Future of Information and Communication Conference (FICC) 2025
28-29 April 2025
Publication Links
IJACSA
Special Issues
Future of Information and Communication Conference (FICC)
Computing Conference
Intelligent Systems Conference (IntelliSys)
Future Technologies Conference (FTC)
International Journal of Advanced Computer Science and Applications(IJACSA), Volume 15 Issue 6, 2024.
Abstract: Network Function Virtualization (NFV) delivers numerous benefits to customers since it is a cost-effective evolution of legacy networks, allowing for rapid network augmentation and extension at a low cost as network functions are virtualized. However, on the other hand, there is a big security concern for NFV users because of shared infrastructure. There are many studies in the literature that report various NFV security threats. In this paper, we categorize these threats according to the alignment of NFV architecture and delineate a taxonomy for NFV security threats. This work provides detailed information about security threats, causes, and countermeasures to reduce the security vulnerabilities of NFV. We believe that the study of NFV security threats from an architectural perspective is a step forward for better insight into these threats since the roots of many NFV threats are connected to their architecture. We also present how NFV design should be revamped to mitigate NFV security threats, something that is a recent trend in this area. Finally, we highlight future research directions to provide enhanced security for future NFV-based networks.
Bilal Zahran, Naveed Ahmed, Abdel Rahman Alzoubaidi and Md Asri Ngadi, “Security and Privacy Issues in Network Function Virtualization: A Review from Architectural Perspective” International Journal of Advanced Computer Science and Applications(IJACSA), 15(6), 2024. http://dx.doi.org/10.14569/IJACSA.2024.0150649
@article{Zahran2024,
title = {Security and Privacy Issues in Network Function Virtualization: A Review from Architectural Perspective},
journal = {International Journal of Advanced Computer Science and Applications},
doi = {10.14569/IJACSA.2024.0150649},
url = {http://dx.doi.org/10.14569/IJACSA.2024.0150649},
year = {2024},
publisher = {The Science and Information Organization},
volume = {15},
number = {6},
author = {Bilal Zahran and Naveed Ahmed and Abdel Rahman Alzoubaidi and Md Asri Ngadi}
}
Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.