SHARE
Facebook X Pinterest WhatsApp

Protecting 5G Managed Services from DDoS, Exfiltration

thumbnail
Protecting 5G Managed Services from DDoS, Exfiltration

5G network wireless systems and Smart city communication network, connect global wireless devices.

Without the right cybersecurity capabilities in place, 5G networks can’t realize their potential in autonomous operations.

Dec 15, 2021

Given the wide range of edge, IoT, and real-time applications envisioned for 5G, the security of 5G managed services is critical. Thanks to a Stanford demonstration earlier this year, we may be able to protect these services from vulnerabilities during attacks. In the demonstration, a small fleet of drones was able to maintain a flight path despite persistent attacks on the network by using software designed by Open Networking Foundation.

Deploying software-defined networking (SDN) as a safeguard

The success of the SDN showcases a path to securing 5G networks despite continued attacks. This is a crucial step in rolling out full 5G capabilities and ensuring company trust. The demonstration allowed drones to recover from cyberattacks almost immediately, something that companies can leverage as attacks continue to increase.

Operating autonomous vehicles and robotics remains an area of concern, but this type of operation is also a huge benefit of switching over to 5G. Without the right cybersecurity capabilities in place, the new networks can’t realize their potential in autonomous operations.

Project Pronto’s demonstration moves the cybersecurity needle further using a simplified approach to black-box networking. SDN allows for the decoupling of data and routing functions. The result is faster recovery from attacks and increased resistance to the vulnerabilities experienced by networks in the past.

See also: How Continuous Intelligence Abates Security Staffing Issues

Advertisement

Security concerns challenge 5G rollouts, but new solutions arise

In the demonstration, a denial of service (DoS) attack caused a momentary lapse in the flight path. Researchers activated path verification, deactivating disruptive packets and righting the flight path. It only took a few seconds for researchers to manage the disruption and mitigate any further consequences through this simple response.

In a similar demonstration, path verification also prevented drones from sharing their location with hackers, showcasing the ability to prevent exfiltration attacks. Both will be an essential part of deploying different types of automated systems on the new 5G network and will continue the path cybersecurity companies need for full adoption.

thumbnail
Elizabeth Wallace

Elizabeth Wallace is a Nashville-based freelance writer with a soft spot for data science and AI and a background in linguistics. She spent 13 years teaching language in higher ed and now helps startups and other organizations explain - clearly - what it is they do.

Recommended for you...

U.S. Cyber Trust Mark: Evolving IoT from Smart to Secure
Matt Wyckhouse
Aug 24, 2024
80% Organizations Had A Cloud Security Incident in 2021
David Curry
Oct 10, 2022
Digital Twins Require Their Own Special Brand of Security
Joe McKendrick
Oct 10, 2022
New Report Highlights $14 Billion IoT IAM Market

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.