2020
DOI: 10.1007/978-3-030-49669-2_1
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…Proposed mitigation strategies to compact zero-day attacks in the network interface layer of the TCP/IP: Separation of networking resources; subnetting and monitoring/restrict traffic flow in the subnets, this will help to limit the impact of the zero-day attack, which might have spread to the whole network if not segmented [140]- [142]. Implementation of quick and active patch management framework to patch network architecture flaws before they are exploited.…”
Section: Figure 8 Zero Day Attackmentioning
confidence: 99%
“…Proposed mitigation strategies to compact zero-day attacks in the network interface layer of the TCP/IP: Separation of networking resources; subnetting and monitoring/restrict traffic flow in the subnets, this will help to limit the impact of the zero-day attack, which might have spread to the whole network if not segmented [140]- [142]. Implementation of quick and active patch management framework to patch network architecture flaws before they are exploited.…”
Section: Figure 8 Zero Day Attackmentioning
confidence: 99%
“…Alhebaishi et al [ 50 ] use a deployment model to track vulnerabilities across levels; however, they do not consider details of those levels. The authors in Shameli-Sendi [ 51 ] consider the efficient configuration of service function chaining to build secure customer networks using network security patterns.…”
Section: Related Workmentioning
confidence: 99%
“…Two kinds of VNF models, virtual firewall and virtual router are trained utilizing real network traffics in the valuation process. Uxia Cheng et al [20], modeled co-residency and cross-level attacks in the stack of NFV and formulated the optimal placement issue of VNF/VM for mitigating the security threats via a standard algorithm of optimization. The obtained simulation results illustrate that the solutions could decrease the security threat level in NFV.…”
Section: The Presented Efforts For Finding Security Solutionsmentioning
confidence: 99%