Cargando…

Towards a Security Reference Architecture for NFV

Network function virtualization (NFV) is an emerging technology that is becoming increasingly important due to its many advantages. NFV transforms legacy hardware-based network infrastructure into software-based virtualized networks. This transformation increases the flexibility and scalability of n...

Descripción completa

Detalles Bibliográficos
Autores principales: Alnaim, Abdulrahman Khalid, Alwakeel, Ahmed Mahmoud, Fernandez, Eduardo B.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9146665/
https://www.ncbi.nlm.nih.gov/pubmed/35632161
http://dx.doi.org/10.3390/s22103750
_version_ 1784716618575642624
author Alnaim, Abdulrahman Khalid
Alwakeel, Ahmed Mahmoud
Fernandez, Eduardo B.
author_facet Alnaim, Abdulrahman Khalid
Alwakeel, Ahmed Mahmoud
Fernandez, Eduardo B.
author_sort Alnaim, Abdulrahman Khalid
collection PubMed
description Network function virtualization (NFV) is an emerging technology that is becoming increasingly important due to its many advantages. NFV transforms legacy hardware-based network infrastructure into software-based virtualized networks. This transformation increases the flexibility and scalability of networks, at the same time reducing the time for the creation of new networks. However, the attack surface of the network increases, which requires the definition of a clear map of where attacks may happen. ETSI standards precisely define many security aspects of this architecture, but these publications are very long and provide many details which are not of interest to software architects. We start by conducting threat analysis of some of the NFV use cases. The use cases serve as scenarios where the threats to the architecture can be enumerated. Representing threats as misuse cases that describe the modus operandi of attackers, we can find countermeasures to them in the form of security patterns, and we can build a security reference architecture (SRA). Until now, only imprecise models of NFV architectures existed; by making them more detailed and precise it is possible to handle not only security but also safety and reliability, although we do not explore those aspects. Because security is a global property that requires a holistic approach, we strongly believe that architectural models are fundamental to produce secure networks and allow us to build networks which are secure by design. The resulting SRA defines a roadmap to implement secure concrete architectures.
format Online
Article
Text
id pubmed-9146665
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-91466652022-05-29 Towards a Security Reference Architecture for NFV Alnaim, Abdulrahman Khalid Alwakeel, Ahmed Mahmoud Fernandez, Eduardo B. Sensors (Basel) Article Network function virtualization (NFV) is an emerging technology that is becoming increasingly important due to its many advantages. NFV transforms legacy hardware-based network infrastructure into software-based virtualized networks. This transformation increases the flexibility and scalability of networks, at the same time reducing the time for the creation of new networks. However, the attack surface of the network increases, which requires the definition of a clear map of where attacks may happen. ETSI standards precisely define many security aspects of this architecture, but these publications are very long and provide many details which are not of interest to software architects. We start by conducting threat analysis of some of the NFV use cases. The use cases serve as scenarios where the threats to the architecture can be enumerated. Representing threats as misuse cases that describe the modus operandi of attackers, we can find countermeasures to them in the form of security patterns, and we can build a security reference architecture (SRA). Until now, only imprecise models of NFV architectures existed; by making them more detailed and precise it is possible to handle not only security but also safety and reliability, although we do not explore those aspects. Because security is a global property that requires a holistic approach, we strongly believe that architectural models are fundamental to produce secure networks and allow us to build networks which are secure by design. The resulting SRA defines a roadmap to implement secure concrete architectures. MDPI 2022-05-14 /pmc/articles/PMC9146665/ /pubmed/35632161 http://dx.doi.org/10.3390/s22103750 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Alnaim, Abdulrahman Khalid
Alwakeel, Ahmed Mahmoud
Fernandez, Eduardo B.
Towards a Security Reference Architecture for NFV
title Towards a Security Reference Architecture for NFV
title_full Towards a Security Reference Architecture for NFV
title_fullStr Towards a Security Reference Architecture for NFV
title_full_unstemmed Towards a Security Reference Architecture for NFV
title_short Towards a Security Reference Architecture for NFV
title_sort towards a security reference architecture for nfv
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9146665/
https://www.ncbi.nlm.nih.gov/pubmed/35632161
http://dx.doi.org/10.3390/s22103750
work_keys_str_mv AT alnaimabdulrahmankhalid towardsasecurityreferencearchitecturefornfv
AT alwakeelahmedmahmoud towardsasecurityreferencearchitecturefornfv
AT fernandezeduardob towardsasecurityreferencearchitecturefornfv