5G Vulnarabilities from Security Operation Center's Perspective

Doaa Mahmoud, András Bálint Tóth, E. Kail, Anna Bánáti
{"title":"5G Vulnarabilities from Security Operation Center's Perspective","authors":"Doaa Mahmoud, András Bálint Tóth, E. Kail, Anna Bánáti","doi":"10.1109/CINTI53070.2021.9668348","DOIUrl":null,"url":null,"abstract":"5G is not only a new generation of mobile communication generations, but it is a revolutionary technology that supports previous applications and enables new ones because of its great benefits such as high data rate, low latency, massive connectivity, and network reliability. However, the huge number of connected devices, the enablers technologies, reliance on virtualization and cloud services will lead to many new threats besides the old threats and attacks. Consequently, there is a serious need to find out these threats and check appropriate countermeasures, that ensure a robust and secure communication system. In this paper, we provide a brief review of 5G architecture and related security vulnerabilities that can be monitored and detected in a Security Operation Center.","PeriodicalId":340545,"journal":{"name":"2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CINTI53070.2021.9668348","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

5G is not only a new generation of mobile communication generations, but it is a revolutionary technology that supports previous applications and enables new ones because of its great benefits such as high data rate, low latency, massive connectivity, and network reliability. However, the huge number of connected devices, the enablers technologies, reliance on virtualization and cloud services will lead to many new threats besides the old threats and attacks. Consequently, there is a serious need to find out these threats and check appropriate countermeasures, that ensure a robust and secure communication system. In this paper, we provide a brief review of 5G architecture and related security vulnerabilities that can be monitored and detected in a Security Operation Center.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
安全运营中心视角下的5G漏洞
5G不仅是新一代移动通信一代,而且由于具有高数据速率、低延迟、大规模连接和网络可靠性等巨大优势,它是一项支持旧应用并启用新应用的革命性技术。然而,大量的连接设备、使能技术、对虚拟化和云服务的依赖,除了旧的威胁和攻击之外,还会导致许多新的威胁。因此,迫切需要找出这些威胁并检查适当的对策,以确保一个健全和安全的通信系统。在本文中,我们简要回顾了5G架构和相关的安全漏洞,这些安全漏洞可以在安全运营中心中进行监控和检测。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Clustering of Business Organisations based on Textual Data - An LDA Topic Modeling Approach Effective ECG data conversion solution to solve ECG data interoperability problems Adaptive Online Opponent Game Policy Modeling with Association Rule Mining Meat Factory Cell: Assisting meat processors address sustainability in meat production Validation of a Self-developed Algorithm for Solving Inverse Problems on Impedance Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1