SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
HUAWEI TECHNOLOGIES CO., LTD.
www.huawei.com
AI in 5G Security
Feng Gao
China Unicom
HUAWEI TECHNOLOGIES CO., LTD.
www.huawei.com
Network element security
5G network security
Typical service security
 eMBB security
 mMTC security
 URLLC security
 MEC security
 Network slice management security
 Service capability exposure security
 Security edge protection
 Network security situational awareness
 Automatic network element security assurance
What AI do for 5G security
HUAWEI TECHNOLOGIES CO., LTD.
www.huawei.com
Typical service security
HUAWEI TECHNOLOGIES CO., LTD.
www.huawei.com
8K videos
Embedded
virus
AI enables video filtering
AR/VR
AI enables new application
security
3D videos
Malicious code
Typical service security- eMBB
 Content detection by AI technology
 Filter embedded virus
 Filter embedded code
 Filter spam
 Pattern learning, cluster, and migration
 Security check for the new application before on-line
Various new
applications
Spam
Illegal content
HUAWEI TECHNOLOGIES CO., LTD.
www.huawei.com
Typical service security- eMTC
Network Data Analytics Function
(NWDAF) has been introduced in
the 5G System Architecture in
3GPP.
NWDAF perform data analysis using a 3-layer Deep Neural
Network to cluster the heterogeneous UEs into multiple UE
group(s).
Input layer
Output layer
UE behavioral information per UE
Expected UE behavioral information per UE group
provides the
expected UE
behavioral
information
NWDAF
UDM
to help supervision
of mIoT terminals
AI enables mIoT Terminals supervision
HUAWEI TECHNOLOGIES CO., LTD.
www.huawei.com
Typical service security- eMTC
UE behavioural information collected from 5GC NF(s) Expected UE behavioural information for a UE group provided
by the NWDAF
Information Presence Source Description
UE ID M AMF/SMF Could be e.g. SUPI, which is used by NWDAF
to correlate the UE behavioural information
from different 5GC NFs.
Location info
>Timestamp O AMF The timing for the UE
>Location O AMF The location info for the UE e.g. Cell ID or TA
ID
Communication
Pattern Info
>Communication
start time
O SMF Start time when the UE is available for
communication
>Communication end
time
O SMF End time when the UE is unavailable for
communication
Network
Configuration Info
>UL or DL Packet
Latency
O SMF Indicating the delay for uplink or downlink
packets transfers for the UE
Information Presence Description
Stationary indication O Identifies whether the UE is stationary or mobile, e.g. only on
demand. (TS 23.682 [5], clause 5.10.1).
UE Moving Trajectory O Identifies the UE's expected geographical movement
(TS 23.502 [3], clause 4.15.6).
Example: A planned path of movement
Periodic communication
indicator
O Identifies whether the UE communicates periodically or not,
e.g. only on demand. (TS 23.682 [5], clause 5.10.1).
Communication duration
time
O Duration interval time of periodic communication (may be used
together with 1) (TS 23.682 [5], clause 5.10.1).
Example: 5 minutes
Periodic time O Interval Time of periodic communication (may be used together
with 1) (TS 23.682 [5], clause 5.10.1).
Example: every hour
Scheduled communication
time
O Time zone and Day of the week when the UE is available for
communication (TS 23.682 [5], clause 5.10.1).
Example: Time: 13:00-20:00, Day: Monday
Maximum Latency O Indicating maximum delay acceptable for downlink data
transfers (TS 23.682 [5], clause 4.5.21).
Maximum Response
Time
O Indicating the time for which the UE stays reachable to allow the
AF to reliably deliver the required downlink data (TS 23.682 [5],
clause 4.5.21).
Suggested Number of
Downlink Packets
O Indicating the number of packets that the UPF shall buffer in
case the UE is not reachable (TS 23.682 [5], clause 4.5.21).
HUAWEI TECHNOLOGIES CO., LTD.
www.huawei.com
Typical service security- URLLC
AI analysis module in the V2X security operation center
performs data analysis using a 3-layer Deep Neural Network
to cluster the heterogeneous vehicles into multiple vehicles
group(s).
Input layer
Output layer
Vehicle behavioral information per vehicle
Expected vehicle behavioral information per
vehicle group
AI enables V2X abnormal behavior analysis
HUAWEI TECHNOLOGIES CO., LTD.
www.huawei.com
Typical service security- URLLC
Data collected from multiple sources,
AI enables secure path planning
• Vehicle data
• Vehicle sensor data
• Road infrastructure data
• Network data
• Weather data
• Large events data
