5G Vulnarabilities from Security Operation Center's Perspective

Doaa Mahmoud, András Bálint Tóth, E. Kail, Anna Bánáti
{"title":"5G Vulnarabilities from Security Operation Center's Perspective","authors":"Doaa Mahmoud, András Bálint Tóth, E. Kail, Anna Bánáti","doi":"10.1109/CINTI53070.2021.9668348","DOIUrl":null,"url":null,"abstract":"5G is not only a new generation of mobile communication generations, but it is a revolutionary technology that supports previous applications and enables new ones because of its great benefits such as high data rate, low latency, massive connectivity, and network reliability. However, the huge number of connected devices, the enablers technologies, reliance on virtualization and cloud services will lead to many new threats besides the old threats and attacks. Consequently, there is a serious need to find out these threats and check appropriate countermeasures, that ensure a robust and secure communication system. In this paper, we provide a brief review of 5G architecture and related security vulnerabilities that can be monitored and detected in a Security Operation Center.","PeriodicalId":340545,"journal":{"name":"2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CINTI53070.2021.9668348","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

5G is not only a new generation of mobile communication generations, but it is a revolutionary technology that supports previous applications and enables new ones because of its great benefits such as high data rate, low latency, massive connectivity, and network reliability. However, the huge number of connected devices, the enablers technologies, reliance on virtualization and cloud services will lead to many new threats besides the old threats and attacks. Consequently, there is a serious need to find out these threats and check appropriate countermeasures, that ensure a robust and secure communication system. In this paper, we provide a brief review of 5G architecture and related security vulnerabilities that can be monitored and detected in a Security Operation Center.
安全运营中心视角下的5G漏洞
5G不仅是新一代移动通信一代,而且由于具有高数据速率、低延迟、大规模连接和网络可靠性等巨大优势,它是一项支持旧应用并启用新应用的革命性技术。然而,大量的连接设备、使能技术、对虚拟化和云服务的依赖,除了旧的威胁和攻击之外,还会导致许多新的威胁。因此,迫切需要找出这些威胁并检查适当的对策,以确保一个健全和安全的通信系统。在本文中,我们简要回顾了5G架构和相关的安全漏洞,这些安全漏洞可以在安全运营中心中进行监控和检测。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信