5G Needs A New Generation Of Security

5G is arriving and promises to be faster and better support for applications such as IoT than any of its predecessors.  It will be strikingly faster than 4G, and this will be particularly obvious when downloading or streaming media.

On average, 4G has a maximum download speed of 300Mbps, though this fluctuates depending on location and network. In terms of latency, 4G networks currently run at around 50 milliseconds, while 5G will have a latency of only one millisecond. That’s around 50 times more than current 4G networks.

The telecommunictions industry is begining to recognise that 5G will dramatically raise the stakes for ensuring the security and reliability of these networks.

5G Needs Fast Cyber Threats Security
So, the key to the uptake of the technology will be security. As with all new technologies, hackers will be looking to use it to carry out attacks. With the advent of 5G, there are going to be more attacks and bigger ones at that. These will most likely come from IoT devices or smartphones.

The economics of DDoS mitigation and attacks are very much geared towards the attackers now, so there is a need for more efficient tools and advanced technologies to combat attacks at a more economic level.

A lot of extra security has been put into 5G, but as the bandwidth has increased and the latency has decreased, it is down to the industry to provide protection to these networks to prevent attacks such as DDoS from taking place. 

These are the main security concerns for the industry. In our survey 63 per cent thought that advanced DDoS protection is the most important security capability needed for 5G networks, while 98 per cent of respondents said core network security was either very important (72 per cent) or important (26 per cent) in 5G build-outs. 

To better protect these ultra-fast networks, artificial intelligence and machine learning are necessary to make those quick decisions that make the difference to whether or not a cyber-attack is successful. Current cyber threats solutions are static, reactive and require significant operator intervention, resulting in a slow response time.

AI-Driven Security
In the light of 5G latencies that are measured in milliseconds, the only way to realistically deal with an attack is by applying artificial intelligence machine learning capabilities and using algorithms that can learn very quickly. Recently launched products like  A10's Thunder TPS DDoS mitigation solution automatically recognises the characteristics of DDoS attacks and applies mitigation filters without advanced configuration or an operator’s manual intervention.  

It solves many of today’s DDoS defenders’ challenges by re-balancing the economics of the DDoS attacker and the defenders’ efforts through intelligent automated defences.

Working in conjunction with A10 Networks’ actionable DDoS weapons intelligence and the five-level adaptive policy mitigation engines, ZAP effectively blocks attackers while protecting the users from indiscriminate collateral damage commonly found with traditional systems. Without AI to combat ever more complex and speedier cyberattacks, it will be difficult, if not impossible, to safely deploy technologies such as autonomous cars and remote surgery. Real-time application use cases will not happen without a network that is properly secured in real-time.

Over the next five years, we will see tremendous growth in 5G adoption on a global basis. In fact, according to a recent forecast by the GSMA, more than 1.4 billion connections will be on 5G by 2025. 

The majority of commercial 5G networks will be deployed as non-standalone 5G and a smaller percentage will leverage the standalone 5G architecture and services in the coming years. We will also see a massive build-out of millions of mobile-edge clouds, essential to achieving less than three milliseconds of latency, and the roll-out of autonomous-driven cars and other ultra-reliable low-latency use cases more broadly. 

We will see continuous enhancements of the 3GPP 5G standard and focus on delivering vehicle-to-everything (V2X) application-layer services, 5G satellite access, LAN support in 5G, improved network automation, network slicing solutions and new IoT services.  In summary, 5G has a tremendous opportunity to disrupt every single vertical industry in the next 5 to 10 years.

TeleMedia Online

You Might Also Read:

AI Will Shape The Future 6G Network:

Five Things to Know About 5G:

 

 

« Thomas Cook In A Cyber Collapse
Attack On Ukraine's Power Grid Targeted Transmission Stations »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

10Duke

10Duke

Identity management and entitlement solutions that help you connect to your online customers and drive engagement and revenue.

Chertoff Group

Chertoff Group

The Chertoff Group provide security advice and risk management services covering cyber security, insider threat, physical security and asset protection.

National Institute of Standards & Technology (NIST)

National Institute of Standards & Technology (NIST)

NIST is a measurement standards laboratory, and a non-regulatory agency of the United States Department of Commerce. Areas covered include IT and cybersecurity.

DataVantage

DataVantage

DataVantage data masking and data management software helps you prevent data breaches, pass compliance audits and meet regulatory requirements such as HIPAA and PCI DSS.

GreyCampus

GreyCampus

GreyCampus is a leading provider of training for working professionals in the areas of Project Management, Big Data, Data Science, Service Management, Quality Management and Information Security.

NAVEX Global

NAVEX Global

NAVEX Global’s compliance management system consolidates your entire GRC program onto a scalable cloud-based platform.

Digittrade

Digittrade

Digittrade develop and produce external encrypted hard disks and secure communications apps.

CERT.lu

CERT.lu

CERT.lu is an initiative to enhance cyber security practices and techniques, and support security professionals in Luxembourg.

Eaton

Eaton

Eaton provides comprehensive cybersecurity services for operational technology (OT) to help keep your operations and personnel safe.

DataNumen

DataNumen

The fundamental mission of DataNumen is to recover as much data from inadvertent data disasters as possible.

Harvey Nash

Harvey Nash

Harvey Nash is a leading global provider of talent and technology solutions.

ThreatLocker

ThreatLocker

The ThreatLocker Platform provides a Zero Trust security solution that offers a unified approach to protecting users, devices, and networks against the exploitation of zero day vulnerabilities.

Heron Technology

Heron Technology

Heron Technology are a technology solutions consultancy with core competencies in the areas of Cyber Security and Digital Aviation.

Cognisys Group

Cognisys Group

Cognisys provides cyber security penetration testing and compliance services from its offices in Leeds and Manchester.

Thoropass

Thoropass

Thoropass (formerly Laika) helps you get and stay compliant with smart software and expert services.

Exodata

Exodata

Exodata is a French digital services company specializing in the outsourcing of IT Systems and solutions.