From the course: AI for Telecom: Network Optimization and Security in 5G/Edge Systems

Unlock this course with a free trial

Join today to access over 24,600 courses taught by industry experts.

Challenge: Flow-based anomaly detection

Challenge: Flow-based anomaly detection

(upbeat music) - [Instructor] Let's get to the challenge now. As we know, telecom operators adopt encryption protocols like TLS across the 5G architecture. So in a way, operators are blind for malicious or abnormal behaviors traversing their networks. In other words, how can telecom detect abnormal traffic patterns or potential threat in an encrypted network? I'll come to the solution in the next video.

Contents