2012 International Conference on Computing, Networking and Communications (ICNC) 2012
DOI: 10.1109/iccnc.2012.6167481
|View full text |Cite
|
Sign up to set email alerts
|

Security issues in network virtualization for the future Internet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 111 publications
0
7
0
Order By: Relevance
“…The number of virtual nodes in each VN request is randomly selected from 3 to 6 following uniform distribution. Each virtual node requires a random amount of resources between [3,5].…”
Section: Comparison With the Optimal Solutionmentioning
confidence: 99%
“…The number of virtual nodes in each VN request is randomly selected from 3 to 6 following uniform distribution. Each virtual node requires a random amount of resources between [3,5].…”
Section: Comparison With the Optimal Solutionmentioning
confidence: 99%
“…However, as an additional virtualization layer is injected in the network architecture and multiple VNs cohost on a shared network infrastructure, network virtualization gives rise to a new array of security vulnerabilities unlike seen in the current network. Specifically, the security risks that brought by the network virtualization can be divided into three categories [4,18,22,23].…”
Section: Security-aware Vn Embedding Problem 311 Security Risks In mentioning
confidence: 99%
“…With such a dynamic and programmable network environment, network virtualization can effectively enhance the flexibility of the current network architecture, promote network innovation, and address the Internet ossification problem [3]. However, as an additional virtualization layer is injected into the network architecture, network virtualization introduces new security risks, such as user attacks on VN and SN, VN attacks on SN, and SN attacks on VN [4]. These risks may violate the information confidentiality, integrity and availability, and impede the large-scale application of network virtualization.…”
Section: Introductionmentioning
confidence: 99%
“…However, their main goal is to give a high level description of potential problems, not on providing a fine-grained analysis of how each of the many threats identified apply to specific scenarios (e.g., virtual networking). On the other hand, there are works in the literature that investigate SVNs in more depth, such as (Chowdhury and Boutaba, 2010; Schoo et al, 2011;Natarajan and Wolf, 2012). Unfortunately, since their goal is to survey solutions and to identify challenges in the area, they fail to provide a reusable classification of the virtual networking threats described.…”
Section: Threat Classificationmentioning
confidence: 99%