5G Needs A New Generation Of Security

5G is arriving and promises to be faster and better support for applications such as IoT than any of its predecessors.  It will be strikingly faster than 4G, and this will be particularly obvious when downloading or streaming media.

On average, 4G has a maximum download speed of 300Mbps, though this fluctuates depending on location and network. In terms of latency, 4G networks currently run at around 50 milliseconds, while 5G will have a latency of only one millisecond. That’s around 50 times more than current 4G networks.

The telecommunictions industry is begining to recognise that 5G will dramatically raise the stakes for ensuring the security and reliability of these networks.

5G Needs Fast Cyber Threats Security
So, the key to the uptake of the technology will be security. As with all new technologies, hackers will be looking to use it to carry out attacks. With the advent of 5G, there are going to be more attacks and bigger ones at that. These will most likely come from IoT devices or smartphones.

The economics of DDoS mitigation and attacks are very much geared towards the attackers now, so there is a need for more efficient tools and advanced technologies to combat attacks at a more economic level.

A lot of extra security has been put into 5G, but as the bandwidth has increased and the latency has decreased, it is down to the industry to provide protection to these networks to prevent attacks such as DDoS from taking place. 

These are the main security concerns for the industry. In our survey 63 per cent thought that advanced DDoS protection is the most important security capability needed for 5G networks, while 98 per cent of respondents said core network security was either very important (72 per cent) or important (26 per cent) in 5G build-outs. 

To better protect these ultra-fast networks, artificial intelligence and machine learning are necessary to make those quick decisions that make the difference to whether or not a cyber-attack is successful. Current cyber threats solutions are static, reactive and require significant operator intervention, resulting in a slow response time.

AI-Driven Security
In the light of 5G latencies that are measured in milliseconds, the only way to realistically deal with an attack is by applying artificial intelligence machine learning capabilities and using algorithms that can learn very quickly. Recently launched products like  A10's Thunder TPS DDoS mitigation solution automatically recognises the characteristics of DDoS attacks and applies mitigation filters without advanced configuration or an operator’s manual intervention.  

It solves many of today’s DDoS defenders’ challenges by re-balancing the economics of the DDoS attacker and the defenders’ efforts through intelligent automated defences.

Working in conjunction with A10 Networks’ actionable DDoS weapons intelligence and the five-level adaptive policy mitigation engines, ZAP effectively blocks attackers while protecting the users from indiscriminate collateral damage commonly found with traditional systems. Without AI to combat ever more complex and speedier cyberattacks, it will be difficult, if not impossible, to safely deploy technologies such as autonomous cars and remote surgery. Real-time application use cases will not happen without a network that is properly secured in real-time.

Over the next five years, we will see tremendous growth in 5G adoption on a global basis. In fact, according to a recent forecast by the GSMA, more than 1.4 billion connections will be on 5G by 2025. 

The majority of commercial 5G networks will be deployed as non-standalone 5G and a smaller percentage will leverage the standalone 5G architecture and services in the coming years. We will also see a massive build-out of millions of mobile-edge clouds, essential to achieving less than three milliseconds of latency, and the roll-out of autonomous-driven cars and other ultra-reliable low-latency use cases more broadly. 

We will see continuous enhancements of the 3GPP 5G standard and focus on delivering vehicle-to-everything (V2X) application-layer services, 5G satellite access, LAN support in 5G, improved network automation, network slicing solutions and new IoT services.  In summary, 5G has a tremendous opportunity to disrupt every single vertical industry in the next 5 to 10 years.

TeleMedia Online

You Might Also Read:

AI Will Shape The Future 6G Network:

Five Things to Know About 5G:

 

 

« Thomas Cook In A Cyber Collapse
Attack On Ukraine's Power Grid Targeted Transmission Stations »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Mielabelo

Mielabelo

Belgian consulting firm providing services in the security and compliance of information systems and IT service management.

LogmeOnce

LogmeOnce

LogmeOnce provides users with solution to multiple Password problems, Single Sign-On (SSO), and Identity Management.

Protegrity

Protegrity

Protegrity is an enterprise and cloud data security software for data-centric encryption and tokenization to protect sensitive data while maintaining usability.

Canadian Centre for Cyber Security (CCCS)

Canadian Centre for Cyber Security (CCCS)

The Cyber Centre is the single unified source of expert advice, guidance, services and support on cyber security for government, critical infrastructure, the private sector and the public.

REVI-IT

REVI-IT

REVI-IT is a Danish state-owned audit firm focusing on enterprise IT business processes and compliance,

Cyber 2.0

Cyber 2.0

Cyber 2.0 is the only system in the world that blocks all forms of cyber attack within the organization, including new and unfamiliar attack methods.

Honeynet Project

Honeynet Project

The Honeynet Project is a leading international non-profit security research organization, dedicated to investigating the latest attacks and developing open source security tools.

aDolus Technology

aDolus Technology

aDolus delivers a robust solution for safeguarding against counterfeit or malicious software and firmware in mission-critical systems.

Kleiner Perkins

Kleiner Perkins

For five decades, Kleiner Perkins has made history by partnering with some of the most ingenious and forward-thinking founders in technology and life sciences.

BrandProtections.Online

BrandProtections.Online

BrandProtections.online offer end-to-end customer support solutions to help protect against threats which may affect your brand online.

MDSec

MDSec

MDSec is a consultancy with a passion for information security. Our consultants specialise in application, mobile and hardware security and targeted red team attacks.

European Data Protection Supervisor (EDPS)

European Data Protection Supervisor (EDPS)

The EDPS is the European Union’s independent data protection authority. We monitor and ensure the protection of personal data and privacy when EU institutions and bodies process personal information.

VP Techno Labs

VP Techno Labs

VP Techno Labs is an award-winning cybersecurity firm focusing only cybersecurity to develop cutting edge solutions for emerging business.

CYBHORUS

CYBHORUS

CYBHORUS are a team of Italian cyber security experts, specialized in cyber threat defense and strategic and organizational consulting.

Radiant Security

Radiant Security

Radiant Security offers an AI-powered security co-pilot for Security Operations Centers (SOCs). Reinforce your SOC with an AI assistant.

TerraZone

TerraZone

TerraZone is a global cyber security and privacy solutions provider to governments and enterprises.