SlideShare a Scribd company logo
1 of 13
Copyright Mavenir 2019. Proprietary and Confidential. mavenir.com
Evolution of Real-Time Machine
Learning (RRML) in Core Network
Security and Anti-Fraud Into 5G and
New Services
Context
Copyright Mavenir 2019. mavenir.com
Supply Chain
Privacy and Data protection
Signaling
Cloud
Internet of Things
Human
Device
Security
Threat
Landscape
Global
Fraud
Survey
Global loss – $29.2B
Identity fraud
PBX hacking
IRSF
By-pass
Arbitrage
Wholesale
Challenge
Expertise
Technology
(5G)
Organization
5G PPP Security requirements
Higher security and privacy level
Security Automation
Security Monitoring
Security Management
Liability schemes
Slice isolation
End to end encryption
Regulation
Copyright Mavenir 2019. 3
Any security trade-
off would be
misused by an
attacker in form of
Fraud or damage
5GC Business Channels and Workstreams
• Asset Tracking
• Security & GDPR
• Robotics
• Industrial Automation
• AR/VR
• High Density
• High Demand
• Elastic Scale
• Healthcare Automation
• Patient Record Mgt.
• Security & HIPAA
• Device Diagnostics
• NLP & NLU
• Industrial Automation
• Process Optimization
• Supply Chain
• Security & Safety
• Video Monitoring
• AR/VR
• Retail Promotion
• Heat Map
• Facial Recognition
• Security & Safety
• Asset Mgt.
• Video Surveillance
• Private LTE/5G
• Security & GDPR
Mall
Industrial
AutomationStadium
Warehouse
Hospital
Office Park
Remote Developer
4
5G security Architecture
• 5G reference architecture
offers comprehensive security
but still could be exploited
– Implementation trade-offs
– Multi-vendor environments
– IT technology
• Typical Fraud scenarios are
not (fully) covered
Copyright Mavenir 2019. 5
User Application Provider Application
SN
HE
3GPP AN
Non-3GPP AN
(I) (I)
(I)
(II)
(IV)
(V)
Application
Stratum
Home Stratum/
Serving Stratum
Transport Stratum
(II)
(I)
(III)
(I)
ME USIM
(I)
SEPP AUSF ARPF SEAF
Why Telco needs help ?
MNO
• Security is a cost factor
contradicting OPEX KPI
• Fraud team is often detached from
the network
• Regulation
• Marketing
• International risks/supply chain
Copyright Mavenir 2019. 6
Banking
• Security = Anti-Fraud
• Security = Main business
• Security is embedded into
technology
• Direct law enforcement
VS
Mavenir approach
Copyright Mavenir 2019. 7
Expertise
• Hands-on understanding
of vulnerabilities
• Business drivers
• Creativity
Technology
• Machine Learning and AI
• Deep understanding of
protocols
Service
• Knowledge
• Protection
• Security as a Service
Machine Learning for Security solutions
Copyright Mavenir 2019. 8
Business
and
Technical
data
Technology Proficiency
Controlled
AI
Enable and Support the Telco Transformation
Key technical principles for Machine Learning in Telco
Copyright Mavenir 2018. 9
Specialized/tailored algorithms
Real-Time factor (response time in under 10ms)
Subject area focus rather then generic data focus
Seamless integration of Machine Learning and rule engine
5G and Service Mesh architecture readiness
Horizontal approach (focus beyond fraud and security)
Extending the role of NWDAF into security and Anti-Fraud
SMSF
NWDAF
Constant insight
Real-time ML
Reaction to anomalies
Fraud prevention
Attack detection
Security assurance
Copyright Mavenir 2019.
Copyright Mavenir 2019. 11
Mavenir Security Suite
Network/Voice
Module
Subscription
Fraud
Messaging Fraud/
SpamShield
Wholesale
Fraud IoT Security Credit Scoring
Firewall layer: SS7, ISUP, Diameter, SIP, GTP, HTTP/2
Robocall
control
AI and Machine Learning engines
• Single Platform, Single architecture, multiple modules
• Leveraging NWDAF architecture
• Natively developed with Real-time Machine Learning
• Fraud prediction based on ML
• Rule-based configuration integrated with ML
• Dedicated algorithms for major use-cases
• Flexible reporting and real-time dashboards
• Multiple integration options
• NFV & Microservices architecture
Real-time Fraud prevention and detection
Optimal OPEX for mobile operators
Revenue savings proven in the market
Regulator compliancy
Efficient subscriber protection
Future proof
Data
Anti-Fraud
Copyright Mavenir 2019.
Machine Learning / AI for Automation and Insights
Insight
IoT
Profile 1
IoT
Profile 2
IoT
Profile 3
Profile Change Pattern
Network
Function
RuleEngine
Mediation
Featurization
Machine Learning
Learning Module
Reporting &
Investigation
Alert
Management
FMS Analytics
Additional
Data
Feeds
Standard market deployed architecture addressing:
DDoS detection and IoT service anomaly detection, Voice & Messaging Fraud, Signaling and
Service protection
12
Copyright Mavenir 2019. 13
Thank you

