2021
DOI: 10.1016/j.comnet.2021.108288
|View full text |Cite
|
Sign up to set email alerts
|

NFV security survey in 5G networks: A three-dimensional threat taxonomy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 42 publications
(15 citation statements)
references
References 51 publications
0
15
0
Order By: Relevance
“…The most recent survey considers NFV use in 5G [ 7 , 49 ]; it explores the complexity of the 5G ecosystem for which it derives a 5G telecommunication business model, which is used to identify new aspects of its attack surface and enumerates security threats introduced by the multiple business collaborations supported by NFV. That paper proposes a three-dimensional threat taxonomy for NFV-based 5G networks relating NFV architecture to deployment use cases for different 5G business collaboration scenarios.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…The most recent survey considers NFV use in 5G [ 7 , 49 ]; it explores the complexity of the 5G ecosystem for which it derives a 5G telecommunication business model, which is used to identify new aspects of its attack surface and enumerates security threats introduced by the multiple business collaborations supported by NFV. That paper proposes a three-dimensional threat taxonomy for NFV-based 5G networks relating NFV architecture to deployment use cases for different 5G business collaboration scenarios.…”
Section: Related Workmentioning
confidence: 99%
“…The surveys in [ 7 , 46 , 47 , 48 ] are very recent (2018–2021) and very comprehensive; they can be used to put our work in perspective. [ 7 ] mentions some of our work and indicates that our misuse patterns are the first ones for NFV.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Novel software-originated vulnerabilities can be specific to hypervisor, VNF application, SDN controller and SDN south-bound and northbound protocol subsystems. For example authors in [13] produce a taxonomy of the possible security threats and attacks that can affect an NFV system. Similarly, in [14] authors propose another layer-specific threat taxonomy from which they build a set of recommendations on securing NFV based services.…”
Section: Background and Related Workmentioning
confidence: 99%