A technique for recognizing malicious traffic in IP networks coupled with
an identification and notification of a mobile subscriber generating or
receiving malicious traffic is provided. An embodiment of the present
invention may include intrusively or non-intrusively monitoring in
real-time the mobile subscriber's data traffic for malicious traffic as
well as mobile security intrusion attempts. Another embodiment of the
present invention may report the identification of those mobile
subscribers generating or receive malicious traffic to an operator. By
knowing the identity of the mobile subscriber, an embodiment of the
present invention may block the mobile subscriber's subscription or alert
the mobile subscriber in question about the malicious traffic. One
embodiment of the present invention may be applied to mobile networks
where the mobile subscriber's identity is known by an unique identifier
(e.g., an IMSI or a phone number) and where a notification system may be
implemented using a messaging service e.g., SMS, MMS, IM, email, or
voice.