• Login
  • Register
  • Search

Analysis and research of situation awareness based on private network endogenous security

Wei Zhu, Hanyi Dai, Zhangqi Zhu, , Peng Ye

Abstract


in 2022, in order to adapt to the rapid development of Tob customers’ businesses in the industry private network, 5g MEC,
cloud network, dedicated line, IDC and dict, and meet the urgent needs of government and enterprise customers for products and services
such as traffi c control, traffi c security and anomaly detection, network security situational awareness, network operation and maintenance,
business performance assurance, service inspection and SLA evaluation in the park, edge cloud, government aff airs and other scenarios,
Combined with the strategic deployment of “digital computing in the East and digital computing in the west”, the construction planning of
edge cloud, the promotion of new technologies and business application scenarios of computing network, enterprise customers have more
clear and strong requirements for cloud SLA service guarantee and security level guarantee based on computing network.
Therefore, it is necessary to establish an endogenous security protection mechanism, strengthen the new security protection capability
based on traffi c and the security scheduling capability that moves with the computing network, and ensure that the network infrastructure is
safe and controllable.

Keywords


5g private network; Safety; Situational awareness; Anomaly monitoring

Full Text:

PDF

Included Database


References


[1] Jun Shen,Guorong Liu, Ming He, 5G private network security requirements analysis and strategy discussion [j]Mobile communications, 2021 (3): 35-39

[2] Shu Zheng’s network security deployment scheme for 5G customized private network [j] Telecom express, 2022 (7): 23-27

[3] Huanyi Mai,Xiaodi Huang , security analysis and Strategy Research of 5g smart steel private network [j]Telecom express, 2022 (1): 18-20

[4] Development and security analysis of chenbaomin 5g private network [j]Electronic technology and software engineering, 2022 (6): 22-25

[5] Chaoyang Li,Pengfei Hu ,HuiFu Zhou , 5G customized private network deployment scheme and security strategy research for data not leaving the park [j]

Jiangxi communication technology 2021 (2): 4-7

[6] Jun Wang, Yongchun Tian design of a wide area 5g secure private network for key industry applications [j]Journal of China Academy of Electronic

Sciences, 2021 (10): 964-972

[7] Shan Wang, Yong Wang,Yuming Ding, research on the application scheme of in-depth analysis of 5g private network data [j]Post and Telecommunications

design technology, 2022 (6): 77-81

[8] Discussion on zhuzhihong 5g enterprise private network UPF construction scheme [j]Communication and information technology, 2022 (1): 81-83

[9] Huamin Fan the development of industry private network in 5g era [j]Post and Telecommunications design technology, 2022 (2): 77-80

[10] Application and Simulation of Zhang Xin and Cheng Min 5g private network in industrial scenes [j]Mobile communications, 2022 (8): 81-85

[11] Application and Simulation of 5g private network in industrial scenes by Zhou Xin, Songyang, liukunyao [j]China new communications, 2021 (7): 117-

118

[12] Li Shuang, Guo Zhongzhi, Wang Shuai, 5g network edge cloud solution for industrial Internet demand [j]Post and Telecommunications design

technology, 2022 (2): 81-87

[13] Mai Huanyi, Huang Xiaodi, et al. Research on safety protection of 5g+ industrial control system under Bao 2.0 [j]Telecom express, 2022 (4): 14-17

[14] Liguole on the opportunities and challenges of 5g private network development [j]Communication world, 2021 (5): 37-39

[15] Sun Xi, Tian Lin, Li Dawei research status of 5g based private network security [j]Journal of command and control, 2020 (4): 299-309




DOI: http://dx.doi.org/10.18686/modern-management-forum.v6i12.6908

Refbacks