More Related Content

What's hot

What is next for Telecom (Broadband and Cell) - September 2021
What is next for Telecom (Broadband and Cell) - September 2021What is next for Telecom (Broadband and Cell) - September 2021
What is next for Telecom (Broadband and Cell) - September 2021paul young cpa, cga
 
From broadband to 5G
From broadband to 5GFrom broadband to 5G
From broadband to 5GDamjan Slapar
 
Mavenir 5G is a forcing factor for Virtualization and vRAN is critical succes...
Mavenir 5G is a forcing factor for Virtualization and vRAN is critical succes...Mavenir 5G is a forcing factor for Virtualization and vRAN is critical succes...
Mavenir 5G is a forcing factor for Virtualization and vRAN is critical succes...Mavenir
 
Mavenir: RCS Business Messaging:​ The Key to a Successful Deployment​
Mavenir: RCS Business Messaging:​ The Key to a Successful Deployment​Mavenir: RCS Business Messaging:​ The Key to a Successful Deployment​
Mavenir: RCS Business Messaging:​ The Key to a Successful Deployment​Mavenir
 
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...Bristol Is Open
 
5G Digital Transformation Strategy in Nokia Hellas
5G Digital Transformation Strategy in Nokia Hellas5G Digital Transformation Strategy in Nokia Hellas
5G Digital Transformation Strategy in Nokia HellasSpilios Georgakopoulos
 
5G Technology Strategy: Next-Generation Mobile Networking
5G Technology Strategy: Next-Generation Mobile Networking5G Technology Strategy: Next-Generation Mobile Networking
5G Technology Strategy: Next-Generation Mobile Networkingvenkada ramanujam
 
5 g enterprise market
5 g enterprise market5 g enterprise market
5 g enterprise marketarchanamohol
 
Mavenir: 5G: Time to Change Approach
Mavenir: 5G: Time to Change ApproachMavenir: 5G: Time to Change Approach
Mavenir: 5G: Time to Change ApproachMavenir
 
Security and Transport Performance in 5G
Security and Transport Performance in 5GSecurity and Transport Performance in 5G
Security and Transport Performance in 5GDirk Kutscher
 
Securing 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and VirtualizationSecuring 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and VirtualizationDr. Edwin Hernandez
 
Aviation 5G/5G in Aviation
Aviation 5G/5G in AviationAviation 5G/5G in Aviation
Aviation 5G/5G in AviationAssem mousa
 
The state of NB-IoT in Indonesia
The state of NB-IoT in IndonesiaThe state of NB-IoT in Indonesia
The state of NB-IoT in IndonesiaAndri Yadi
 
