5G Technology World

  • 5G Technology and Engineering
  • FAQs
  • Apps
  • Devices
  • IoT
  • RF
  • Radar
  • Wireless Design
  • Learn
    • 5G Videos
    • Ebooks
    • EE Training Days
    • FAQs
    • Learning Center
    • Tech Toolboxes
    • Webinars/Digital Events
  • Handbooks
    • 2024
    • 2023
    • 2022
    • 2021
  • Resources
    • Design Guide Library
    • EE World Digital Issues
    • Engineering Diversity & Inclusion
    • Engineering Training Days
    • LEAP Awards
  • Advertise
  • Subscribe

The Economics of 5G Cyber Threats

By Michael Schachter, Senior Product Manager, Allot Communications | June 7, 2018

Induced demand is an economic theory that describes how increasing the supply of a product or service can make people want that good even more. When applied to roads, this theory argues that more roads lead to more vehicle traffic. Why? Because new roads will attract new drivers, leading to more traffic on the streets.

This same logic can be applied to mobile traffic and is especially prescient with the dawn of the new 5G network. But while 5G networks hold enormous promise for service provider innovation, they’re simultaneously opening the door for new cybercriminal activity and increased malicious traffic.

As a result, distributed denial of service (DDoS) attacks will continue to grow, both in scale and frequency, and we could soon see a new generation of cybercriminals taking advantage of this more widespread and higher capacity bandwidth.

DDoS Mitigation Skills in Demand

In economic terms, demand refers to how much (quantity) of a product or service is desired by buyers. In the mobile world, defending against DDoS attacks is in high demand— especially as these types of attacks show no signs of going away any time soon.

According Frost & Sullivan’s whitepaper “Service Provider Requirements for DDoS Mitigation,” DDoS attacks are more dangerous, vicious and common than ever – and they are also harder to mitigate. DDoS has become a preferred method for cybercriminals, given how easy they are to launch in the era of the Internet of Things (IoT). Whether motivated by financial gain or political ideology, malicious actors are out to make a profit, a name for themselves, or create chaos. And as the IoT industry grows, DDoS attacks will similarly rise in scale, severity, and frequency. Enterprises, government organizations, and communication service providers (CSPs) should be on the lookout.

In its 2017 technology, media, and telecommunications (TMT) report, Deloitte predicted an average rate of one DDoS attack over 1 Tbps per month. This is a significant increase when you consider that it wasn’t until 2016 when we saw the first-ever dual 1 Tbps attacks. Already in 2018, a US service provider recently suffered the largest DDoS attack ever recorded back in March, peaking at 1.7Tbps. Are 2 Tbps attacks just around the corner?

5G Networks Supplying the Threat

Supply is the amount of goods or services that firms, consumers, laborers, or other economic agents are willing to provide to the marketplace. CSPs are proving to be the suppliers of innovative networks driven by competition and a global race toward 5G.

However, with that innovation comes risk. Parallel to the spread of IoT, the more widespread and higher capacity bandwidth of 5G gives cybercriminals even more opportunity to take advantage. The recent Hikvision authentication security flaw – which gave hackers the ability to potentially hijack cameras, DVRs, and accounts – underscores how the IoT provides hackers with fresh ammunition.

5G will make DDoS an even more attractive attack vector. Wider bandwidth can give more opportunity for hackers looking to spread damage on 5G networks. As a result, CSPs migrating to 5G networks are in a unique position to bake in cybersecurity protections at the network level to help stunt the impact of DDoS attacks.

Reaching Equilibrium with Better Architecture

Economic equilibrium is a state where forces such as supply and demand are balanced, or where the hypothetical supply and demand curves intersect. For telcos, this condition can only be achieved through a holistic approach towards DDoS attacks and 5G networks, rather than relying on outdated defense tactics.

Traditional scrubbing centers, for example, are unable to manage the volume of today’s DDoS traffic. Legitimate traffic is being swept up and blocked, and video streaming quality can be severely impacted. Inline solutions designed primarily for enterprises face the same hurdles, as they don’t scale to the type of traffic loads CSPs experience.

As an alternative, inline high-volume DDoS mitigation combined with deep packet inspection (DPI) is built to meet CSP requirements through reduced costs, visibility and prevention of both inbound and outbound malicious traffic, and faster response time. This solution can be customized, fully virtualized, and fully scaled to keep up with wire speed traffic. Network behavior anomaly detection (NBAD) uses machine learning to detect unknown DDoS attacks and integrated DPI traffic management guarantees assured quality of experience (QoE) during attacks.

Economics Cheat Sheet

Even though 5G benefits both businesses and consumers alike with faster speeds and greater mobility, that additional capacity also presents an opportunity for cybercriminals to exploit.

As we’ve seen with the IoT DDoS attack phenomenon, 5G networks will undoubtedly make these attacks even more destructive. Security will need to be a major focus for telcos, as new innovations make waves – especially 5G.


Filed Under: 5G

 

Next Article

← Previous Article
Next Article →

Related Articles Read More >

Butler Matrix
Butler Matrix drives Wi-Fi and other phased-array antennas
2.4 GHz chip antennas connect IoT devices to networks
6G
6G needs less, 6G needs more
Demonstration shows 5G handset communicating through satellites

Featured Contributions

  • Overcome Open RAN test and certification challenges
  • Wireless engineers need AI to build networks
  • Why AI chips need PCIe 7.0 IP interconnects
  • circuit board timing How timing and synchronization improve 5G spectrum efficiency
  • Wi-Fi 7 and 5G for FWA need testing
More Featured Contributions

EE TECH TOOLBOX

“ee
Tech Toolbox: 5G Technology
This Tech Toolbox covers the basics of 5G technology plus a story about how engineers designed and built a prototype DSL router mostly from old cellphone parts. Download this first 5G/wired/wireless communications Tech Toolbox to learn more!

EE LEARNING CENTER

EE Learning Center
“5g
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.

Engineering Training Days

engineering
“bills
5G Technology World
  • Enews Signup
  • EE World Online
  • DesignFast
  • EDABoard Forums
  • Electro-Tech-Online Forums
  • Microcontroller Tips
  • Analogic Tips
  • Connector Tips
  • Engineer’s Garage
  • EV Engineering
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips
  • About Us
  • Contact Us
  • Advertise

Copyright © 2025 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy

Search 5G Technology World