5G Vulnarabilities from Security Operation Center's Perspective

5G is not only a new generation of mobile communication generations, but it is a revolutionary technology that supports previous applications and enables new ones because of its great benefits such as high data rate, low latency, massive connectivity, and network reliability. However, the huge numbe...

Full description

Saved in:
Bibliographic Details
Published in2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI) pp. 000229 - 000234
Main Authors Mahmoud, Doaa, Toth, Andras Balint, Kail, Eszter, Banati, Anna
Format Conference Proceeding
LanguageEnglish
Published IEEE 18.11.2021
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:5G is not only a new generation of mobile communication generations, but it is a revolutionary technology that supports previous applications and enables new ones because of its great benefits such as high data rate, low latency, massive connectivity, and network reliability. However, the huge number of connected devices, the enablers technologies, reliance on virtualization and cloud services will lead to many new threats besides the old threats and attacks. Consequently, there is a serious need to find out these threats and check appropriate countermeasures, that ensure a robust and secure communication system. In this paper, we provide a brief review of 5G architecture and related security vulnerabilities that can be monitored and detected in a Security Operation Center.
ISSN:2471-9269
DOI:10.1109/CINTI53070.2021.9668348