NFV: Security Threats and Best Practices

Shankar Lal, Tarik Taleb, Ashutosh Dutta

Research output: Contribution to journalArticleScientificpeer-review

80 Citations (Scopus)

Abstract

Network function virtualization (NFV) yields numerous benefits, particularly the possibility of a cost-efficient transition of telco hardware functionalities on the software platform to break the vendor lock-in problem. These benefits come at the price of some security flaws. Indeed, with NFV, virtual mobile networks become vulnerable to a number of security threats. These threats can be leveraged using some available mitigation techniques and also through other emerging solutions. This article presents critical security threats that exist in the NFV infrastructure, proposes best security practices to protect against them.

Original languageEnglish
Article number7927935
Pages (from-to)211-217
Number of pages7
JournalIEEE Communications Magazine
Volume55
Issue number8
DOIs
Publication statusPublished - 15 May 2017
MoE publication typeA1 Journal article-refereed

Fingerprint

Dive into the research topics of 'NFV: Security Threats and Best Practices'. Together they form a unique fingerprint.

Cite this