2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) 2019
DOI: 10.1109/cloudcom.2019.00034
|View full text |Cite
|
Sign up to set email alerts
|

Modeling NFV Deployment to Identify the Cross-Level Inconsistency Vulnerabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…These properties simplify the management of network services and allow the automation of their life cycle. However, as some earlier studies [98], [117], [118] have shown, the multi-layer nature of NFV introduces inconsistencies issues between layers. For instance, consider a scenario where NFV Orchestrator sends configuration commands to other NFV components to deploy a network service.…”
Section: Gap Analysis and Future Research Directionsmentioning
confidence: 95%
See 1 more Smart Citation
“…These properties simplify the management of network services and allow the automation of their life cycle. However, as some earlier studies [98], [117], [118] have shown, the multi-layer nature of NFV introduces inconsistencies issues between layers. For instance, consider a scenario where NFV Orchestrator sends configuration commands to other NFV components to deploy a network service.…”
Section: Gap Analysis and Future Research Directionsmentioning
confidence: 95%
“…Cross-layer verification is therefore crucial to operate network services in NFV environments. Such a verification approach may require details for mapping network services' states across the layers [98]. However, this mapping conflicts with the NFV philosophy that rests on the decoupling and independence of layers.…”
Section: Gap Analysis and Future Research Directionsmentioning
confidence: 99%