5G Needs A New Generation Of Security

5G is arriving and promises to be faster and better support for applications such as IoT than any of its predecessors.  It will be strikingly faster than 4G, and this will be particularly obvious when downloading or streaming media.

On average, 4G has a maximum download speed of 300Mbps, though this fluctuates depending on location and network. In terms of latency, 4G networks currently run at around 50 milliseconds, while 5G will have a latency of only one millisecond. That’s around 50 times more than current 4G networks.

The telecommunictions industry is begining to recognise that 5G will dramatically raise the stakes for ensuring the security and reliability of these networks.

5G Needs Fast Cyber Threats Security
So, the key to the uptake of the technology will be security. As with all new technologies, hackers will be looking to use it to carry out attacks. With the advent of 5G, there are going to be more attacks and bigger ones at that. These will most likely come from IoT devices or smartphones.

The economics of DDoS mitigation and attacks are very much geared towards the attackers now, so there is a need for more efficient tools and advanced technologies to combat attacks at a more economic level.

A lot of extra security has been put into 5G, but as the bandwidth has increased and the latency has decreased, it is down to the industry to provide protection to these networks to prevent attacks such as DDoS from taking place. 

These are the main security concerns for the industry. In our survey 63 per cent thought that advanced DDoS protection is the most important security capability needed for 5G networks, while 98 per cent of respondents said core network security was either very important (72 per cent) or important (26 per cent) in 5G build-outs. 

To better protect these ultra-fast networks, artificial intelligence and machine learning are necessary to make those quick decisions that make the difference to whether or not a cyber-attack is successful. Current cyber threats solutions are static, reactive and require significant operator intervention, resulting in a slow response time.

AI-Driven Security
In the light of 5G latencies that are measured in milliseconds, the only way to realistically deal with an attack is by applying artificial intelligence machine learning capabilities and using algorithms that can learn very quickly. Recently launched products like  A10's Thunder TPS DDoS mitigation solution automatically recognises the characteristics of DDoS attacks and applies mitigation filters without advanced configuration or an operator’s manual intervention.  

It solves many of today’s DDoS defenders’ challenges by re-balancing the economics of the DDoS attacker and the defenders’ efforts through intelligent automated defences.

Working in conjunction with A10 Networks’ actionable DDoS weapons intelligence and the five-level adaptive policy mitigation engines, ZAP effectively blocks attackers while protecting the users from indiscriminate collateral damage commonly found with traditional systems. Without AI to combat ever more complex and speedier cyberattacks, it will be difficult, if not impossible, to safely deploy technologies such as autonomous cars and remote surgery. Real-time application use cases will not happen without a network that is properly secured in real-time.

Over the next five years, we will see tremendous growth in 5G adoption on a global basis. In fact, according to a recent forecast by the GSMA, more than 1.4 billion connections will be on 5G by 2025. 

The majority of commercial 5G networks will be deployed as non-standalone 5G and a smaller percentage will leverage the standalone 5G architecture and services in the coming years. We will also see a massive build-out of millions of mobile-edge clouds, essential to achieving less than three milliseconds of latency, and the roll-out of autonomous-driven cars and other ultra-reliable low-latency use cases more broadly. 

We will see continuous enhancements of the 3GPP 5G standard and focus on delivering vehicle-to-everything (V2X) application-layer services, 5G satellite access, LAN support in 5G, improved network automation, network slicing solutions and new IoT services.  In summary, 5G has a tremendous opportunity to disrupt every single vertical industry in the next 5 to 10 years.

TeleMedia Online

You Might Also Read:

AI Will Shape The Future 6G Network:

Five Things to Know About 5G:

 

 

« Thomas Cook In A Cyber Collapse
Attack On Ukraine's Power Grid Targeted Transmission Stations »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Fasoo

Fasoo

Fasoo provides data-centric security to protect data within the organizational perimeter and beyond by limiting access to sensitive data according to policies that cover both users and activities.

AGAT Software

AGAT Software

AGAT Software is an innovative security provider specializing in external access authentication and data protection solutions.

Sungard Availability Services (Sungard AS)

Sungard Availability Services (Sungard AS)

Sungard AS partners with customers around the globe to understand their unique business needs and provide production and recovery services tailored to their requirements.

AntemetA

AntemetA

AntemetA specializes in network infrastructure, security and cloud computing, helping companies transform their Information Systems.

Inky Technology Corp

Inky Technology Corp

Inky® Phish Fence is an email protection gateway that uses sophisticated AI, machine learning and computer vision algorithms to block deep sea phishing attacks that get through every other system.

National Cyber Summit (NCS)

National Cyber Summit (NCS)

The National Cyber Summit is the preeminent event for cyber training, education and workforce development aimed at protecting our nation's infrastructure from the ever-evolving cyber threat.

Maticmind

Maticmind

Maticmind is an ICT System Integrator providing solutions and specialized skills in Networking, Security, Unified Communications & Collaboration, Datacenter & Cloud and Application.

National Authority for Electronic Certification and Cyber Security (AKCESK) - Albania

National Authority for Electronic Certification and Cyber Security (AKCESK) - Albania

AKCESK ensures security for trusted services, in particular reliability and security in electronic transactions between citizens, businesses and public authorities.

Adyta

Adyta

Adyta specializes in cybersecurity solutions adapted to the needs of sovereign institutions, business groups and other organizations that handle information and sensitive or classified data.

MyDocSafe

MyDocSafe

MyDocSafe is an all-in-one document security and e-sign software.

Innovex Global

Innovex Global

Innovex is a full-service executive search and advisory business that engages with early-stage startups, scale-ups, and established businesses in the Fintech, Cybersecurity and Technology industries.

DigitalWell

DigitalWell

DigitalWell provide fully managed IT and communications solutions for a truly innovative end-to-end experience - for your customers and teams.

Ipstack

Ipstack

Ipstack offers one of the leading IP to geolocation APIs and global IP database services worldwide. Protect your site and web application by detecting proxies, crawlers or tor users at first glance.

BAE Systems

BAE Systems

BAE Systems develop, engineer, manufacture, and support products and systems to deliver military capability, protect national security, and keep critical information and infrastructure secure.

Technology Innovation Institute (TII)

Technology Innovation Institute (TII)

TII is a UAE-based research center that aims to lead global advances in AI, robotics, quantum computing, cryptography and secure communications and more.

Auxilion

Auxilion

Auxilion is an award-winning provider of consulting and IT support services, technologies and consulting for public and private organisations in the UK and Ireland.