NFV: Security Threats and Best Practices

被引:109
|
作者
Lal, Shankar [1 ,2 ]
Taleb, Tarik [3 ,4 ]
Dutta, Ashutosh [5 ]
机构
[1] Nokia Bell Labs, Espoo, Finland
[2] Aalto Univ, Espoo, Finland
[3] Sejong Univ, Seoul, South Korea
[4] Aalto Univ, Sch Elect Engn, Espoo, Finland
[5] AT&T, Member Tech Staff, Middletown, NJ USA
关键词
CHALLENGES; SERVICE;
D O I
10.1109/MCOM.2017.1600899
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Network function virtualization (NFV) yields numerous benefits, particularly the possibility of a cost-efficient transition of telco hardware functionalities on the software platform to break the vendor lock-in problem. These benefits come at the price of some security flaws. Indeed, with NFV, virtual mobile networks become vulnerable to a number of security threats. These threats can be leveraged using some available mitigation techniques and also through other emerging solutions. This article presents critical security threats that exist in the NFV infrastructure, proposes best security practices to protect against them.
引用
收藏
页码:211 / 217
页数:7
相关论文
共 50 条
  • [1] Mobile Security: Threats and Best Practices
    Weichbroth, Pawel
    Lysik, Lukasz
    [J]. MOBILE INFORMATION SYSTEMS, 2020, 2020
  • [2] Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats
    Puetz, Philipp
    Mitev, Richard
    Miettinen, Markus
    Sadeghi, Ahmad-Reza
    [J]. 39TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2023, 2023, : 190 - 204
  • [3] Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV)
    Alhebaishi, Nawaf
    Wang, Lingyu
    Jajodia, Sushil
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXXIV, DBSEC 2020, 2020, 12122 : 3 - 23
  • [4] Medical Physicist's Role in Digital Information Security: Threats, Vulnerabilities and Best Practices
    McDonald, K.
    Curran, B.
    [J]. MEDICAL PHYSICS, 2014, 41 (06) : 545 - 546
  • [5] Best practices cyber security
    Scherer, Rob
    [J]. ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2019, 257
  • [6] BEST PRACTICES IN AUTOMATION SECURITY
    McKay, Murray
    [J]. 2012 IEEE-IAS/PCA 54TH CEMENT INDUSTRY TECHNICAL CONFERENCE, 2012,
  • [7] Best practices for VoIP security
    VanWart, Scott
    [J]. COMMUNICATIONS NEWS, 2007, 44 (08): : 28 - 29
  • [8] Privacy and Security: Best Practices for Global Security
    Millar, Sheila A.
    [J]. JOURNAL OF INTERNATIONAL TRADE LAW AND POLICY, 2006, 5 (01) : 36 - +
  • [9] Information security threats and practices in small businesses
    Keller, S
    Powell, A
    Horstmann, B
    Predmore, C
    Crawford, M
    [J]. INFORMATION SYSTEMS MANAGEMENT, 2005, 22 (02) : 7 - 19
  • [10] Using Nature to best Clarify Computer Security and Threats
    Oreku, George S.
    Mtenzi, Fredrick J.
    [J]. EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 702 - 707