메뉴 건너뛰기




Volumn 67, Issue , 2017, Pages 315-324

Security challenges with network functions virtualization

Author keywords

Network functions virtualization; Network security; Security threats; Virtualized network function

Indexed keywords

SECURITY SYSTEMS; SIDE CHANNEL ATTACK; TRANSFER FUNCTIONS; VIRTUAL REALITY;

EID: 84995887335     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2016.07.002     Document Type: Article
Times cited : (62)

References (65)
  • 1
    • 84995911143 scopus 로고    scopus 로고
    • Network Functions Virtualisation; Introductory White Paper. Technical Report
    • SDN and OpenFlow World Congress
    • [1] ETSI. Network Functions Virtualisation; Introductory White Paper. Technical Report., 2012, SDN and OpenFlow World Congress.
    • (2012)
  • 2
    • 84995893915 scopus 로고    scopus 로고
    • Network Functions Virtualisation (NFV); Infrastructure Overview. Technical Report, ETSI GS NFV-INF 001 V1.1.1
    • [2] ETSI. Network Functions Virtualisation (NFV); Infrastructure Overview. Technical Report, ETSI GS NFV-INF 001 V1.1.1., 2015.
    • (2015)
  • 3
    • 84983364558 scopus 로고    scopus 로고
    • Software-Defined Networking: The New Norm for Networks. Technical Report
    • ONF White Paper
    • [3] ONF. Software-Defined Networking: The New Norm for Networks. Technical Report., 2012, ONF White Paper.
    • (2012)
  • 5
    • 84913593468 scopus 로고    scopus 로고
    • A survey on software-defined network and openflow: From concept to implementation
    • [5] Hu, F., Hao, Q., Bao, K., A survey on software-defined network and openflow: From concept to implementation. IEEE Commun. Surv. Tutor. 16:4 (2014), 2181–2206.
    • (2014) IEEE Commun. Surv. Tutor. , vol.16 , Issue.4 , pp. 2181-2206
    • Hu, F.1    Hao, Q.2    Bao, K.3
  • 6
    • 84957677162 scopus 로고    scopus 로고
    • Cloud Computing: Challenges, Limitations and R & D Solutions
    • Springer
    • [6] Shafieian, S., Zulkernine, M., Haque, A., Cloud Computing: Challenges, Limitations and R & D Solutions. 2014, Springer, 3–22.
    • (2014) , pp. 3-22
    • Shafieian, S.1    Zulkernine, M.2    Haque, A.3
  • 8
    • 84923855140 scopus 로고    scopus 로고
    • Network functions virtualization: Challenges and opportunities for innovations
    • [8] Han, B., Gopalakrishnan, V., Ji, L., Lee, S., Network functions virtualization: Challenges and opportunities for innovations. IEEE Commun. Mag. 53:2 (2015), 90–97.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.2 , pp. 90-97
    • Han, B.1    Gopalakrishnan, V.2    Ji, L.3    Lee, S.4
  • 9
    • 84923871402 scopus 로고    scopus 로고
    • An instrumentation and analytics framework for optimal and robust NFV deployment
    • [9] Veitch, P., McGrath, M.J., Bayon, V., An instrumentation and analytics framework for optimal and robust NFV deployment. IEEE Commun. Mag. 53 (2015), 126–133.
    • (2015) IEEE Commun. Mag. , vol.53 , pp. 126-133
    • Veitch, P.1    McGrath, M.J.2    Bayon, V.3
  • 10
    • 84960954325 scopus 로고    scopus 로고
    • Software-defined network function virtualization: A survey
    • [10] Li, Y., Chen, M., Software-defined network function virtualization: A survey. IEEE Access 3 (2015), 2542–2553.
    • (2015) IEEE Access , vol.3 , pp. 2542-2553
    • Li, Y.1    Chen, M.2
  • 11
    • 84960971825 scopus 로고    scopus 로고
    • Survey on network virtualization hypervisors for software defined networking
    • [11] Blenk, A., Basta, A., Reisslein, M., Kellerer, W., Survey on network virtualization hypervisors for software defined networking. IEEE Commun. Surv. Tutor. 18:1 (2016), 655–685.
    • (2016) IEEE Commun. Surv. Tutor. , vol.18 , Issue.1 , pp. 655-685
    • Blenk, A.1    Basta, A.2    Reisslein, M.3    Kellerer, W.4
