Implementing Cyber Threat Intelligence and Monitoring in 5G O-RAN: Proactive Protection Against Evolving Threats
  • Author(s): Hezekiah Oluwafisayo Balogun ; Oluwasanmi Segun Adanigbo
  • Paper ID: 1706183
  • Page: 478-485
  • Published Date: 20-08-2024
  • Published In: Iconic Research And Engineering Journals
  • Publisher: IRE Journals
  • e-ISSN: 2456-8880
  • Volume/Issue: Volume 8 Issue 2 August-2024
Abstract

As the fifth-generation (5G) of mobile networks continues to roll out globally, the adoption of Open Radio Access Network (O-RAN) architecture introduces new challenges and opportunities for cybersecurity. With the evolution of technology, cyber threats are also becoming increasingly sophisticated and targeted. In this paper, we propose a comprehensive approach to implementing Cyber Threat Intelligence (CTI) and monitoring in 5G O-RAN to proactively protect against evolving threats. This includes leveraging CTI tools and techniques to gather intelligence on potential threats, monitoring network traffic for anomalies, and implementing proactive security measures to mitigate risks. We also discuss the importance of collaboration between network operators, vendors, and cybersecurity experts to ensure a holistic approach to cybersecurity in 5G O-RAN.

Keywords

5G, O-RAN, Cyber Threat Intelligence, Monitoring, Proactive Protection

Citations

IRE Journals:
Hezekiah Oluwafisayo Balogun , Oluwasanmi Segun Adanigbo "Implementing Cyber Threat Intelligence and Monitoring in 5G O-RAN: Proactive Protection Against Evolving Threats" Iconic Research And Engineering Journals Volume 8 Issue 2 2024 Page 478-485

IEEE:
Hezekiah Oluwafisayo Balogun , Oluwasanmi Segun Adanigbo "Implementing Cyber Threat Intelligence and Monitoring in 5G O-RAN: Proactive Protection Against Evolving Threats" Iconic Research And Engineering Journals, 8(2)