{"id":43818,"date":"2021-11-10T09:55:00","date_gmt":"2021-11-10T09:55:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\/"},"modified":"2021-11-10T09:55:00","modified_gmt":"2021-11-10T09:55:00","slug":"drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\/","title":{"rendered":"Drone demo shows it\u2019s possible to protect 5G-managed devices from DDoS, exfiltration attacks"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/07\/drone_hovers_over_mountains_by_jason_blackeye_cc0_via_unsplash_1200x800-100763759-large.jpg?auto=webp&amp;quality=85,70\" class=\"ff-og-image-inserted\"><\/div>\n<p>A demonstration earlier this year at Stanford School of Engineering proved that a small fleet of computer-controlled drones can maintain their flight integrity in the face of continual cyberattacks on the 5G network used to manage the devices through the deployment of <a href=\"https:\/\/www.networkworld.com\/article\/3209131\/what-sdn-is-and-where-its-going.html\">software-defined networking (SDN)<\/a>.<\/p>\n<p>For enterprise IT pros charged with securing devices wirelessly across a <a href=\"https:\/\/www.networkworld.com\/article\/3203489\/what-is-5g-fast-wireless-technology-for-enterprises-and-phones.html\">5G <\/a>network, the drone test results are promising evidence that SDN can help networks under cyberattack to recover almost instantaneously.<\/p>\n<p>Dubbed Project Pronto, the ongoing research is designed to show how devices such as autonomous motor vehicles, planes and trains can be operated securely and reliably across wireless 5G networks. Given the potentially disastrous consequences of large wireless devices being hacked while traveling at high speeds or elevations, vulnerabilities that could endanger lives must be addressed before such devices are widely deployed.<\/p>\n<aside class=\"fakesidebar\"><a href=\"https:\/\/www.networkworld.com\/newsletters\/signup.html\">[Get regularly scheduled insights by signing up for Network World newsletters.]<\/a><\/aside>\n<p>The larger goal of Project Pronto is to leverage 5G as a distributed edge computing cloud-based platform that facilitate innovation and competitive advantage through deep and wide network visibility, verification and closed-loop control. Nick McKeown, a professor of electrical engineering and computer science at Stanford, heads the project.<\/p>\n<p>SDN was developed in 2008 as a result of a collaboration between McKeown\u2019s Stanford research team and a team for the University of California at Berkeley. As the Stanford engineering department\u2019s magazine <a href=\"https:\/\/engineering.stanford.edu\/magazine\/article\/new-initiative-aims-ensure-5g-networks-are-reliable-and-secure\" rel=\"nofollow\">explains<\/a>, \u201cSDN is a simplified approach to traditional \u2018black box\u2019 proprietary networking that decouples a network\u2019s data and routing functions for faster, easier reconfiguration on the fly.\u201d<\/p>\n<p>As the drone demonstration showed, applying advanced SDN techniques enables networks running on 5G to recover from a cyberattack in less than one second, preventing disruptions in operations and failure, by protecting wireless devices with a \u201cshield\u201d that deploys almost instantaneously.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id> <\/aside>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=lLhffmr4YbY\" rel=\"nofollow\">This video<\/a> of the drone demonstration by the&nbsp;the Open Networking Foundation\u2019s (ONF) Oguz Sunay, shows two different types of attacks on five drones flying in formation. A Denial of Service (DoS) attack was able to cause the drones to act erratically and fly out of formation. But when the researchers activated path verification, the attacker\u2019s disruptive packets were blocked, allowing the drones to continue flying in coordination and without disruption. In a test against exfiltration attacks that enable attackers to precisely monitor drone locations, researchers proved that turning on path verification prevents packets that reveal the location of drones from reaching the attacker.<\/p>\n<p>Beyond protecting drones in lab experiments, one of Pronto\u2019s underpinnings has been adopted by <a href=\"https:\/\/www.networkworld.com\/article\/3635056\/ananki-sstartup-tries-to-simplify-private-5g.html\">a startup called Ananki<\/a> that\u2019s using it to offer private 5G cellular as a service. That technology, called Aether by the ONF that developed it and Pronto, is an open-source private 4G\/5G-connected-edge cloud-as-a-service platform. The ONF\u2019s executive director, Guru Parulkar, is the company\u2019s CEO.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id> <\/aside>\n<p>Stanford, Cornell University, Princeton University and the ONF are collaborating on Pronto, which is funded in part by a $30 million grant from the Defense Advanced Research Projects Agency (DARPA).<\/p>\n<p>Here\u2019s <a href=\"https:\/\/www.youtube.com\/watch?v=GKBnopvCKUw\" rel=\"nofollow\">a good presentatio by McKeown <\/a>delving into detail about Project Pronto.<\/p>\n<div class=\"end-note\"> <!-- blx4 #2005 blox4.html --> <\/p>\n<div id class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">Join the Network World communities on <a href=\"https:\/\/www.facebook.com\/NetworkWorld\/\" target=\"_blank\" rel=\"noopener\">Facebook<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/network-world\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a> to comment on topics that are top of mind. <\/div>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3640069\/drone-demo-shows-it-s-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nA demonstration earlier this year at Stanford School of Engineering proved that a small fleet of computer-controlled drones can maintain their flight integrity in the face of continual cyberattacks on the 5G network used to manage the devices through the deployment of software-defined networking (SDN).For enterprise IT pros charged with securing devices wirelessly across a 5G network, the drone test results are promising evidence that SDN can help networks under cyberattack to recover almost instantaneously.To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":43819,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[2720,1109,307],"class_list":["post-43818","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-5g","tag-sdn","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Drone demo shows it\u2019s possible to protect 5G-managed devices from DDoS, exfiltration attacks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Drone demo shows it\u2019s possible to protect 5G-managed devices from DDoS, exfiltration attacks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-10T09:55:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Drone demo shows it\u2019s possible to protect 5G-managed devices from DDoS, exfiltration attacks\",\"datePublished\":\"2021-11-10T09:55:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\\\/\"},\"wordCount\":546,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks.jpg\",\"keywords\":[\"5G\",\"SDN\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\\\/\",\"name\":\"Drone demo shows it\u2019s possible to protect 5G-managed devices from DDoS, exfiltration attacks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks.jpg\",\"datePublished\":\"2021-11-10T09:55:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5G\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/5g\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Drone demo shows it\u2019s possible to protect 5G-managed devices from DDoS, exfiltration attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Drone demo shows it\u2019s possible to protect 5G-managed devices from DDoS, exfiltration attacks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Drone demo shows it\u2019s possible to protect 5G-managed devices from DDoS, exfiltration attacks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-11-10T09:55:00+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Drone demo shows it\u2019s possible to protect 5G-managed devices from DDoS, exfiltration attacks","datePublished":"2021-11-10T09:55:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\/"},"wordCount":546,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks.jpg","keywords":["5G","SDN","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\/","url":"https:\/\/www.threatshub.org\/blog\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\/","name":"Drone demo shows it\u2019s possible to protect 5G-managed devices from DDoS, exfiltration attacks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks.jpg","datePublished":"2021-11-10T09:55:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/drone-demo-shows-its-possible-to-protect-5g-managed-devices-from-ddos-exfiltration-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"5G","item":"https:\/\/www.threatshub.org\/blog\/tag\/5g\/"},{"@type":"ListItem","position":3,"name":"Drone demo shows it\u2019s possible to protect 5G-managed devices from DDoS, exfiltration attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43818","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43818"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43818\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/43819"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43818"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43818"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}