电信科学 ›› 2022, Vol. 38 ›› Issue (10): 173-179.doi: 10.11959/j.issn.1000-0801.2022276

• 工程与应用 • 上一篇    下一篇

5G“云网边端”一体化纵深安全防护体系研究及应用

张国新   

  1. 中国电信股份有限公司广东分公司,广东 广州 510081
  • 修回日期:2022-10-14 出版日期:2022-10-20 发布日期:2022-10-01
  • 作者简介:张国新(1968- ),男,博士,中国电信股份有限公司广东分公司副总经理,中国电信集团有限公司科学技术委员会委员,长期从事通信网络、云计算、大数据、网络安全、企业数字化等专业规划建设及运营工作

Research and application of 5G cloud-network-edge-end integrated in-depth security protection system

Guoxin ZHANG   

  1. Guangdong Branch of China Telecommunications Co., Ltd., Guangzhou 510081, China
  • Revised:2022-10-14 Online:2022-10-20 Published:2022-10-01

摘要:

创新地提出了一种5G“云网边端”一体化纵深安全防护实现方案,探索了5G定制网的网络安全防护体系,介绍了体系的基本架构、特性、实现方案和应用效果。在实现方案中重点介绍了两个要点:通过部署5G“云网边端”4个方面的安全系统,形成多层次、多维度的安全防护能力;建立适配体系的运营流程,包含一键加固、安全防御、态势感知和一键应急4个部分。最后给出了5G“云网边端”一体化纵深安全防护体系的实际应用效果。

关键词: 5G, 云网边端, 一体化, 可信终端, 端到端

Abstract:

A 5G cloud-network-edge-end integrated in-depth security protection implementation scheme was innovatively proposed, the network security protection system of 5G customized network was explored, and the basic architecture, characteristics, implementation scheme and application effect of the system were introduced.In the implementation plan, two key points were emphasized.Firstly, by deploying the security system of the four aspects of the 5G cloud network, the edge and the end, the multi-level and multi-dimensional security protection capability was formed.Secondly, the operation process of the adaptation system, including one-key reinforcement, security defense, situational awareness and one-key emergency response was established.Finally, the practical application effect of the 5G cloud-network-edge-end integrated in-depth security protection system was given.

Key words: 5G, cloud-network-edge-end, integration, trusted terminal, end-to-end

中图分类号: 

No Suggested Reading articles found!