Proceedings of the 13th International Conference on Availability, Reliability and Security 2018
DOI: 10.1145/3230833.3233254
|View full text |Cite
|
Sign up to set email alerts
|

Framework for Security Event Management in 5G

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…The threats and security challenges can be addressed under this category can include: Insecure APIs Interfaces, Malicious insiders, Account hijacking, Fraud. Possible actions can be taken for enhancement could be: Standardization of log formats, Log monitoring, Heuristic control and use of specialized systems, integration with physical security (cameras and phones) [58,59].…”
Section: Cloud Information Security and Event Managementmentioning
confidence: 99%
“…The threats and security challenges can be addressed under this category can include: Insecure APIs Interfaces, Malicious insiders, Account hijacking, Fraud. Possible actions can be taken for enhancement could be: Standardization of log formats, Log monitoring, Heuristic control and use of specialized systems, integration with physical security (cameras and phones) [58,59].…”
Section: Cloud Information Security and Event Managementmentioning
confidence: 99%
“…Security information event management solutions [127], [128], [157] utilize ML to detect ongoing security threats, anomalies, and intrusions in network elements and orchestrate automated responses. Human approval and surveillance can be part of reactive ML-based security solutions, particularly when the correct autonomous behavior in every situation cannot be trusted.…”
Section: ) Reactive Defenses In 5g Platformsmentioning
confidence: 99%
“…Moreover, telecommunication carriers would prefer an open system to avoid enclosure by a single vendor. For example, the open interface of Radio Access Network (RAN) is discussed and standardized in ORAN alliance 2 . Because of the above situation, we have to take care of supply-chain risks.…”
Section: Supply-chain Risksmentioning
confidence: 99%
“…The security services are provided as virtual functions and security service chaining is performed. Adam and Ping have proposed a framework for security event management [2]. The proposed framework performs automated event data collection across layers such as a telecommunication layer and an IaaS layer for monitoring of shared resources.…”
Section: Related Workmentioning
confidence: 99%