Research on Monitoring Technology of 5G MEC Virtualization Environment

Xiangqun Wang,Jiaxuan Fei,Wei Huang,Wei Liu
DOI: https://doi.org/10.1109/ispec53008.2021.9735904
2021-01-01
Abstract:In view of the security risks in 5G network virtualization environment, this paper describes the security monitoring components of 5G MEC network virtual machine and container environment. By monitoring the host machine, Docker, container, KVM and other environments, the security status of operation permissions, network communication, file system, resource limitation, run operation, process operation and so on can be collected. The design scheme of the monitoring module and the realization method of the key function modules are introduced in detail, and the function verification is carried out.By monitoring the virtualized environment, the security protection of MEC and other nodes can be effectively realized, the overall defense capability of 5G network in power system can be improved, and the existence of 5G network carrying power business can be seen, managed and controllable.
What problem does this paper attempt to address?