Vision only 5G AnyBee (Anycasting Beyond the Edge)
Vision only 5G AnyBee (Anycasting Beyond the Edge)Vision only 5G AnyBee (Anycasting Beyond the Edge)
Vision only 5G AnyBee (Anycasting Beyond the Edge)Thierry Lestable
 
Iot from telco perspective
Iot from telco perspectiveIot from telco perspective
Iot from telco perspectiveanandbajaj
 
Matt Hatton - 7 Numbers You Need to Know about IoT - Machina Research
Matt Hatton - 7 Numbers You Need to Know about IoT -  Machina ResearchMatt Hatton - 7 Numbers You Need to Know about IoT -  Machina Research
Matt Hatton - 7 Numbers You Need to Know about IoT - Machina ResearchBusiness of Software Conference
 
Mavenir: Rich Mobile Business Messaging
Mavenir: Rich Mobile Business MessagingMavenir: Rich Mobile Business Messaging
Mavenir: Rich Mobile Business MessagingMavenir
 

What's hot (20)

What is next for Telecom (Broadband and Cell) - September 2021
What is next for Telecom (Broadband and Cell) - September 2021What is next for Telecom (Broadband and Cell) - September 2021
What is next for Telecom (Broadband and Cell) - September 2021
 
From broadband to 5G
From broadband to 5GFrom broadband to 5G
From broadband to 5G
 
Private 5G Seminar Brochure
Private 5G Seminar BrochurePrivate 5G Seminar Brochure
Private 5G Seminar Brochure
 
Mavenir 5G is a forcing factor for Virtualization and vRAN is critical succes...
Mavenir 5G is a forcing factor for Virtualization and vRAN is critical succes...Mavenir 5G is a forcing factor for Virtualization and vRAN is critical succes...
Mavenir 5G is a forcing factor for Virtualization and vRAN is critical succes...
 
Mavenir: RCS Business Messaging:​ The Key to a Successful Deployment​
Mavenir: RCS Business Messaging:​ The Key to a Successful Deployment​Mavenir: RCS Business Messaging:​ The Key to a Successful Deployment​
Mavenir: RCS Business Messaging:​ The Key to a Successful Deployment​
 
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
 
5G Digital Transformation Strategy in Nokia Hellas
5G Digital Transformation Strategy in Nokia Hellas5G Digital Transformation Strategy in Nokia Hellas
5G Digital Transformation Strategy in Nokia Hellas
 
5G Technology Strategy: Next-Generation Mobile Networking
5G Technology Strategy: Next-Generation Mobile Networking5G Technology Strategy: Next-Generation Mobile Networking
5G Technology Strategy: Next-Generation Mobile Networking
 
5 g enterprise market
5 g enterprise market5 g enterprise market
5 g enterprise market
 
Mavenir: 5G: Time to Change Approach
Mavenir: 5G: Time to Change ApproachMavenir: 5G: Time to Change Approach
Mavenir: 5G: Time to Change Approach
 
NB-IoT and 5G
NB-IoT and 5GNB-IoT and 5G
NB-IoT and 5G
 
Security and Transport Performance in 5G
Security and Transport Performance in 5GSecurity and Transport Performance in 5G
Security and Transport Performance in 5G
 
Securing 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and VirtualizationSecuring 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and Virtualization
 
Aviation 5G/5G in Aviation
Aviation 5G/5G in AviationAviation 5G/5G in Aviation
Aviation 5G/5G in Aviation
 
The state of NB-IoT in Indonesia
The state of NB-IoT in IndonesiaThe state of NB-IoT in Indonesia
The state of NB-IoT in Indonesia
 
Deploying IoT: A Telco Perspective
Deploying IoT: A Telco PerspectiveDeploying IoT: A Telco Perspective
Deploying IoT: A Telco Perspective
 
Vision only 5G AnyBee (Anycasting Beyond the Edge)
Vision only 5G AnyBee (Anycasting Beyond the Edge)Vision only 5G AnyBee (Anycasting Beyond the Edge)
Vision only 5G AnyBee (Anycasting Beyond the Edge)
 
