Intel Corporation
ATTACKER LOCALIZATION BASED ON TRACKING ANOMALY PROPAGATION IN TIME-SENSITIVE NETWORKING
Last updated:
Abstract:
Systems, apparatuses and methods may provide for technology that detects one or more non-compliant nodes with respect to a timing schedule, detects one or more compliant nodes with respect to the timing schedule, and identifies a malicious node based on positions of the one or more non-compliant nodes and the one or more compliant nodes in a network topography. The non-compliant node(s) and the compliant node(s) may be detected based on post-synchronization messages, historical attribute data and/or plane diversity data.
Status:
Application
Type:
Utility
Filling date:
24 Sep 2021
Issue date:
13 Jan 2022