Towards a Security Reference Architecture for NFV

被引:6
|
作者
Alnaim, Abdulrahman Khalid [1 ]
Alwakeel, Ahmed Mahmoud [2 ,3 ]
Fernandez, Eduardo B. [4 ]
机构
[1] King Faisal Univ, Dept Management Informat Syst, Al Hufuf 31982, Saudi Arabia
[2] Univ Tabuk, Sensor Network & Cellular Syst Res Ctr, Tabuk 71491, Saudi Arabia
[3] Univ Tabuk, Dept Informat Technol, Tabuk 71491, Saudi Arabia
[4] Florida Atlantic Univ, Dept Elect Engn & Comp Sci, Boca Raton, FL 33431 USA
关键词
network function virtualization; virtual network function; cloud computing; reference architecture; security reference architecture; patterns; virtual machine environment; ETSI; OF-THE-ART;
D O I
10.3390/s22103750
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Network function virtualization (NFV) is an emerging technology that is becoming increasingly important due to its many advantages. NFV transforms legacy hardware-based network infrastructure into software-based virtualized networks. This transformation increases the flexibility and scalability of networks, at the same time reducing the time for the creation of new networks. However, the attack surface of the network increases, which requires the definition of a clear map of where attacks may happen. ETSI standards precisely define many security aspects of this architecture, but these publications are very long and provide many details which are not of interest to software architects. We start by conducting threat analysis of some of the NFV use cases. The use cases serve as scenarios where the threats to the architecture can be enumerated. Representing threats as misuse cases that describe the modus operandi of attackers, we can find countermeasures to them in the form of security patterns, and we can build a security reference architecture (SRA). Until now, only imprecise models of NFV architectures existed; by making them more detailed and precise it is possible to handle not only security but also safety and reliability, although we do not explore those aspects. Because security is a global property that requires a holistic approach, we strongly believe that architectural models are fundamental to produce secure networks and allow us to build networks which are secure by design. The resulting SRA defines a roadmap to implement secure concrete architectures.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] Security Orchestrator Introducing a Security Orchestrator in the context of the ETSI NFV Reference Architecture
    Jaeger, Bernd
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1255 - 1260
  • [2] Toward a Reference Architecture for NFV
    Alwakeel, Ahmed M.
    Alnaim, Abdulrahman K.
    Fernandez, Eduardo B.
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [3] Towards Automated Security Evaluation within the Industrial Reference Architecture
    Ehrlich, Marco
    Gergeleit, Martin
    Trsek, Henning
    Lukas, Georg
    [J]. 2020 25TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2020, : 1640 - 1647
  • [4] A First Step Towards Security Extension for NFV Orchestrator
    Pattaranantakul, Montida
    Tseng, Yuchia
    He, Ruan
    Zhang, Zonghua
    Meddahi, Ahmed
    [J]. SDN-NFVSEC'17: PROCEEDINGS OF THE ACM INTERNATIONAL WORKSHOP ON SECURITY IN SOFTWARE DEFINED NETWORKS & NETWORK FUNCTION VIRTUALIZATION, 2017, : 25 - 30
  • [5] A Security Reference Architecture for Blockchains
    Homoliak, Ivan
    Venugopalan, Sarad
    Hum, Qingze
    Szalachowski, Pawel
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2019), 2019, : 390 - 397
  • [6] Security as a Service - A Reference Architecture for SOA Security
    Memon, Mukhtiar
    Hafner, Michael
    Breu, Ruth
    [J]. SECURITY IN INFORMATION SYSTEMS, PROCEEDINGS, 2009, : 79 - 89
  • [7] Towards an Integrated SDN-NFV Architecture for EPON Networks
    Khalili, Hamzeh
    Rincon, David
    Sallent, Sebastia
    [J]. ADVANCES IN COMMUNICATION NETWORKING, 2014, 8846 : 74 - 84
  • [8] Towards a security architecture for substations
    Fuloria, Shailendra
    Anderson, Ross
    [J]. 2011 2ND IEEE PES INTERNATIONAL CONFERENCE AND EXHIBITION ON INNOVATIVE SMART GRID TECHNOLOGIES (ISGT EUROPE), 2011,
  • [9] Introduction and Analysis of SDN and NFV Security Architecture (SN-SECA)
    Bernardo, Danilo V.
    Chua, Bee Bee
    [J]. 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, : 796 - 801
  • [10] Towards a configurable security architecture
    Olivier, MS
    [J]. DATA & KNOWLEDGE ENGINEERING, 2001, 38 (02) : 121 - 145