US 12,395,846 B2
Rogue network function detection and isolation in a communication network
Saurabh Khare, Bangalore (IN); Narasimha Rao Pulipati, Redmond, WA (US); Nagendra Bykampadi, Bangalore (IN); and Suresh Nair, Whippany, NJ (US)
Assigned to NOKIA TECHNOLOGIES OY, Espoo (FI)
Appl. No. 18/001,928
Filed by Nokia Technologies Oy, Espoo (FI)
PCT Filed Jun. 24, 2021, PCT No. PCT/IB2021/055630
§ 371(c)(1), (2) Date Dec. 15, 2022,
PCT Pub. No. WO2021/260630, PCT Pub. Date Dec. 30, 2021.
Claims priority of application No. 202041027025 (IN), filed on Jun. 25, 2020.
Prior Publication US 2023/0247433 A1, Aug. 3, 2023
Int. Cl. H04W 12/06 (2021.01); H04L 9/40 (2022.01); H04W 12/122 (2021.01)
CPC H04W 12/122 (2021.01) [H04L 63/1441 (2013.01)] 5 Claims
OG exemplary drawing
 
1. An apparatus comprising:
at least one processor; and
at least one memory storing instructions that, when executed by the at least one processor, cause the apparatus at least to:
receive from at least one network entity in a communication network a message identifying one or more network entities suspected of malicious activity operating within the communication network; and
initiate one or more remedial actions within the communication network to prevent the one or more network entities suspected of malicious activity operating within the communication network from accessing other network entities in the communication network;
wherein initiating one or more remedial actions within the communication network to prevent the one or more network entities suspected of malicious activity operating within the communication network from accessing other network entities in the communication network further comprises blocking a discovery request from each one of the one or more network entities suspected of malicious activity operating within the communication network.