• Analytics data
provides the
prediction of
secure path
planning
NWDAF
NEF
to help planning
the best and
secure path
AI enables V2X secure path planning
HUAWEI TECHNOLOGIES CO., LTD.
www.huawei.com
5G network security
HUAWEI TECHNOLOGIES CO., LTD.
www.huawei.com
5G network security- MEC security
Multiple access
MEC APP
RAN CU UPF GW-U
vBRAS-U vCPE vCDN
Edge cloud computing AI enables APP security
AI enables network
security
 Pattern learning, cluster, and migration
 Security check for the new application before
on-line
 Automatic molding network environment
 Verify the network security policy
HUAWEI TECHNOLOGIES CO., LTD.
www.huawei.com
UE access unauthorized network slicing
Unauthorized operation for the network slicing
Abnormal behavior by the subscribed user
5G network security- network slicing
AMF UPF UDM
AMF UPF UDM
eMBB
mMTC
uRLLC
AMF UPF UDM
V2X
IoT
Internet
2
1
2
3
3
1
1
AI enables network slicing management security
 Pattern learning, cluster, and migration
 Monitoring the network slicing access
 Supervising the network slicing operation 2
 Perform data analysis using a 3-layer Deep
Neural Network to cluster the heterogeneous UEs
subscribed user into multiple subscribed user
group(s).
 Supervising the abnormal behavior by the
subscribed user 3
HUAWEI TECHNOLOGIES CO., LTD.
www.huawei.com
AI technology
5G network security- Security Edge Protection
AI enables the E2E security between operators
The SEPP shall implement rate-limiting functionalities to
defend itself and subsequent NFs against excessive CP
signalling. (3GPP TS 33.501)
Security Edge Protection Proxy (SEPP) in 3GPP:
•Message filtering and policing on inter-PLMN control
plane interfaces
•Topology hiding
 Perform network rate analysis between operators
using a 3-layer Deep Neural Network to cluster
the heterogeneous network rate into multiple
network rate models.
 Intelligent and automatic makes the decision
for rate-limiting functionalities
 To defend the potential DDoS attack
HUAWEI TECHNOLOGIES CO., LTD.
www.huawei.com
5G network security- Service Capability Exposure
AI enables the service capability exposure security
API invoker outsides of the PLMN trust domain
- utilizes the CAPIF-1e, CAPIF-2e and the CAPIF-3 interfaces to
onboard.
API invoker within the PLMN trust domain
- via the CAPIF-1, the CAPIF-2 and the CAPIF-3 interfaces prior
to granting access to CAPIF services.
Service Capability Exposure Function (SCEF) in 3GPP:
•provides access to network capabilities through homogenous
network application programming interfaces (e.g. Network
APIs) defined over T8 interface
•supports the Common API Framework (CAPIF) API
 Perform trust evaluation to classify the trusted API invoker
and un-trusted API invoker instead of checking whether it is
in the PLMN trust domain.
 User feedback of the application
 Malicious code detection of the application
 Attack monitoring of the application
 ….
AI technology
CAPIF functional security model
HUAWEI TECHNOLOGIES CO., LTD.
www.huawei.com
AI enables the 5G network security situational awareness
Data collection
(log/signaling/traffic)
Security policy
Key, certificate, identity management
RAN
5GC
eMBB
mMTC
uRLLC
Internet
V2X
IoT
platform
DU CU
AMF UPF UDM
AMF UPF UDM
AMF UPF UDM
MEC
R
U
Bearer
network
Security analysis platform
Based on the AI analysis, to detect the signaling
storm, DDoS、OAM attacks.
User
management
Security management platform
Key
management
KMS
Certificate
management
RA/CA
Data
base
Loophole
management
Security control platform
Engine
Playbook
Action List
Security policy
arrangement
Security policy
issue
Security
gateway
Firewall
EMS
5G network security- Network security situational awareness
HUAWEI TECHNOLOGIES CO., LTD.
www.huawei.com
Network element security
HUAWEI TECHNOLOGIES CO., LTD.
www.huawei.com
MME
NR Node B (gNB)
PGW
eNB
Access and Mobility management Function (AMF)
Network element security
User Plane Function (UPF)
Data Management (UDM)
3GPP studies the network element security assurance almost 6
years, from the methodology to the specification for the 4G and 5G
network elements.
Session Management Function (SMF)
Authentication Server Function (AUSF)
Security Edge Protection Proxy (SEPP)
Network Repository Function (NRF)
Network Exposure Function (NEF)
Maybe in the future, the AI robot can do the
test and evaluation for the network elements
automatic and intelligence.
We will see!
HUAWEI TECHNOLOGIES CO., LTD.
www.huawei.com
Thanks!

