Jan. 1, 2024, 2:10 a.m. | Zeyad Abdelhay, Yahuza Bello, Ahmed Refaey

cs.CR updates on arXiv.org arxiv.org

The upcoming Sixth Generation (6G) network is projected to grapple with a
range of security concerns, encompassing access control, authentication, secure
connections among 6G Core (6GC) entities, and trustworthiness. Classical
Virtual Private Networks (VPNs), extensively deployed in Evolved Packet Core
(EPC) network infrastructure, are notoriously susceptible to a variety of
attacks, including man-in-the-middle incursions, Domain Name System (DNS)
hijacking, Denial of Service (DoS) attacks, port scanning, and persistent
unauthorized access attempts. This paper introduces the concept of Software
Defined Perimeter …

access access control authentication connections control defense defined dynamic entities infrastructure mechanism moving moving target defense network network infrastructure networks packet perimeter private private networks security security concerns software target trust trustworthiness upcoming virtual virtual private networks vpns

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)