From the course: AI for Telecom: Network Optimization and Security in 5G/Edge Systems
Unlock this course with a free trial
Join today to access over 24,600 courses taught by industry experts.
Challenge: Flow-based anomaly detection
From the course: AI for Telecom: Network Optimization and Security in 5G/Edge Systems
Challenge: Flow-based anomaly detection
“
(upbeat music) - [Instructor] Let's get to the challenge now. As we know, telecom operators adopt encryption protocols like TLS across the 5G architecture. So in a way, operators are blind for malicious or abnormal behaviors traversing their networks. In other words, how can telecom detect abnormal traffic patterns or potential threat in an encrypted network? I'll come to the solution in the next video.