2017
DOI: 10.1109/access.2017.2701416
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Security of Software Defined Mobile Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 38 publications
(15 citation statements)
references
References 26 publications
0
15
0
Order By: Relevance
“…The telecommunications vertical is one of the sectors most exposed to cyberattacks. Moreover, attacks are targeted on its many dimensions like infrastructure [147], communication [148], isolation [149] and many more. Another thing that is worth mentioning is presented in papers [150], [151], and concerns attacks that are not focused on the operator but affect its network, for example, high traffic caused by Denial of Service impacts its operation of all other network elements.…”
Section: ) Attacks and Countermeasuresmentioning
confidence: 99%
“…The telecommunications vertical is one of the sectors most exposed to cyberattacks. Moreover, attacks are targeted on its many dimensions like infrastructure [147], communication [148], isolation [149] and many more. Another thing that is worth mentioning is presented in papers [150], [151], and concerns attacks that are not focused on the operator but affect its network, for example, high traffic caused by Denial of Service impacts its operation of all other network elements.…”
Section: ) Attacks and Countermeasuresmentioning
confidence: 99%
“…Network virtualization separates the network software logic from the hardware logic to enable sharing the network resources among multiple users (tenants) [249], [250]. By decoupling the network functions from hardware, NFV enables mapping multiple network functions (software instances) to [249], [251], [252], and beyond the layers. In the following sub-sections, we discuss how ML-based approaches can improve the efficiency of SDN and NFV.…”
Section: ML For Sdn and Nfvmentioning
confidence: 99%
“…By introducing programmability and centralizing the network control, SDN along with all benefits also opens networks to security challenges, as detailed in [259]. The centralized control frameworks, such as SDN controllers, oversee and control the entire network from a central vintage point, making it a favorite choice for resource exhaustion and Denial of Service (DoS) attacks [252]. Overwhelming the controller with any kind of traffic can cause a jamming effect, resource exhaustion, or a DoS attack as described in [261], [262].…”
Section: A ML For Sdnmentioning
confidence: 99%
“…Liyanage et al, [31] proposed SIGMONA security architecture, a multi-tier security approach with four component: Secure Communication Component, Policy-Based Communication (PBC) Component, Security Management and Monitoring Component and Synchronized Network Security and Traffic Component. Within the PBC Component, there are included TCP-Splicing mechanisms with a bot detection scheme, for mitigating DDoS attacks targeted against the control plane.…”
Section: State Of the Artmentioning
confidence: 99%