The Security Threats and Solutions of Network Functions Virtualization: A Review

Authors

  • Alaa Noori Mazher Department of Computer Science, University of Technology, Baghdad-Iraq
  • Jumana Waleed Department of Computer Science, College of Science, University of Diyala, Diyala -Iraq
  • Abeer Tariq MaoLood Department of Computer Science, University of Technology, Baghdad-Iraq

DOI:

https://doi.org/10.29304/jqcm.2020.12.4.720

Keywords:

Network Functions Virtualization (NFV), security threats, virtual machines (VMs)

Abstract

The appearance of Network Functions Virtualization (NFV) has provided a revolution in various network-based applications owing to its different advantages like manageability, flexibility, security, and scalability. The users of NFV are provided with a framework that supplies different flexible network services in a dynamic way via the software-based virtualization of network functions in a single infrastructure. Nevertheless, NFV confront various challenges of security which make it vulnerable to several cybersecurity threats. In this paper, a review of NFV has been provided by introducing many related works, discussing serious and potential security attacks on the NFV, and presenting the efficient countermeasures for mitigating these attacks. Finally, several practical solutions are suggested for providing a reliable platform for NFV

Downloads

Download data is not yet available.

References

[1] ETSI. Network Functions Virtualisation (NFV); NFV Security; Security and Trust Guidance. Technical report, ETSI GS NFV-SEC 003 V1.1.1, (2014).
[2] A. Aljuhani and T. Alharbi, "Virtualized Network Functions security attacks and vulnerabilities," 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, (2017), 1-4.
[3] X. Wu et al., "State of the Art and Research Challenges in the Security Technologies of Network Function Virtualization," in IEEE Internet Computing, vol. 24, no. 1, (2020), 25-35.
[4] Zonghua Zhang, Ahmed Meddahi, Chapter1 - NFV Management and Orchestration, Security in Network Functions Virtualization, Elsevier, (2017), 1-43.
[5] M. De Benedictis and A. Lioy, "A proposal for trust monitoring in a Network Functions Virtualisation Infrastructure," 2019 IEEE Conference on Network Softwarization (NetSoft), Paris, France, (2019), 1-9.
[6] H. Jeon and B. Lee, "Network service chaining challenges for VNF outsourcing in network function virtualization," 2015 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, (2015), 819-821.
[7] Yan Luo, Eric Murray Timothy, L. Ficarra, "Accelerated Virtual Switching with Programmable NICs for Scalable Data Center Networking". The Second ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures, (2010), 65-72.
[8] Saeed Shafieian, Mohammad Zulkernine, Anwar Haque, "Attacks in Public Clouds: Can They Hinder the Rise of the Cloud", Cloud Computing: Challenges, Limitations and R & D Solutions, Springer, (2014), 3–22.
[9] H. Jang, J. Jeong, H. Kim and J. Park, "A Survey on Interfaces to Network Security Functions in Network Virtualization," 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, Gwangiu, (2015), 160-163.
[10] P. Patel, V. Tiwari and M. K. Abhishek, "SDN and NFV integration in openstack cloud to improve network services and security," 2016 International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), Ramanathapuram, (2016), 655-660.
[11] Y. Liu, Z. Guo, G. Shou and Y. Hu, "To Achieve a Security Service Chain by Integration of NFV and SDN," 2016 Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC), Harbin, (2016), 974-977.
[12] M. Pattaranantakul, R. He, A. Meddahi and Z. Zhang, "SecMANO: Towards Network Functions Virtualization (NFV) Based Security MANagement and Orchestration," 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, (2016), 598-605.
[13] W. Yang and C. Fung, "A survey on security in network functions virtualization," 2016 IEEE NetSoft Conference and Workshops (NetSoft), Seoul, (2016), 15-19.
[14] A. Kalliola, S. Lal, K. Ahola, I. Oliver, Y. Miche and S. Holtmanns, "Testbed for security orchestration in a network function virtualization environment," 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Berlin, (2017), 1-4.
[15] L. Zhou and H. Guo, "Applying NFV/SDN in mitigating DDoS attacks," TENCON 2017 - 2017 IEEE Region 10 Conference, Penang, (2017), 2061-2066.
[16] I. P. Bolodurina, D. I. Parfenov, V. A. Torchin, L. V. Legashev and V. M. Shardakov, "Development of Prototype of Autonomous Self-organizing System for Ensuring Network Security in Enterprise based on Technology of Virtualization Network Functions," 2018 Global Smart Industry Conference, Chelyabinsk, (2018), 1-8.
[17] A. K. Alnaim, A. M. Alwakeel and E. B. Fernandez, "Threats Against the Virtual Machine Environment of NFV," 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia, (2019), 1-5.
[18] A. M. Alwakeel, A. K. Alnaim and E. B. Fernandez, "Analysis of threats and countermeasures in NFV use cases," 2019 IEEE International Systems Conference (SysCon), Orlando, FL, USA, (2019), 1-6.
[19] Uxia Cheng, Huijuan Yao, Yu Wang, Yang Xiang, Hongpei Li, Protecting VNF services with smart online behavior anomaly detection method, Future Generation Computer Systems, Volume 95, (2019), 265-276.
[20] Alhebaishi N., Wang L., Jajodia S., "Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV)", Data and Applications Security and Privacy XXXIV, DBSec 2020, Lecture Notes in Computer Science, vol. 12122, Springer, Cham, (2020).

Downloads

Published

2020-12-25

How to Cite

Mazher, A. N., Waleed, J., & MaoLood, A. T. (2020). The Security Threats and Solutions of Network Functions Virtualization: A Review. Journal of Al-Qadisiyah for Computer Science and Mathematics, 12(4), Comp Page 38– 50. https://doi.org/10.29304/jqcm.2020.12.4.720

Issue

Section

Computer Articles