It’s crucial that carriers, businesses and individuals understand the significance of AT&T’s dire forecast. Security threats are only going to accelerate as 5G networks become more entrenched.
AT&T reports it is seeing 11 billion security incidents every day. But the carrier predicts this will rise to 5 billion threats every 10 minutes as the 5G era advances.
The main issue is the increased vulnerability of private and personal data being accessed by cybercriminals due to the increased connectivity that 5G technology brings with it. To make networks safer, cybersecurity personnel believe there are several main 5G protections to zero in on.
The first is to detect anomalies. Experts recommend that businesses especially use packet capture, big data and machine learning to identify threats not spotted by basic filters. When embedded into network switches and routers, it’s far more effective, as it turns those devices into 5G security sensors.
It’s also important to stop and fix advanced malware. Go beyond signature-based tools to spot the attacks designed to evade basic filters. Behavior-based checks on endpoints — possibly using sandboxing — are important. Once you detect a threat, you will need to be able to remove all instances of it on the network.
Another approach is to prevent threats by minimizing the basic issues that account for most security incidents. Use firewalls to protect your network, and access controls to minimize user-based risk. Consider intrusion detection and prevention tools for blocking basic 5G security threats.
Others are advocating a more holistic approach, including maintaining a clean 5G network that prevents malware from transporting across to connected devices and protects customers from cyberattacks, as well as a 5G network with security mechanisms that prevent unauthorized command and control, aka C2, from exploited connected devices.
Security advocates are also calling for an open and secure 5G network that enables network resources to be securely exposed to third parties – so mobile operators can maximize 5G adoption and monetization of 5G network resources.
Especially critical, cybersecurity personnel say, is establishing a 5G network with automated threat hunting mechanisms in place across key points in the core network and out at the edge – allowing for quick identification of infected hosts and rapid resolution of security-related incidents.
This multilayered protection plan would also allow for a 5G network with prevention mechanisms in place, which keeps malware from getting onto network functions that can then spread across other functions and infect individual 5G slices.
Want to learn more about 5G security? Tonex offers 5G Security Training, a 5-day course that provides participants with a strong and intuitive understanding of what security in the wireless systems is and how the security functions are implemented in 5G, 5G NR, 802.11ax, mmWave/802.11ay radio and core network.
Besides 5G Security Training, Tonex offers nearly two dozen 5G Training Courses that cover everything from 5G fundamentals to more specialized areas, such as C-RAN Training, NOMA Training, LTE Advanced Pro Training and mmWaves Technology Training.
Contact us for more information, questions, comments.