2023
DOI: 10.1016/j.comnet.2022.109484
|View full text |Cite
|
Sign up to set email alerts
|

Service Function Chaining security survey: Addressing security challenges and threats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 58 publications
0
2
0
Order By: Relevance
“…By adding fault tolerance, attackers cannot disable the control layer, and the desired defense services are fully accessible. Additionally, service function chaining [33] enables operators to design VNF functions on demand to meet the needs of their customers.…”
Section: Discussionmentioning
confidence: 99%
“…By adding fault tolerance, attackers cannot disable the control layer, and the desired defense services are fully accessible. Additionally, service function chaining [33] enables operators to design VNF functions on demand to meet the needs of their customers.…”
Section: Discussionmentioning
confidence: 99%
“…With the development of NFV, the deployment of SF can rely on standard servers that support virtualization. With the support of SDN, NFC can be decoupled from the network topology and deployed in the network in the form of VNF to form a VNF chain [9]. The SFC structure defined by the IETF SFCWG is mainly divided into network domains and NFV infrastructures that support SFC chains.…”
Section: Network Function Chainsmentioning
confidence: 99%