Innovative services for The consequences of successful DDoS attacks are passed down to the providers of 5G services. Communication service providers (CSPs) in the 5G network must therefore assume responsibility for the security of their services on several levels. Firstly, they must ensure their reliability. Which is heavily dependent on network availability. Then, loss or theft of data must be reliably prevented. And finally, regulatory or compliance requirements must be met.
Companies fear network outages caused by DDoS
Companies in particular fear that 5G will expose their digital infrastructure to additional attacks. According to a survey by Accenture35 percent of decision-makers in companies have concerns about 5G security. 62 percent fear that 5G will increase the frequency of attacks. DDoS attacks on network availability are considered the main cause of disruptions.
Additional problems for CSPs
According to the latest Threat Intelligence Report from NetscoutThe mobile industry saw a 38 percent increase in attacks worldwide in the second half of 2021, while many other telecom sectors saw a decline over the same period. This trend likely reflects the continued increase in gamers using Wi – Fi hotspots , as well as the rapid proliferation of 5G technologies and services.
Voice over IP ( VoIP ) communications providers were also Hungary Phone Number List affected by high-profile DDoS extortion or ransomware DDoS attacks from a REvil copycat. Resulting in an estimated $9 million to $12 million in lost revenue. VoIP providers and their infrastructure fall under two primary industries according to the North American Industry Codes: telecommunications companies and data processing hosting and related services (cloud computing). The first category saw a 93 percent increase in attacks in the first half of 2021. While the second category saw a significant increase in the EMEA region. In fact, the data processing hosting and related services category was the top target in EMEA for the second half of 2021.
And with 5G SA a new problem area is now emerging
5G SA changes the architecture of the mobile core and replaces it with a new 5G core that is based on a service-based architecture. The stand-alone variant (SA) also brings with it a variety of new protocols as well as containerization and orchestration initiatives. Next-generation 5G services will run within a cloud-native architecture over new virtualized network infrastructures.
These 5G SA networks are currently in the early stages of deployment and enable mobile services such as Massive Machine Type Communication (MMTC) and Enhanced Mobile Cell Phone Number Database Broadband (EMBB). It is precisely this combination of the potential vulnerabilities of newly developing networks with communications processing that involves minimal human intervention that is exactly what attackers find so attractive as a target.
In addition, the proliferation of devices in the Internet of Things (IoT) has increased enormously in recent years. But each of these connected devices not only offers functionality. But also additional attack surfaces for DDoS attacks. And one thing is certain: the demand for new and expanded services over 5G networks will continue to grow over time. This inevitably leads to the use of more 5G devices and greater network usage. Which opens up room for more attacks. This is how IDC predictsthat by 2025, 152,200 IoT devices will connect every minute.
What to do?
During the pandemic, providers are already recording peak numbers of service accesses in the networks that have been established so far, as well as data transfers for video conferences. Streaming Bulk Database and games. Security concepts for high network utilization are therefore not foreign territory for operators. In order to generate new services and thus revenues via 5G networks. Providers must also establish an adequate infrastructure to protect critical networks and services. It makes sense to take a risk-based approach to protecting services. Because different services have different requirements and risk levels.