{"title":"在安全运营中心监控5G网络","authors":"M. Kecskés, Miklós Orsós, E. Kail, Anna Bánáti","doi":"10.1109/CINTI53070.2021.9668469","DOIUrl":null,"url":null,"abstract":"5G mobile network is still a new technology in the telecommunication and this new technology brings new challenges into IT security. It is essential to capture, monitor and analyze the traffic of 5G networks. The 5G network is gaining more and more popularity in the different areas of the industry and everyday life. The diversity of this new technology raises new security challenges and new vulnerabilities. Currently 5G networks are not properly protected from malicious traffic. To protect their systems and networks, companies more widely set up Security Operations Centers (SOC) for monitoring and analyzing network traffic and events. However, there is no proper methodology yet to use SOC in 5G networks. In this paper, we study the possible methods of network monitoring focusing on the RAN, especially on Radio interface and end devices of 5G networks and search for potential extension solutions to our existing SOC.","PeriodicalId":340545,"journal":{"name":"2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Monitoring 5G networks in Security Operation Center\",\"authors\":\"M. Kecskés, Miklós Orsós, E. Kail, Anna Bánáti\",\"doi\":\"10.1109/CINTI53070.2021.9668469\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"5G mobile network is still a new technology in the telecommunication and this new technology brings new challenges into IT security. It is essential to capture, monitor and analyze the traffic of 5G networks. The 5G network is gaining more and more popularity in the different areas of the industry and everyday life. The diversity of this new technology raises new security challenges and new vulnerabilities. Currently 5G networks are not properly protected from malicious traffic. To protect their systems and networks, companies more widely set up Security Operations Centers (SOC) for monitoring and analyzing network traffic and events. However, there is no proper methodology yet to use SOC in 5G networks. In this paper, we study the possible methods of network monitoring focusing on the RAN, especially on Radio interface and end devices of 5G networks and search for potential extension solutions to our existing SOC.\",\"PeriodicalId\":340545,\"journal\":{\"name\":\"2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CINTI53070.2021.9668469\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CINTI53070.2021.9668469","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Monitoring 5G networks in Security Operation Center
5G mobile network is still a new technology in the telecommunication and this new technology brings new challenges into IT security. It is essential to capture, monitor and analyze the traffic of 5G networks. The 5G network is gaining more and more popularity in the different areas of the industry and everyday life. The diversity of this new technology raises new security challenges and new vulnerabilities. Currently 5G networks are not properly protected from malicious traffic. To protect their systems and networks, companies more widely set up Security Operations Centers (SOC) for monitoring and analyzing network traffic and events. However, there is no proper methodology yet to use SOC in 5G networks. In this paper, we study the possible methods of network monitoring focusing on the RAN, especially on Radio interface and end devices of 5G networks and search for potential extension solutions to our existing SOC.