Iot from telco perspective
Iot from telco perspectiveIot from telco perspective
Iot from telco perspective
 
Matt Hatton - 7 Numbers You Need to Know about IoT - Machina Research
Matt Hatton - 7 Numbers You Need to Know about IoT -  Machina ResearchMatt Hatton - 7 Numbers You Need to Know about IoT -  Machina Research
Matt Hatton - 7 Numbers You Need to Know about IoT - Machina Research
 
Mavenir: Rich Mobile Business Messaging
Mavenir: Rich Mobile Business MessagingMavenir: Rich Mobile Business Messaging
Mavenir: Rich Mobile Business Messaging
 

Similar to Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Security and Anti-Fraud Into 5G and New Services

Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaAngeloluca Barba
 
5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problemPositiveTechnologies
 
Industry_Day-2019-0010-Enabling_the_IoT_domain.pptx
Industry_Day-2019-0010-Enabling_the_IoT_domain.pptxIndustry_Day-2019-0010-Enabling_the_IoT_domain.pptx
Industry_Day-2019-0010-Enabling_the_IoT_domain.pptxAnil Bhat
 
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...FaberLab
 
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptxTrends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptxMetaorange
 
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSiQHub
 
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSiQHub
 
Enhance network security with Multi-Factor Authentication for BYOD and guest ...
Enhance network security with Multi-Factor Authentication for BYOD and guest ...Enhance network security with Multi-Factor Authentication for BYOD and guest ...
Enhance network security with Multi-Factor Authentication for BYOD and guest ...Aruba, a Hewlett Packard Enterprise company
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicNetmagic Solutions Pvt. Ltd.
 
Smith EntNet2008 Slides.ppt
Smith EntNet2008 Slides.pptSmith EntNet2008 Slides.ppt
Smith EntNet2008 Slides.pptssusere2839b1
 
IBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver InnovationIBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver InnovationPaula Koziol
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XPrime Infoserv
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloudUlf Mattsson
 
Etisalat Digital Connect
Etisalat Digital ConnectEtisalat Digital Connect
Etisalat Digital ConnectGrafic.guru
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsNirmal Misra
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1pStéphane Roule
 

Similar to Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Security and Anti-Fraud Into 5G and New Services (20)

Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem
 
Industry_Day-2019-0010-Enabling_the_IoT_domain.pptx
Industry_Day-2019-0010-Enabling_the_IoT_domain.pptxIndustry_Day-2019-0010-Enabling_the_IoT_domain.pptx
Industry_Day-2019-0010-Enabling_the_IoT_domain.pptx
 
IAM for mobile and BYOD
IAM for mobile and BYODIAM for mobile and BYOD
IAM for mobile and BYOD
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...
 
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptxTrends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
 
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
 
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
 
Enhance network security with Multi-Factor Authentication for BYOD and guest ...
Enhance network security with Multi-Factor Authentication for BYOD and guest ...Enhance network security with Multi-Factor Authentication for BYOD and guest ...
Enhance network security with Multi-Factor Authentication for BYOD and guest ...
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – Netmagic
 
Smith EntNet2008 Slides.ppt
Smith EntNet2008 Slides.pptSmith EntNet2008 Slides.ppt
Smith EntNet2008 Slides.ppt
 
IBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver InnovationIBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver Innovation
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
 
Etisalat Digital Connect
Etisalat Digital ConnectEtisalat Digital Connect
Etisalat Digital Connect
 
An analysis of the security needs
An analysis of the security needsAn analysis of the security needs
An analysis of the security needs
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
 

More from Mavenir

Mavenir: OpenRAN – What It Is and What It Means for Rural Operators
Mavenir: OpenRAN – What It Is and What It Means for Rural OperatorsMavenir: OpenRAN – What It Is and What It Means for Rural Operators
Mavenir: OpenRAN – What It Is and What It Means for Rural OperatorsMavenir
 
