register-like portion of the buffer is examined as to whether a cell written in later is to be put out earlier: if so, the two cells are interchanged.
Abstract:
A procedure for operating a server (SERV) that supplies subscribers with data streams of different contents (CONT1 to CONT3), as well as a server and a control unit for executing the procedure. The contents (CONT1 to CONT3) are each stored in a memory unit or in several memory units of the server, and in order to supply a subscriber (SUB1 to SUB8) with a data stream of a particular content, the particular content is read out from the memory unit or from one of the memory units in which the content is stored, and sent to the subscriber as a data stream. A Busy list is set up for each of the contents (CONT1 to CONT3) stored in the memory units (DSD1 to DSD5) of the server (SERV). Each memory unit (DSD1 to DSD4) in which a content is stored, is allocated to the Busy list of the content stored in it. Each memory unit (DSD5) that is not at that time needed for supplying a subscriber, is allocated to a Free list. If a further memory unit is needed in order to supply subscriber with a particular content, a memory unit allocated to the Free list is selected for this purpose, and it is first attempted to select a memory unit allocated to the Free list that is also allocated to the Busy list of the particular content.
Abstract:
A method of operating a switching network, a switching network, and an exchange with such a switching network are described. The switching network consists of several switching modules and an interconnect network between these switching modules. The interconnect network includes a switch unit and interconnects the switching modules in accordance with a logic interconnection structure. The switch unit is simple and can be implemented by all-optical means. By means of the switch unit the logic interconnection structure can be reconfigured. This makes it possible to reconfigure the switching network in the event of a failure of a switching module or according to the load characteristic (video, voice, computer-computer communication). Further, a uniform switch unit can be used to meet different requirements ("flexible hardware").
Abstract:
A buffer or other communications resource in, e.g., an ATM switch element receives random data which is then used by different data sinks. After the data has been outputted to the data sinks, the communications resource (e.g., the memory locations of the buffer) are released, i.e., labeled as free again. However, a resource which is not marked as free as a result of an error (whether erroneously the data is not retrieved or whether the release procedure is erroneous) remains blocked. To avoid permanent blockage of those memory locations whose contents have been in the buffer so long that they definitely (or at least very likely) should have been called for, information on the time of entry is stored together with the data. All memory locations are checked at regular intervals for the age of their contents. Upon attainment of a predetermined age, the location is labeled as free.
Abstract:
The network computing cluster includes one or more network computing stations and one or more power autarkic network computing stations supplied by one or more associated local power generators. The power autarkic network computing stations and the local power generators are connected with a local power network. A control signal is sent to a resource managing unit of the network computing cluster via a communication network. The control signal indicates the ability of the power autarkic network computing stations to process IT-services. The resource managing unit receives the control signal via the communication network. Triggered by the control signal, the resource managing unit sends a signal for transferring an IT-service processed by a network computing station of the network computing stations to the network computing station via the communication network. The processed IT-service is transferred to one of the power autarkic network computing stations via the communication network.
Abstract:
The invention relates to a security border node (2a) for protecting a packet-based network from attacks, comprising: an anomaly detection unit (10) for performing an anomaly detection, in particular a statistical analysis, on session control messages (11), in particular on SIP messages contained in a packet stream (5) received in the security border node (2a). The security border node further comprises a message context provisioning unit (13) for providing at least one session control message (11) to the anomaly detection unit (10) together with message context information (12, 17, 24) related to a client (22) and/or to a session (23) to which the session control message (11, 11a to 11f) is attributed. The invention also relates to a method for protecting a packet-based network from attacks, to a computer program product, and to a packet-based network.