Contenu connexe

Similaire à Feng_Gao_Presentation.pdf

Towards design strong emergency and COVID-19 authentication scheme in VANET
Towards design strong emergency and COVID-19  authentication scheme in VANETTowards design strong emergency and COVID-19  authentication scheme in VANET
Towards design strong emergency and COVID-19 authentication scheme in VANET
nooriasukmaningtyas
 
Raisul Haq Rajib (063435056)
Raisul Haq Rajib  (063435056)Raisul Haq Rajib  (063435056)
Raisul Haq Rajib (063435056)
mashiur
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systems
Iaetsd Iaetsd
 

Similaire à Feng_Gao_Presentation.pdf (20)

OPC UA Connectivity with InduSoft and the OPC Foundation
OPC UA Connectivity with InduSoft and the OPC FoundationOPC UA Connectivity with InduSoft and the OPC Foundation
OPC UA Connectivity with InduSoft and the OPC Foundation
 
Enabling SDN for Service Providers by Khay Kid Chow
Enabling SDN for Service Providers by Khay Kid ChowEnabling SDN for Service Providers by Khay Kid Chow
Enabling SDN for Service Providers by Khay Kid Chow
 
Towards design strong emergency and COVID-19 authentication scheme in VANET
Towards design strong emergency and COVID-19  authentication scheme in VANETTowards design strong emergency and COVID-19  authentication scheme in VANET
Towards design strong emergency and COVID-19 authentication scheme in VANET
 
Migrating mobile networks to 5 g a smooth and secure approach 01.10.20
Migrating mobile networks to 5 g a smooth and secure approach 01.10.20Migrating mobile networks to 5 g a smooth and secure approach 01.10.20
Migrating mobile networks to 5 g a smooth and secure approach 01.10.20
 
7215nsa05
7215nsa057215nsa05
7215nsa05
 
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSCOMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
 
IoT and M2M Services for the Railway Market
IoT and M2M Services for the Railway MarketIoT and M2M Services for the Railway Market
IoT and M2M Services for the Railway Market
 
Wang lab introduction_1204_2018
Wang lab introduction_1204_2018Wang lab introduction_1204_2018
Wang lab introduction_1204_2018
 
KPN Innovation Playground webinar 2 sep 2020
KPN Innovation Playground webinar 2 sep 2020 KPN Innovation Playground webinar 2 sep 2020
KPN Innovation Playground webinar 2 sep 2020
 
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
 
Comprehensive survey of possible
Comprehensive survey of possibleComprehensive survey of possible
Comprehensive survey of possible
 
Raisul Haq Rajib (063435056)
Raisul Haq Rajib  (063435056)Raisul Haq Rajib  (063435056)
Raisul Haq Rajib (063435056)
 
Mobile computing security
Mobile computing securityMobile computing security
Mobile computing security
 
Voip security
Voip securityVoip security
Voip security
 
5G NR-based C-V2X
5G NR-based C-V2X5G NR-based C-V2X
5G NR-based C-V2X
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
R43019698
R43019698R43019698
R43019698
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systems
 
CES 2010 FemtoZone
CES 2010 FemtoZoneCES 2010 FemtoZone
CES 2010 FemtoZone
 
Case study about voip
Case study about voipCase study about voip
Case study about voip
 

