abstract grey and white shaped background

Arbor Sightline Mobile

Visibility for Threat Detection in 4G and 5G Networks

arbor-sightline-mobilestream-header-image-1600x900.jpg
Overview

Identify security threats and traffic anomalies in 4G and 5G networks with Arbor Sightline Mobile

Mobile consumer broadband traffic levels have escalated to levels previously associated with fixed line networks and will accelerate as new spectrum and 5G networks continue to roll out.

Unfortunately, threat activity on the mobile networks has matched the rapid growth in mobile connected users and mobile traffic due to a combination of Fixed Wireless Access CPE, vulnerable consumer IoT devices and increased gaming activity.  Consumer and SOHO infrastructure is a primary target for attack and enlistment into botnets just as in wireline deployments, and this has become an increasing problem for MNOs. To fully understand what is happening, and to mitigate any threat, whether east-west or north-south, User Plane and Control Plane traffic must be correlated to establish the identity of the devices involved in suspicious activities.  

NETSCOUT’s Arbor Sightline Mobile combines scalable threat detection with MobileStream for scalable user-plane and control plane monitoring in 4G, 5G NSA and 5G SA networks.

CS-00363-EN-2301-WEB-0412.jpg
Benefits

Stop Threats with Smarter Intelligence

Detect

Detect threats and DDoS attacks within the 4G/5G network.

Identify

Quickly identify impacted subscribers and devices for rapid isolation.

Protect

Correlate identity and user-plane traffic with underlying mobile core infrastructure for surgical mitigation.

Features

Discover Traffic Anomalies To or From Subscribers

Detect potentially service-impacting traffic anomalies such as DDoS attacks generated by or destined for mobile devices. Instantly visualize detailed information on the nature of any anomaly and understand the impact the traffic has on the network and services, as well as the identity of the mobile devices involved.

Discover_Anomalies_To_And_From_Subscribers-wlf.png

Identify Compromised Subscribers

Quickly identify compromised mobile devices by correlating traffic information with Indicators of Compromise (IoCs) at scale. Understand botnet populations within the network, and the risk they pose.

Identify_Compromised_Subscribers-wfl.png

Identify Infrastructure Congestion and Perform Top Talker Analysis

Easily identify top sources of traffic within the endpoint population. Identify top protocols and services and usage outliers to help tailor service offerings and identify Acceptable Use Policy violations.

 Threat-Detection-wlf.png

Extend User-Plane Traffic Visibility

Develop detailed views into real-time and historical user- plane traffic. Identify traffic mapping to the underlying routing topologies (with BGP) for traffic engineering, and capacity planning use cases.

Control-Plane-Visibility-wlf.png

Related Pages

MobileStream

MobileStream utilizes Smart Data technology from NETSCOUT’s market leading mobile service assurance solutions to monitor both user and control plane traffic within 4G and 5G mobile networks.

Arbor Sightline DDoS Attack Detection Solution

Whether you are a service provider or have a complex enterprise network, Arbor Sightline helps monitor and identify networking and security issues at any network scale with AI and ML-powered insights.

NETSCOUT Real-Time Advanced Threat Intelligence

Helping customers combat the ever-increasing frequency and complexity of DDoS attacks requires worldwide visibility, advanced threat analytics, continuous real-time cyber threat intelligence research, and recommended best practices for mitigation from industry experts.

Indigo to jade abstract background
Contact Us

Contact NETSCOUT Today

To learn more about how NETSCOUT can help your company, speak to one of our highly experienced subject matter experts.