Doaa Mahmoud, András Bálint Tóth, E. Kail, Anna Bánáti
{"title":"5G Vulnarabilities from Security Operation Center's Perspective","authors":"Doaa Mahmoud, András Bálint Tóth, E. Kail, Anna Bánáti","doi":"10.1109/CINTI53070.2021.9668348","DOIUrl":null,"url":null,"abstract":"5G is not only a new generation of mobile communication generations, but it is a revolutionary technology that supports previous applications and enables new ones because of its great benefits such as high data rate, low latency, massive connectivity, and network reliability. However, the huge number of connected devices, the enablers technologies, reliance on virtualization and cloud services will lead to many new threats besides the old threats and attacks. Consequently, there is a serious need to find out these threats and check appropriate countermeasures, that ensure a robust and secure communication system. In this paper, we provide a brief review of 5G architecture and related security vulnerabilities that can be monitored and detected in a Security Operation Center.","PeriodicalId":340545,"journal":{"name":"2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CINTI53070.2021.9668348","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
5G is not only a new generation of mobile communication generations, but it is a revolutionary technology that supports previous applications and enables new ones because of its great benefits such as high data rate, low latency, massive connectivity, and network reliability. However, the huge number of connected devices, the enablers technologies, reliance on virtualization and cloud services will lead to many new threats besides the old threats and attacks. Consequently, there is a serious need to find out these threats and check appropriate countermeasures, that ensure a robust and secure communication system. In this paper, we provide a brief review of 5G architecture and related security vulnerabilities that can be monitored and detected in a Security Operation Center.