2016 IEEE NetSoft Conference and Workshops (NetSoft) 2016
DOI: 10.1109/netsoft.2016.7502487
|View full text |Cite
|
Sign up to set email alerts
|

Attacks against Network Functions Virtualization and Software-Defined Networking: State-of-the-art

Abstract: Network Functions Virtualization (NFV) and Software-Defined Networking (SDN) are two emerging paradigms for networks. While being independent from each other, they may be deployed together, which is likely to happen more frequently in the future, as they bring many opportunities for simpler, more flexible and energy-efficient networks. However, they also come with weaknesses that evil-minded users could exploit to disrupt such architectures. In this paper, we survey attacks that have been or could be performed… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 38 publications
(24 citation statements)
references
References 15 publications
0
23
0
1
Order By: Relevance
“…Inefficient design and deployment of the application can lead to buffer overflow attacks. The vulnerability of VNFs to side-channel attacks, distributed denial-of-service (DDoS) attacks [24], and other cyber-attacks puts the confidentiality and integrity of the users at stake.…”
Section: Security Challenges Of Nfvmentioning
confidence: 99%
“…Inefficient design and deployment of the application can lead to buffer overflow attacks. The vulnerability of VNFs to side-channel attacks, distributed denial-of-service (DDoS) attacks [24], and other cyber-attacks puts the confidentiality and integrity of the users at stake.…”
Section: Security Challenges Of Nfvmentioning
confidence: 99%
“…Opening of the own infrastructure for different edge solutions or VNFs might cause new risks connected with management. The management system should verify each request from MVNO because it can be generated by a malicious or misconfigured element of its virtual infrastructure and causes real danger affecting the resource utilization or the slice parameters [145]. In legacy networks, operators do not expose management API or its services to the customers, but in realizing dynamic network configuration and new network needs, it becomes essential.…”
Section: ) Threats and Vulnerabilitiesmentioning
confidence: 99%
“…The system should support edge computing for local process processing Literature 8,9 24 The system should be able to support deterministic cyclic data communication Literature 1 25 The system should be able to separate time-critical from non-time-critical communication Literature 1,2 26 The system should be able to support different communication standards Literature 11 27 The system should support functions that connect new field devices to the network without human intervention Practice 8,9…”
Section: Appendix Table A1 Requirements Derived From Literature and Practical Use Casesmentioning
confidence: 99%