US 12,301,599 B2
Attacker localization based on tracking anomaly propagation in time-sensitive networking
Marcio Juliato, Portland, OR (US); Javier Perez-Ramirez, North Plains, OR (US); Vuk Lesi, Cornelius, OR (US); Dave Cavalcanti, Portland, OR (US); Manoj Sastry, Portland, OR (US); Christopher Gutierrez, Hillsboro, OR (US); Qian Wang, Portland, OR (US); and Shabbir Ahmed, Beaverton, OR (US)
Assigned to INTEL CORPORATION, Santa Clara, CA (US)
Filed by Intel Corporation, Santa Clara, CA (US)
Filed on Sep. 24, 2021, as Appl. No. 17/484,197.
Prior Publication US 2022/0014540 A1, Jan. 13, 2022
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/1425 (2013.01) 15 Claims
OG exemplary drawing
 
11. A method comprising:
detecting one or more non-compliant nodes with respect to a timing schedule;
detecting one or more compliant nodes with respect to the timing schedule, wherein the timing schedule is based on one or post-synchronization messages that are based on one or more remote performance measurements including one or more frame ingress time measurements; and
identifying a malicious node based on positions of the one or more non-compliant nodes and the one or more compliant nodes in a network topography, wherein the positions refer to placements of the one or more non-compliant nodes and the one or more compliant nodes with respect to one or more paths within the network topography, wherein the one or more non-compliant nodes and the one or more compliant nodes are to be detected based on the one or more post-synchronization messages.