Óbudai Egyetem Digitális Archívum
    • magyar
    • English
  • English 
    • magyar
    • English
  • Login
View Item 
  •   DSpace Home
  • 5. Folyóiratcikkek
  • Acta Polytechnica Hungarica
  • View Item
  •   DSpace Home
  • 5. Folyóiratcikkek
  • Acta Polytechnica Hungarica
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Developing Security Information and Events Management Use Cases for 5G Specific Vulnerabilities and Attacks

Thumbnail
View/Open
Banati_154.pdf (1.036Mb)
Metadata
Show full item record
URI
http://hdl.handle.net/20.500.14044/32126
Collections
  • Acta Polytechnica Hungarica [186]
Abstract
The number of cybersecurity attacks and sensitive data breaches in businesses and organizations has increased significantly in recent years, and companies that are increasingly using or providing 5G technology are no exception. The impact of these incidents not only results the sensitive data breaches, financial losses and unexpected operational patterns for the targeted companies or organizations but can also extend to their peers in the same industry. Therefore, prevention and early detection of cyberattacks is also a key issue for IT infrastructures extended with emerging 5G technology. At the same time, detecting different types of attacks has become extremely challenging as attacks have become more sophisticated, distributed and stealthy with the help of artificial intelligence and other modern technologies. Detecting and managing such attacks requires sophisticated intrusion detection systems running on high-performance hardware and managed by expert security personnel. However, these resources are expensive to deploy, especially for small and medium-sized enterprises (SMEs). Therefore, in many cases, open source and free solutions are needed that allow SMEs to operate a security information event management (SIEM) system. Thanks to the low cost of implementation, it is affordable for SMEs and, after a short configuration and learning phase, it is self-sufficient and stable. Our goal is to provide detection solutions for attacks and vulnerabilities specific to 5G networks that provide effective detection and response for open source SIEM systems. Alerts on detected anomalies notify security personnel, who can efficiently and quickly implement incident response through graphical and visual dashboards.
Title
Developing Security Information and Events Management Use Cases for 5G Specific Vulnerabilities and Attacks
Author
Bánáti, Anna
xmlui.dri2xhtml.METS-1.0.item-date-issued
2025
xmlui.dri2xhtml.METS-1.0.item-rights-access
Open access
xmlui.dri2xhtml.METS-1.0.item-identifier-issn
1785-8860
xmlui.dri2xhtml.METS-1.0.item-language
en
xmlui.dri2xhtml.METS-1.0.item-format-page
25 p.
xmlui.dri2xhtml.METS-1.0.item-subject-oszkar
5G networks, vulnerability, attack detection, SIEM
xmlui.dri2xhtml.METS-1.0.item-description-version
Kiadói változat
xmlui.dri2xhtml.METS-1.0.item-identifiers
DOI: 10.12700/APH.22.2.2025.2.7
xmlui.dri2xhtml.METS-1.0.item-other-containerTitle
Acta Polytechnica Hungarica
xmlui.dri2xhtml.METS-1.0.item-other-containerPeriodicalYear
2025
xmlui.dri2xhtml.METS-1.0.item-other-containerPeriodicalVolume
22. évf.
xmlui.dri2xhtml.METS-1.0.item-other-containerPeriodicalNumber
2. sz.
xmlui.dri2xhtml.METS-1.0.item-type-type
Tudományos cikk
xmlui.dri2xhtml.METS-1.0.item-subject-area
Műszaki tudományok - informatikai tudományok
xmlui.dri2xhtml.METS-1.0.item-publisher-university
Óbudai Egyetem

DSpace software copyright © 2002-2016  DuraSpace
Contact Us | Send Feedback
Theme by 
Atmire NV
 

 

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

LoginRegister

DSpace software copyright © 2002-2016  DuraSpace
Contact Us | Send Feedback
Theme by 
Atmire NV