Dernier

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Feng_Gao_Presentation.pdf

  • 1. HUAWEI TECHNOLOGIES CO., LTD. www.huawei.com AI in 5G Security Feng Gao China Unicom
  • 2. HUAWEI TECHNOLOGIES CO., LTD. www.huawei.com Network element security 5G network security Typical service security  eMBB security  mMTC security  URLLC security  MEC security  Network slice management security  Service capability exposure security  Security edge protection  Network security situational awareness  Automatic network element security assurance What AI do for 5G security
  • 3. HUAWEI TECHNOLOGIES CO., LTD. www.huawei.com Typical service security
  • 4. HUAWEI TECHNOLOGIES CO., LTD. www.huawei.com 8K videos Embedded virus AI enables video filtering AR/VR AI enables new application security 3D videos Malicious code Typical service security- eMBB  Content detection by AI technology  Filter embedded virus  Filter embedded code  Filter spam  Pattern learning, cluster, and migration  Security check for the new application before on-line Various new applications Spam Illegal content
  • 5. HUAWEI TECHNOLOGIES CO., LTD. www.huawei.com Typical service security- eMTC Network Data Analytics Function (NWDAF) has been introduced in the 5G System Architecture in 3GPP. NWDAF perform data analysis using a 3-layer Deep Neural Network to cluster the heterogeneous UEs into multiple UE group(s). Input layer Output layer UE behavioral information per UE Expected UE behavioral information per UE group provides the expected UE behavioral information NWDAF UDM to help supervision of mIoT terminals AI enables mIoT Terminals supervision
  • 6. HUAWEI TECHNOLOGIES CO., LTD. www.huawei.com Typical service security- eMTC UE behavioural information collected from 5GC NF(s) Expected UE behavioural information for a UE group provided by the NWDAF Information Presence Source Description UE ID M AMF/SMF Could be e.g. SUPI, which is used by NWDAF to correlate the UE behavioural information from different 5GC NFs. Location info >Timestamp O AMF The timing for the UE >Location O AMF The location info for the UE e.g. Cell ID or TA ID Communication Pattern Info >Communication start time O SMF Start time when the UE is available for communication >Communication end time O SMF End time when the UE is unavailable for communication Network Configuration Info >UL or DL Packet Latency O SMF Indicating the delay for uplink or downlink packets transfers for the UE Information Presence Description Stationary indication O Identifies whether the UE is stationary or mobile, e.g. only on demand. (TS 23.682 [5], clause 5.10.1). UE Moving Trajectory O Identifies the UE's expected geographical movement (TS 23.502 [3], clause 4.15.6). Example: A planned path of movement Periodic communication indicator O Identifies whether the UE communicates periodically or not, e.g. only on demand. (TS 23.682 [5], clause 5.10.1). Communication duration time O Duration interval time of periodic communication (may be used together with 1) (TS 23.682 [5], clause 5.10.1). Example: 5 minutes Periodic time O Interval Time of periodic communication (may be used together with 1) (TS 23.682 [5], clause 5.10.1). Example: every hour Scheduled communication time O Time zone and Day of the week when the UE is available for communication (TS 23.682 [5], clause 5.10.1). Example: Time: 13:00-20:00, Day: Monday Maximum Latency O Indicating maximum delay acceptable for downlink data transfers (TS 23.682 [5], clause 4.5.21). Maximum Response Time O Indicating the time for which the UE stays reachable to allow the AF to reliably deliver the required downlink data (TS 23.682 [5], clause 4.5.21). Suggested Number of Downlink Packets O Indicating the number of packets that the UPF shall buffer in case the UE is not reachable (TS 23.682 [5], clause 4.5.21).
  • 7. HUAWEI TECHNOLOGIES CO., LTD. www.huawei.com Typical service security- URLLC AI analysis module in the V2X security operation center performs data analysis using a 3-layer Deep Neural Network to cluster the heterogeneous vehicles into multiple vehicles group(s). Input layer Output layer Vehicle behavioral information per vehicle Expected vehicle behavioral information per vehicle group AI enables V2X abnormal behavior analysis
  • 8. HUAWEI TECHNOLOGIES CO., LTD. www.huawei.com Typical service security- URLLC Data collected from multiple sources, AI enables secure path planning • Vehicle data • Vehicle sensor data • Road infrastructure data • Network data • Weather data • Large events data • Analytics data provides the prediction of secure path planning NWDAF NEF to help planning the best and secure path AI enables V2X secure path planning
