A software solution for preventing attacks on 5G networks
Red Book
Red Book

Current Affairs Classes Pre cum Mains 2025, Batch Starts: 11th September 2024 Click Here for more information

Source: The post is based on the article A software solution for preventing attacks on 5G networks published in PIB on 17th August 2023.

What is the News?

IITM Pravartak Technologies Foundation at IIT Madras has developed a new indigenous software technology solution that can proactively detect and prevent zero-day vulnerability attacks in the 5G networks.

Why is 5G Technology vulnerable to zero day attack?

Traditional telecom networks were built using hardware components such as switches. But around 90% of the 5G technology is implemented in software. 

A 5G network incorporates several software-based technologies such as NFV, SDN, and control plane/user plane segregation.

Due to this, the attack surface area is increased multifold in this process and is impossible to manage manually. Automating the whole testing process and continuous monitoring is the only sustainable solution.

What have the researchers developed?

Researchers are developing an indigenous security testing solution for 5G core network functions and Radio Access Network (RAN) software. 

This technology solution can automatically identify zero-day vulnerabilities in the network in advance by using techniques such as fuzzing and test oracles.

Reducing zero-day vulnerabilities will reduce attack surface area, which in turn will reduce the need to pay ransom and also decrease network downtime of 5G networks which are crucial for communication.

What are Zero Day Attacks?

Zero-day is a term used in the cybersecurity world. It refers to an unknown vulnerability that can be exploited by any malicious hacker with sufficient know-how. 

Zero-day attacks take place when hackers exploit the vulnerability before the software developer has a chance to patch the flaw.

They can be devastating, since only the hacker knows about them and can even sell this valuable information on the darknet, or ‘simply wait to strike at an opportune moment.

Print Friendly and PDF
Blog
Academy
Community