Mavenir: Reducing the Friction Between the Aggregator and the Operator
Mavenir: Reducing the Friction Between the Aggregator and the OperatorMavenir: Reducing the Friction Between the Aggregator and the Operator
Mavenir: Reducing the Friction Between the Aggregator and the OperatorMavenir
 
Mavenir: OpenRAN and 5G Network Economics
Mavenir: OpenRAN and 5G Network EconomicsMavenir: OpenRAN and 5G Network Economics
Mavenir: OpenRAN and 5G Network EconomicsMavenir
 
Mavenir: RAN Evolution for 5G
Mavenir: RAN Evolution for 5GMavenir: RAN Evolution for 5G
Mavenir: RAN Evolution for 5GMavenir
 
Mavenir: Monetizing RCS through Innovation on Cloud Native Network​
Mavenir: Monetizing RCS through Innovation on Cloud Native Network​Mavenir: Monetizing RCS through Innovation on Cloud Native Network​
Mavenir: Monetizing RCS through Innovation on Cloud Native Network​Mavenir
 
Mavenir: Linking IoT, 5G, and Analytics in Smarter Enterprise
Mavenir: Linking IoT, 5G, and Analytics in Smarter EnterpriseMavenir: Linking IoT, 5G, and Analytics in Smarter Enterprise
Mavenir: Linking IoT, 5G, and Analytics in Smarter EnterpriseMavenir
 

More from Mavenir (6)

Mavenir: OpenRAN – What It Is and What It Means for Rural Operators
Mavenir: OpenRAN – What It Is and What It Means for Rural OperatorsMavenir: OpenRAN – What It Is and What It Means for Rural Operators
Mavenir: OpenRAN – What It Is and What It Means for Rural Operators
 
Mavenir: Reducing the Friction Between the Aggregator and the Operator
Mavenir: Reducing the Friction Between the Aggregator and the OperatorMavenir: Reducing the Friction Between the Aggregator and the Operator
Mavenir: Reducing the Friction Between the Aggregator and the Operator
 
Mavenir: OpenRAN and 5G Network Economics
Mavenir: OpenRAN and 5G Network EconomicsMavenir: OpenRAN and 5G Network Economics
Mavenir: OpenRAN and 5G Network Economics
 
Mavenir: RAN Evolution for 5G
Mavenir: RAN Evolution for 5GMavenir: RAN Evolution for 5G
Mavenir: RAN Evolution for 5G
 
Mavenir: Monetizing RCS through Innovation on Cloud Native Network​
Mavenir: Monetizing RCS through Innovation on Cloud Native Network​Mavenir: Monetizing RCS through Innovation on Cloud Native Network​
Mavenir: Monetizing RCS through Innovation on Cloud Native Network​
 
Mavenir: Linking IoT, 5G, and Analytics in Smarter Enterprise
Mavenir: Linking IoT, 5G, and Analytics in Smarter EnterpriseMavenir: Linking IoT, 5G, and Analytics in Smarter Enterprise
Mavenir: Linking IoT, 5G, and Analytics in Smarter Enterprise
 

Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Security and Anti-Fraud Into 5G and New Services

