Research and application of 5G cloud-network-edge-end integrated in-depth security protection system
A 5G cloud-network-edge-end integrated in-depth security protection implementation scheme was innovatively proposed, the network security protection system of 5G customized network was explored, and the basic architecture, characteristics, implementation scheme and application effect of the system w...
Saved in:
Main Author: | |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2022-10-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2022276/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530686019731456 |
---|---|
author | Guoxin ZHANG |
author_facet | Guoxin ZHANG |
author_sort | Guoxin ZHANG |
collection | DOAJ |
description | A 5G cloud-network-edge-end integrated in-depth security protection implementation scheme was innovatively proposed, the network security protection system of 5G customized network was explored, and the basic architecture, characteristics, implementation scheme and application effect of the system were introduced.In the implementation plan, two key points were emphasized.Firstly, by deploying the security system of the four aspects of the 5G cloud network, the edge and the end, the multi-level and multi-dimensional security protection capability was formed.Secondly, the operation process of the adaptation system, including one-key reinforcement, security defense, situational awareness and one-key emergency response was established.Finally, the practical application effect of the 5G cloud-network-edge-end integrated in-depth security protection system was given. |
format | Article |
id | doaj-art-971dc6e07dc24668a3416e7185b5da1b |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2022-10-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-971dc6e07dc24668a3416e7185b5da1b2025-01-15T03:00:04ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012022-10-013817317959576708Research and application of 5G cloud-network-edge-end integrated in-depth security protection systemGuoxin ZHANGA 5G cloud-network-edge-end integrated in-depth security protection implementation scheme was innovatively proposed, the network security protection system of 5G customized network was explored, and the basic architecture, characteristics, implementation scheme and application effect of the system were introduced.In the implementation plan, two key points were emphasized.Firstly, by deploying the security system of the four aspects of the 5G cloud network, the edge and the end, the multi-level and multi-dimensional security protection capability was formed.Secondly, the operation process of the adaptation system, including one-key reinforcement, security defense, situational awareness and one-key emergency response was established.Finally, the practical application effect of the 5G cloud-network-edge-end integrated in-depth security protection system was given.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2022276/5Gcloud-network-edge-endintegrationtrusted terminalend-to-end |
spellingShingle | Guoxin ZHANG Research and application of 5G cloud-network-edge-end integrated in-depth security protection system Dianxin kexue 5G cloud-network-edge-end integration trusted terminal end-to-end |
title | Research and application of 5G cloud-network-edge-end integrated in-depth security protection system |
title_full | Research and application of 5G cloud-network-edge-end integrated in-depth security protection system |
title_fullStr | Research and application of 5G cloud-network-edge-end integrated in-depth security protection system |
title_full_unstemmed | Research and application of 5G cloud-network-edge-end integrated in-depth security protection system |
title_short | Research and application of 5G cloud-network-edge-end integrated in-depth security protection system |
title_sort | research and application of 5g cloud network edge end integrated in depth security protection system |
topic | 5G cloud-network-edge-end integration trusted terminal end-to-end |
url | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2022276/ |
work_keys_str_mv | AT guoxinzhang researchandapplicationof5gcloudnetworkedgeendintegratedindepthsecurityprotectionsystem |