  • 9. HUAWEI TECHNOLOGIES CO., LTD. www.huawei.com 5G network security
  • 10. HUAWEI TECHNOLOGIES CO., LTD. www.huawei.com 5G network security- MEC security Multiple access MEC APP RAN CU UPF GW-U vBRAS-U vCPE vCDN Edge cloud computing AI enables APP security AI enables network security  Pattern learning, cluster, and migration  Security check for the new application before on-line  Automatic molding network environment  Verify the network security policy
  • 11. HUAWEI TECHNOLOGIES CO., LTD. www.huawei.com UE access unauthorized network slicing Unauthorized operation for the network slicing Abnormal behavior by the subscribed user 5G network security- network slicing AMF UPF UDM AMF UPF UDM eMBB mMTC uRLLC AMF UPF UDM V2X IoT Internet 2 1 2 3 3 1 1 AI enables network slicing management security  Pattern learning, cluster, and migration  Monitoring the network slicing access  Supervising the network slicing operation 2  Perform data analysis using a 3-layer Deep Neural Network to cluster the heterogeneous UEs subscribed user into multiple subscribed user group(s).  Supervising the abnormal behavior by the subscribed user 3
  • 12. HUAWEI TECHNOLOGIES CO., LTD. www.huawei.com AI technology 5G network security- Security Edge Protection AI enables the E2E security between operators The SEPP shall implement rate-limiting functionalities to defend itself and subsequent NFs against excessive CP signalling. (3GPP TS 33.501) Security Edge Protection Proxy (SEPP) in 3GPP: •Message filtering and policing on inter-PLMN control plane interfaces •Topology hiding  Perform network rate analysis between operators using a 3-layer Deep Neural Network to cluster the heterogeneous network rate into multiple network rate models.  Intelligent and automatic makes the decision for rate-limiting functionalities  To defend the potential DDoS attack
  • 13. HUAWEI TECHNOLOGIES CO., LTD. www.huawei.com 5G network security- Service Capability Exposure AI enables the service capability exposure security API invoker outsides of the PLMN trust domain - utilizes the CAPIF-1e, CAPIF-2e and the CAPIF-3 interfaces to onboard. API invoker within the PLMN trust domain - via the CAPIF-1, the CAPIF-2 and the CAPIF-3 interfaces prior to granting access to CAPIF services. Service Capability Exposure Function (SCEF) in 3GPP: •provides access to network capabilities through homogenous network application programming interfaces (e.g. Network APIs) defined over T8 interface •supports the Common API Framework (CAPIF) API  Perform trust evaluation to classify the trusted API invoker and un-trusted API invoker instead of checking whether it is in the PLMN trust domain.  User feedback of the application  Malicious code detection of the application  Attack monitoring of the application  …. AI technology CAPIF functional security model
  • 14. HUAWEI TECHNOLOGIES CO., LTD. www.huawei.com AI enables the 5G network security situational awareness Data collection (log/signaling/traffic) Security policy Key, certificate, identity management RAN 5GC eMBB mMTC uRLLC Internet V2X IoT platform DU CU AMF UPF UDM AMF UPF UDM AMF UPF UDM MEC R U Bearer network Security analysis platform Based on the AI analysis, to detect the signaling storm, DDoS、OAM attacks. User management Security management platform Key management KMS Certificate management RA/CA Data base Loophole management Security control platform Engine Playbook Action List Security policy arrangement Security policy issue Security gateway Firewall EMS 5G network security- Network security situational awareness
  • 15. HUAWEI TECHNOLOGIES CO., LTD. www.huawei.com Network element security
  • 16. HUAWEI TECHNOLOGIES CO., LTD. www.huawei.com MME NR Node B (gNB) PGW eNB Access and Mobility management Function (AMF) Network element security User Plane Function (UPF) Data Management (UDM) 3GPP studies the network element security assurance almost 6 years, from the methodology to the specification for the 4G and 5G network elements. Session Management Function (SMF) Authentication Server Function (AUSF) Security Edge Protection Proxy (SEPP) Network Repository Function (NRF) Network Exposure Function (NEF) Maybe in the future, the AI robot can do the test and evaluation for the network elements automatic and intelligence. We will see!
  • 17. HUAWEI TECHNOLOGIES CO., LTD. www.huawei.com Thanks!