  • 1. Copyright Mavenir 2019. Proprietary and Confidential. mavenir.com Evolution of Real-Time Machine Learning (RRML) in Core Network Security and Anti-Fraud Into 5G and New Services
  • 2. Context Copyright Mavenir 2019. mavenir.com Supply Chain Privacy and Data protection Signaling Cloud Internet of Things Human Device Security Threat Landscape Global Fraud Survey Global loss – $29.2B Identity fraud PBX hacking IRSF By-pass Arbitrage Wholesale Challenge Expertise Technology (5G) Organization
  • 3. 5G PPP Security requirements Higher security and privacy level Security Automation Security Monitoring Security Management Liability schemes Slice isolation End to end encryption Regulation Copyright Mavenir 2019. 3 Any security trade- off would be misused by an attacker in form of Fraud or damage
  • 4. 5GC Business Channels and Workstreams • Asset Tracking • Security & GDPR • Robotics • Industrial Automation • AR/VR • High Density • High Demand • Elastic Scale • Healthcare Automation • Patient Record Mgt. • Security & HIPAA • Device Diagnostics • NLP & NLU • Industrial Automation • Process Optimization • Supply Chain • Security & Safety • Video Monitoring • AR/VR • Retail Promotion • Heat Map • Facial Recognition • Security & Safety • Asset Mgt. • Video Surveillance • Private LTE/5G • Security & GDPR Mall Industrial AutomationStadium Warehouse Hospital Office Park Remote Developer 4
  • 5. 5G security Architecture • 5G reference architecture offers comprehensive security but still could be exploited – Implementation trade-offs – Multi-vendor environments – IT technology • Typical Fraud scenarios are not (fully) covered Copyright Mavenir 2019. 5 User Application Provider Application SN HE 3GPP AN Non-3GPP AN (I) (I) (I) (II) (IV) (V) Application Stratum Home Stratum/ Serving Stratum Transport Stratum (II) (I) (III) (I) ME USIM (I) SEPP AUSF ARPF SEAF
  • 6. Why Telco needs help ? MNO • Security is a cost factor contradicting OPEX KPI • Fraud team is often detached from the network • Regulation • Marketing • International risks/supply chain Copyright Mavenir 2019. 6 Banking • Security = Anti-Fraud • Security = Main business • Security is embedded into technology • Direct law enforcement VS
  • 7. Mavenir approach Copyright Mavenir 2019. 7 Expertise • Hands-on understanding of vulnerabilities • Business drivers • Creativity Technology • Machine Learning and AI • Deep understanding of protocols Service • Knowledge • Protection • Security as a Service
  • 8. Machine Learning for Security solutions Copyright Mavenir 2019. 8 Business and Technical data Technology Proficiency Controlled AI Enable and Support the Telco Transformation
  • 9. Key technical principles for Machine Learning in Telco Copyright Mavenir 2018. 9 Specialized/tailored algorithms Real-Time factor (response time in under 10ms) Subject area focus rather then generic data focus Seamless integration of Machine Learning and rule engine 5G and Service Mesh architecture readiness Horizontal approach (focus beyond fraud and security)
  • 10. Extending the role of NWDAF into security and Anti-Fraud SMSF NWDAF Constant insight Real-time ML Reaction to anomalies Fraud prevention Attack detection Security assurance Copyright Mavenir 2019.
  • 11. Copyright Mavenir 2019. 11 Mavenir Security Suite Network/Voice Module Subscription Fraud Messaging Fraud/ SpamShield Wholesale Fraud IoT Security Credit Scoring Firewall layer: SS7, ISUP, Diameter, SIP, GTP, HTTP/2 Robocall control AI and Machine Learning engines • Single Platform, Single architecture, multiple modules • Leveraging NWDAF architecture • Natively developed with Real-time Machine Learning • Fraud prediction based on ML • Rule-based configuration integrated with ML • Dedicated algorithms for major use-cases • Flexible reporting and real-time dashboards • Multiple integration options • NFV & Microservices architecture Real-time Fraud prevention and detection Optimal OPEX for mobile operators Revenue savings proven in the market Regulator compliancy Efficient subscriber protection Future proof Data Anti-Fraud
  • 12. Copyright Mavenir 2019. Machine Learning / AI for Automation and Insights Insight IoT Profile 1 IoT Profile 2 IoT Profile 3 Profile Change Pattern Network Function RuleEngine Mediation Featurization Machine Learning Learning Module Reporting & Investigation Alert Management FMS Analytics Additional Data Feeds Standard market deployed architecture addressing: DDoS detection and IoT service anomaly detection, Voice & Messaging Fraud, Signaling and Service protection 12
  • 13. Copyright Mavenir 2019. 13 Thank you