{"id":256526,"date":"2023-08-18T20:51:03","date_gmt":"2023-08-18T15:21:03","guid":{"rendered":"https:\/\/blog.forumias.com\/?p=256526"},"modified":"2023-08-18T20:51:03","modified_gmt":"2023-08-18T15:21:03","slug":"a-software-solution-for-preventing-attacks-on-5g-networks","status":"publish","type":"post","link":"https:\/\/forumias.com\/blog\/a-software-solution-for-preventing-attacks-on-5g-networks\/","title":{"rendered":"A software solution for preventing attacks on 5G networks"},"content":{"rendered":"\n<p><b>Source: <\/b><span style=\"font-weight: 400;\">The post is based on the article <\/span><b>\u201c<\/b><b>A software solution for preventing attacks on 5G networks<\/b><b>\u201d <\/b><span style=\"font-weight: 400;\">\u00a0published in<\/span><b> PIB on 17th August 2023.<\/b><\/p>\n<h2><b>What is the News?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">IITM Pravartak Technologies Foundation at IIT Madras has developed a new indigenous software technology solution that can proactively detect and prevent zero-day vulnerability attacks in the 5G networks.<\/span><\/p>\n<h2><b>Why is 5G Technology vulnerable to zero day attack?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Traditional telecom networks were built using hardware components such as switches. But around 90% of the 5G technology is implemented in software.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A 5G network incorporates several software-based technologies such as NFV, SDN, and control plane\/user plane segregation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Due to this, the attack surface area is increased multifold in this process and is impossible to manage manually. Automating the whole testing process and continuous monitoring is the only sustainable solution.<\/span><\/p>\n<h2><b>What have the researchers developed?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Researchers are developing an indigenous security testing solution for 5G core network functions and Radio Access Network (RAN) software.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This technology solution can automatically identify zero-day vulnerabilities in the network in advance by using techniques such as fuzzing and test oracles.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Reducing zero-day vulnerabilities will reduce attack surface area, which in turn will reduce the need to pay ransom and also decrease network downtime of 5G networks which are crucial for communication.<\/span><\/p>\n<h2><b>What are Zero Day Attacks?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Zero-day is a term used in the cybersecurity world. It refers to an unknown vulnerability that can be exploited by any malicious hacker with sufficient know-how.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Zero-day attacks take place when hackers exploit the vulnerability before the software developer has a chance to patch the flaw.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">They can be devastating, since only the hacker knows about them and can even sell this valuable information on the darknet, or &#8216;simply wait to strike at an opportune moment.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Source: The post is based on the article \u201cA software solution for preventing attacks on 5G networks\u201d \u00a0published in PIB on 17th August 2023. What is the News? IITM Pravartak Technologies Foundation at IIT Madras has developed a new indigenous software technology solution that can proactively detect and prevent zero-day vulnerability attacks in the 5G&hellip; <a class=\"more-link\" href=\"https:\/\/forumias.com\/blog\/a-software-solution-for-preventing-attacks-on-5g-networks\/\">Continue reading <span class=\"screen-reader-text\">A software solution for preventing attacks on 5G networks<\/span><\/a><\/p>\n","protected":false},"author":10317,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[1566,1738,9],"tags":[3590],"class_list":["post-256526","post","type-post","status-publish","format-standard","hentry","category-daily-factly-articles","category-science-and-technology-daily-factly-articles","category-public","tag-pib","entry"],"jetpack_featured_media_url":"","views":{"total":2,"cached_at":"","cached_date":1703084262},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/256526","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/users\/10317"}],"replies":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/comments?post=256526"}],"version-history":[{"count":0,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/256526\/revisions"}],"wp:attachment":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/media?parent=256526"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/categories?post=256526"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/tags?post=256526"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}