2016 24th International Conference on Software, Telecommunications and Computer Networks (SoftCOM) 2016
DOI: 10.1109/softcom.2016.7772161
|View full text |Cite
|
Sign up to set email alerts
|

NFV security considerations for cloud-based mobile virtual network operators

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 10 publications
0
9
0
Order By: Relevance
“…These APIs are potential sources of security threats [20]. In a cloud environment, Virtual Network Functions (VNFs) may lead to security threats like confidential data leakage, malicious loops, network failures, and abuse of hypervisor, one of the architectural components of NFV [21]. Hypervisor domain can face unauthorized access and data leakage [22].…”
Section: Security Challenges Of Nfvmentioning
confidence: 99%
“…These APIs are potential sources of security threats [20]. In a cloud environment, Virtual Network Functions (VNFs) may lead to security threats like confidential data leakage, malicious loops, network failures, and abuse of hypervisor, one of the architectural components of NFV [21]. Hypervisor domain can face unauthorized access and data leakage [22].…”
Section: Security Challenges Of Nfvmentioning
confidence: 99%
“…③ Web Security Protection (Virtual WAF) Deploying the web application firewall NFV component to provide each user with independent web protection capabilities [1], [3]. At the same time, use the User's Security Service Order System to carry out the user's independent configuration of WAF policies and selection of web protection levels, so as to provide each user with web application security protection ability to prevent web service attacks [23].…”
Section: B Security Protection Resource Pool 1) Protection Flow Modelmentioning
confidence: 99%
“…Their location often depends on the requirements of latency or bandwidth limits, so they are hosted where necessary (see [136]) or for economic purposes where the resources are available. What is essential, such relocation is not indifferent to security level because it indicates new threats [137] to VNFs which were usually not present in the legacy architecture and had additional perimeter protection.…”
Section: ) Threats and Vulnerabilitiesmentioning
confidence: 99%