Info Image

Securing the 5G User Plane

Securing the 5G User Plane Image Credit: Sikov/Bigstockphoto.com

Beyond empowering more business opportunities and experiences, 5G will secure devices far better than its 3G and 4G/LTE predecessors with enhanced control plane security and subscriber identity encryption. However, this doesn’t come without growing pains. 5G resolves some network vulnerabilities but because of the number of devices supported on its networks and a more complex architecture, it opens even greater security challenges for communication service providers (CSPs). This creates the need for an effective solution that protects their network in real-time.

5G security challenges

There are multiple security risks CSPs must address if they wish to have a robust and resilient 5G network.

One of the challenges is the widening of the attack surface through 5G’s complex architecture. This calls for Control and User Plane Separation (CUPS) so high speed, low-latency data can be processed at multi-access edge computing (MECs) sites. Edge deployments compute the applications running across the network, many of which are connected to the internet. These new connections in the user plane open new attack vectors furthering the need for security and protection consistency across both core and edge components.

The network architecture and anticipation of massive Internet of Things (IoT) deployments also deepen the security challenge. CSPs already have millions of subscribers and devices on their networks. Sounds impressive but it barely registers a decimal point compared with the anticipated 75 billion connected IoT devices by 2025, enabled by ultra reliable, low latency 5G. However, this also introduces 75 billion new entry points for cyber criminals. Handling such an expansive network scope makes it difficult for CSPs to fully analyze malicious activity on their network until it is too late.

Some IoT devices are also time-sensitive and mission-critical, amplifying issues with their performance requirements for constant, uninterrupted processes. For example, if an autonomous car experiences a cybersecurity attack, it can delay response time leading to a car crash or hitting a pedestrian crossing the street.

Overcoming 5G security challenges

Unlike previous mobile network generations, 5G requires network-based security to prevent attacks as opposed to security provided outside the network by a third-party security provider. Network-based security is the only way to monitor communication inside, outside, and through all levels of the network including MEC sites and the core.

Network-based security achieves this through artificial intelligence (AI) and machine learning (ML) for behavioral analysis of host communications to immediately identify, respond, and predict security events. This helps prevent weaponization of IoT devices, inbound and outbound distributed denial of service (DDoS) attacks, phishing attacks, malware, and more. By securing their network and users, CSPs protect critical information and mitigate the chance of data leaks and business disruptions that can negatively affect their reputation.

5G quality of experience assurance

An effective 5G security solution also implements deep packet inspection (DPI) technology to provide CSPs with 100% visibility into the mobile network to help them understand network activity at all times and application usage, even when those applications are encrypted. The granular visibility, and service level agreement (SLA) assurance allows CSPs to prioritize critical applications and automatically apply policies on congested network elements to maintain quality of experience (QoE) for subscribers. For example, CSPs can direct the majority of bandwidth to intensive work applications, such as video conferencing over other less time-sensitive, bandwidth hungry or critical functions.

Fifth-generation networks are designed to support and drive fixed-mobile convergence, massive scale, and growth of IoT and ultra-reliable machine-to-machine communications. A 5G network-based security solution can efficiently protect the CSP network while delivering heterogenous, resource-competing services with a customer centric approach, based on application specific QoE.

NEW REPORT:
Next-Gen DPI for ZTNA: Advanced Traffic Detection for Real-Time Identity and Context Awareness
Author

Itay is the AVP of network and cloud security at Allot. He has more than 17 years of executive management experience in cybersecurity at global technology companies based in the U.S., Europe, and Asia. Prior to joining Allot, he founded his own company and played a key role in managing the development of equipment for the lawful interception market on behalf of Verint Systems. Itay launched his career as a software engineer in an elite intelligence unit of the Israel Defense Forces. He holds an M.B.A. from Bar-Ilan University and a B.Sc. in electrical engineering from the Technion – Israel Institute of Technology.

PREVIOUS POST

Adapting to the New Normal: Seizing Opportunities in the Asia Pacific Video Streaming Space

NEXT POST

A New Ride Points to a New Tech-Based Sharing Economy