  • 14
    • 84995907049 scopus 로고    scopus 로고
    • Providing Security in NFV- Challenges and Opportunities, Alcatel-Lucent White Paper. Technical Report
    • Alcatel-Lucent
    • [14] Alcatel-Lucent. Providing Security in NFV- Challenges and Opportunities, Alcatel-Lucent White Paper. Technical Report., 2014, Alcatel-Lucent.
    • (2014)
  • 15
    • 84913590313 scopus 로고    scopus 로고
    • NFV: state of the art, challenges and implementation in next generation mobile networks (vEPC)
    • [15] Hawilo, H., Shami, A., Mirahmadi, M., Asal, R., NFV: state of the art, challenges and implementation in next generation mobile networks (vEPC). IEEE Netw. Mag. 28:6 (2014), 18–26.
    • (2014) IEEE Netw. Mag. , vol.28 , Issue.6 , pp. 18-26
    • Hawilo, H.1    Shami, A.2    Mirahmadi, M.3    Asal, R.4
  • 16
    • 84995896734 scopus 로고    scopus 로고
    • Network Functions Virtualisation (NFV); NFV Security; Security and Trust Guidance. Technical Report, ETSI GS NFV-SEC 003 V1.1.1
    • [16] ETSI. Network Functions Virtualisation (NFV); NFV Security; Security and Trust Guidance. Technical Report, ETSI GS NFV-SEC 003 V1.1.1., 2014.
    • (2014)
  • 17
    • 84995921856 scopus 로고    scopus 로고
    • Network Functions Virtualisation (NFV); Infrastructure; Hypervisor Domain. Technical Report, ETSI GS NFV-INF 004 V1.1.1
    • [17] ETSI. Network Functions Virtualisation (NFV); Infrastructure; Hypervisor Domain. Technical Report, ETSI GS NFV-INF 004 V1.1.1., 2015.
    • (2015)
  • 18
    • 84995931965 scopus 로고    scopus 로고
    • Intel and Brocade Network Functions Virtualization Solution. Technical Report
    • Brocade Communications Systems
    • [18] BROCADE. Intel and Brocade Network Functions Virtualization Solution. Technical Report., 2014, Brocade Communications Systems.
    • (2014)
  • 19
    • 84889570735 scopus 로고    scopus 로고
    • Security threats and countermeasures in cloud computing
    • [19] Ashktorab, V., Taghizadeh, S.R., Security threats and countermeasures in cloud computing. Int. J. Appl. Innov. Eng. Manag. 1:2 (2012), 234–245.
    • (2012) Int. J. Appl. Innov. Eng. Manag. , vol.1 , Issue.2 , pp. 234-245
    • Ashktorab, V.1    Taghizadeh, S.R.2
  • 20
    • 73349136579 scopus 로고    scopus 로고
    • Shadow generation protocol in linguistic threshold schemes
    • [20] Ogiela, M.R., Ogiela, U., Shadow generation protocol in linguistic threshold schemes. Commun. Comput. Inf. Sci. 58 (2009), 35–42.
    • (2009) Commun. Comput. Inf. Sci. , vol.58 , pp. 35-42
    • Ogiela, M.R.1    Ogiela, U.2
  • 21
    • 84886731331 scopus 로고    scopus 로고
    • The Notorious Nine: Cloud Computing Top Threats in 2013. Technical Report
    • Cloud Security Alliance
    • [21] CSA. The Notorious Nine: Cloud Computing Top Threats in 2013. Technical Report., 2013, Cloud Security Alliance.
    • (2013)
  • 24
    • 84861651031 scopus 로고    scopus 로고
    • Transparent acceleration of software packet forwarding using netmap,
    • [24] L. Rizzo, M. Carbone, G. Catalli, Transparent acceleration of software packet forwarding using netmap, in: Proceedings of IEEE INFOCOM’2012, 2012, pp. 2471–2479.
    • (2012) Proceedings of IEEE INFOCOM’2012 , pp. 2471-2479
    • Rizzo, L.1    Carbone, M.2    Catalli, G.3
  • 27
    • 84874732333 scopus 로고    scopus 로고
    • SwitchBlade: A platform for rapid deployment of network protocols on programmable hardware
    • [27] Anwer, M.B., Motiwala, M., Tariq, M., Feamster, N., SwitchBlade: A platform for rapid deployment of network protocols on programmable hardware. ACM SIGCOMM Comput. Commun. Rev. 40:4 (2010), 183–194.
    • (2010) ACM SIGCOMM Comput. Commun. Rev. , vol.40 , Issue.4 , pp. 183-194
    • Anwer, M.B.1    Motiwala, M.2    Tariq, M.3    Feamster, N.4
