5G Needs A New Generation Of Security

5G is arriving and promises to be faster and better support for applications such as IoT than any of its predecessors.  It will be strikingly faster than 4G, and this will be particularly obvious when downloading or streaming media.

On average, 4G has a maximum download speed of 300Mbps, though this fluctuates depending on location and network. In terms of latency, 4G networks currently run at around 50 milliseconds, while 5G will have a latency of only one millisecond. That’s around 50 times more than current 4G networks.

The telecommunictions industry is begining to recognise that 5G will dramatically raise the stakes for ensuring the security and reliability of these networks.

5G Needs Fast Cyber Threats Security
So, the key to the uptake of the technology will be security. As with all new technologies, hackers will be looking to use it to carry out attacks. With the advent of 5G, there are going to be more attacks and bigger ones at that. These will most likely come from IoT devices or smartphones.

The economics of DDoS mitigation and attacks are very much geared towards the attackers now, so there is a need for more efficient tools and advanced technologies to combat attacks at a more economic level.

A lot of extra security has been put into 5G, but as the bandwidth has increased and the latency has decreased, it is down to the industry to provide protection to these networks to prevent attacks such as DDoS from taking place. 

These are the main security concerns for the industry. In our survey 63 per cent thought that advanced DDoS protection is the most important security capability needed for 5G networks, while 98 per cent of respondents said core network security was either very important (72 per cent) or important (26 per cent) in 5G build-outs. 

To better protect these ultra-fast networks, artificial intelligence and machine learning are necessary to make those quick decisions that make the difference to whether or not a cyber-attack is successful. Current cyber threats solutions are static, reactive and require significant operator intervention, resulting in a slow response time.

AI-Driven Security
In the light of 5G latencies that are measured in milliseconds, the only way to realistically deal with an attack is by applying artificial intelligence machine learning capabilities and using algorithms that can learn very quickly. Recently launched products like  A10's Thunder TPS DDoS mitigation solution automatically recognises the characteristics of DDoS attacks and applies mitigation filters without advanced configuration or an operator’s manual intervention.  

It solves many of today’s DDoS defenders’ challenges by re-balancing the economics of the DDoS attacker and the defenders’ efforts through intelligent automated defences.

Working in conjunction with A10 Networks’ actionable DDoS weapons intelligence and the five-level adaptive policy mitigation engines, ZAP effectively blocks attackers while protecting the users from indiscriminate collateral damage commonly found with traditional systems. Without AI to combat ever more complex and speedier cyberattacks, it will be difficult, if not impossible, to safely deploy technologies such as autonomous cars and remote surgery. Real-time application use cases will not happen without a network that is properly secured in real-time.

Over the next five years, we will see tremendous growth in 5G adoption on a global basis. In fact, according to a recent forecast by the GSMA, more than 1.4 billion connections will be on 5G by 2025. 

The majority of commercial 5G networks will be deployed as non-standalone 5G and a smaller percentage will leverage the standalone 5G architecture and services in the coming years. We will also see a massive build-out of millions of mobile-edge clouds, essential to achieving less than three milliseconds of latency, and the roll-out of autonomous-driven cars and other ultra-reliable low-latency use cases more broadly. 

We will see continuous enhancements of the 3GPP 5G standard and focus on delivering vehicle-to-everything (V2X) application-layer services, 5G satellite access, LAN support in 5G, improved network automation, network slicing solutions and new IoT services.  In summary, 5G has a tremendous opportunity to disrupt every single vertical industry in the next 5 to 10 years.

TeleMedia Online

You Might Also Read:

AI Will Shape The Future 6G Network:

Five Things to Know About 5G:

 

 

« Thomas Cook In A Cyber Collapse
Attack On Ukraine's Power Grid Targeted Transmission Stations »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Splunk

Splunk

Splunk provide real-time Security Information & Event Management solutions for Enterprise Networks, Cloud and small-scale IT environments

Japan Information Security Audit Association (JASA)

Japan Information Security Audit Association (JASA)

JASA is non-profit association active in developing and managing the quality of Information Security Auditing and Auditors in Japan.

Ridgeback Network Defense

Ridgeback Network Defense

Ridgeback is an enterprise security software platform that defeats malicious network invasion in real time. Ridgeback champions the idea that to defeat an enemy you must engage them.

ATIS Systems

ATIS Systems

ATIS Systems offers first-class complete solutions for legal interception, mediation, data retention, and IT forensics.

Shift Technology

Shift Technology

Shift Technology provides insurance companies with an innovative SaaS solution to improve and scale fraud detection.

Agility Networks

Agility Networks

Agility Networks is a technology company providing integrated services and solutions for Digital Transformation and Cyber Security.

Center for Cyber & Homeland Security (CCHS)

Center for Cyber & Homeland Security (CCHS)

The Center for Cyber and Homeland Security at Auburn University is a nonpartisan think tank that works to develop innovative strategies to address current and future threats to the United States.

GK8

GK8

GK8 is a cyber security company that offers a high security custodian technology for managing and safeguarding digital assets. Secure, Compliant and Practical.

Quantstamp

Quantstamp

Quantstamp are experts in Smart Contract Security Audits. We provide verification that your decentralized system works as intended.

ACA Group

ACA Group

ACA Group are a leading governance, risk, and compliance (GRC) advisor in financial services.

SpecterOps

SpecterOps

SpecterOps has unique insight into the cyber adversary mindset and brings the highest caliber, most experienced resources to assess your organizations defenses.

Deduce

Deduce

Deduce use a combination of aggregate historical user data, identity risk intelligence, and proactive alerting to deliver a robust identity and authentication solution.

CSIOS Corp.

CSIOS Corp.

At CSIOS we help our customers achieve and sustain information and cyberspace superiority through a full range of defensive and offensive cyberspace operations and cybersecurity consulting services.

Fletch

Fletch

Fletch’s AI tracks the evolving cybersecurity threat landscape by reading and interpreting every threat article every day and matching those threats to a company’s exposure.

vpnMentor

vpnMentor

We started vpnMentor to offer users a really honest, committed and helpful tool when navigating VPNs and web privacy.

Bluerydge

Bluerydge

Bluerydge specialises in cyber security and technology, focusing on the delivery of innovative sovereign solutions through trusted, cleared and experienced professionals.