Skip to Main Content
A Comprehensive Guide to 5G Security
book

A Comprehensive Guide to 5G Security

by Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika Ylianttila
March 2018
Intermediate to advanced content levelIntermediate to advanced
474 pages
16h 49m
English
Wiley
Content preview from A Comprehensive Guide to 5G Security

10Software Defined Security Monitoring in 5G Networks

Madhusanka Liyanage1, Ijaz Ahmad1, Jude Okwuibe1, Edgardo Montes de Oca2, Hoang Long MAI2, Oscar López Perez3, and Mikel Uriarte Itzazelaia3

1 Centre for Wireless Communication, University of Oulu, Oulu, Finland

2 Montimage, Paris, France

3 Nextel S.A., Bilbao, Spain

10.1 Introduction

Network monitoring is a crucial network management enabler for mobile networks. Its importance is growing with the continuous growth of network traffic and the adoption of virtualization. A monitoring system gathers network statistics, traffic, application and user profiles, and flow samples at various intervals and granularities to evaluate the status of the network for different management tasks such as application identification, anomaly detection, network forensics, load balancing, traffic engineering, enforcing Service Level Agreements (SLA), QoS/QoE and network maintenance. Therefore, a network monitoring system should be capable of monitoring the network and traffic flows at different granularities and for obtaining measureable metrics such as level of aggregation, time intervals, bandwidth utilization and accuracy.

Traditionally, network monitoring systems are deployed at specific locations of the mobile network to monitor data at network boundaries or ingress or egress ports. Similarly, many of the currently used security monitoring systems rely on physical systems and interfaces. However, mobile networks are evolving and so also is ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Zero Trust Security: An Enterprise Guide

Zero Trust Security: An Enterprise Guide

Jason Garbis, Jerry W. Chapman
Cyber Security and Network Security

Cyber Security and Network Security

Sabyasachi Pramanik, Debabrata Samanta, M. Vinay, Abhijit Guha

Publisher Resources

ISBN: 9781119293040Purchase book