  • 34
    • 74049152260 scopus 로고    scopus 로고
    • Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds,
    • [34] T. Ristenpart, E. Tromer, H. Shacham, S. Savage, Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds, in: Proceedings of CCS 2009, 2009, pp. 199–212.
    • (2009) Proceedings of CCS , vol.2009 , pp. 199-212
    • Ristenpart, T.1    Tromer, E.2    Shacham, H.3    Savage, S.4
  • 35
    • 84945979212 scopus 로고    scopus 로고
    • Whispers in the hyper-space: High-speed covert channel attacks in the cloud
    • USENIX
    • [35] Wu, Z., Xu, Z., Wang, Whispers in the hyper-space: High-speed covert channel attacks in the cloud. 21st USENIX Security Symposium, (USENIX Security 12), 2012, USENIX, 159–173.
    • (2012) 21st USENIX Security Symposium, (USENIX Security 12) , pp. 159-173
    • Wu, Z.1    Xu, Z.2    Wang3
  • 41
    • 84885310053 scopus 로고    scopus 로고
    • Security-preserving live migration of virtual machines in the cloud
    • [41] Zhang, F., Chen, H., Security-preserving live migration of virtual machines in the cloud. J. Netw. Syst. Manage. 21:4 (2013), 562–587.
    • (2013) J. Netw. Syst. Manage. , vol.21 , Issue.4 , pp. 562-587
    • Zhang, F.1    Chen, H.2
  • 48
    • 84896101663 scopus 로고    scopus 로고
    • Dynamic trust management for delay tolerant networks and its application to secure routing
    • [48] Chen, I., Bao, F., Chang, M., Cho, J., Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Trans. Parallel Distrib. Syst. 25:5 (2014), 1200–1210.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.5 , pp. 1200-1210
    • Chen, I.1    Bao, F.2    Chang, M.3    Cho, J.4
  • 51
    • 85073538603 scopus 로고    scopus 로고
    • STEALTHMEM: System-level protection against cache-based side channel attacks in the cloud,
    • [51] T. Kim, M. Peinado, G. Mainar-Ruiz, STEALTHMEM: System-level protection against cache-based side channel attacks in the cloud, in: 21st USENIX Security Symposium, USENIX Security 12, 2012, pp. 189–204.
    • (2012) 21st USENIX Security Symposium, USENIX Security , vol.12 , pp. 189-204
    • Kim, T.1    Peinado, M.2    Mainar-Ruiz, G.3
  • 59
    • 84995896860 scopus 로고    scopus 로고
    • Trusted Platform Module Evolution. Technical Report 2
    • Johns Hopkins APL Technical Digest
    • [59] Osborn, J.D., Challener, D.C., Trusted Platform Module Evolution. Technical Report 2., 2013, Johns Hopkins APL Technical Digest.
    • (2013)
    • Osborn, J.D.1    Challener, D.C.2
  • 63
    • 84903700745 scopus 로고    scopus 로고
    • Hardware-based Security for Virtual Trusted Platform Modules. Technical Report
    • arXiv preprint
    • [63] Alsouri, S., Feller, T., Malipatlolla, S., Katzenbeisser, S., Hardware-based Security for Virtual Trusted Platform Modules. Technical Report., 2013 arXiv preprint.
    • (2013)
    • Alsouri, S.1    Feller, T.2    Malipatlolla, S.3    Katzenbeisser, S.4
  • 64
    • 84995979932 scopus 로고    scopus 로고
    • High Assurance Platform. Technical Report
    • HAP Fact sheet, National Security Agency
    • [64] NSA. High Assurance Platform. Technical Report., 2011, HAP Fact sheet, National Security Agency.
    • (2011)
  • 65
    • 84926159255 scopus 로고    scopus 로고
    • Security enhancement of cloud servers with a redundancy-based fault-tolerant cache structure
    • [65] Dai, H., Zhao, Sh., Zhang, Qiu, M.J., Tao, L., Security enhancement of cloud servers with a redundancy-based fault-tolerant cache structure. Future Gener. Comput. Syst. 52:C (2015), 147–155.
    • (2015) Future Gener. Comput. Syst. , vol.52 , Issue.100 , pp. 147-155
    • Dai, H.1    Zhao, S.2    Zhang3    Qiu, M.J.4    Tao, L.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.