Network Services Anomalies in NFV: Survey, Taxonomy, and Verification Methods

03/04/2022
by   Moubarak Zoure, et al.
0

Network Function Virtualization (NFV) has emerged as a disruptive networking architecture whose galloping evolution is prompting enterprises to outsource network functions to the cloud and ultimately harvest the fruits of cloud computing, including elasticity, pay-as-you-go billing model, and on-demand services provisioning. However, many reluctant enterprises oppose the benefits of this outsourcing to their critical and pressing concerns about security, trust, and compliance. The latter anticipate possible security and QoS policy violations stemming from dishonest behaviors by cloud providers, attacks by co-resident competitors, misconfiguration by cloud administrators, or implementations flaws by NFV developers. As a result, migrating sensitive workloads to the cloud requires enterprises to first assess risks by gaining knowledge of possible network services' anomalies and second, to build trust in the cloud by designing effective mechanisms to detect such anomalies. This survey provides scrutiny of network services anomalies that may occur in the NFV environments. We first present a taxonomy of network service anomalies and analyze their negative impacts on critical service attributes, including security and performance. Second, we compare and classify the existing anomalies' verification mechanisms from the literature. Finally, we point out the literature gap and identify future research directions for anomalies verification in NFV.

READ FULL TEXT
research
01/22/2020

A Cloud Security Framework Based on Trust Model and Mobile Agent

Cloud computing as a potential paradigm offers tremendous advantages to ...
research
06/28/2022

Learning State Machines to Monitor and Detect Anomalies on a Kubernetes Cluster

These days more companies are shifting towards using cloud environments ...
research
03/09/2022

Getting Critical: Making Sense of the EU Cybersecurity Framework for Cloud Providers

In this chapter, we review how the EU cybersecurity regulatory framework...
research
06/29/2023

A Survey on Enterprise Network Security: Asset Behavioral Monitoring and Distributed Attack Detection

Enterprise networks that host valuable assets and services are popular a...
research
05/23/2018

Cloud Brokerage: A Systematic Survey

Background: The proliferation of cloud providers and provisioning levels...
research
07/31/2023

AMOE: a Tool to Automatically Extract and Assess Organizational Evidence for Continuous Cloud Audit

The recent spread of cloud services has enabled many companies to take a...
research
07/12/2021

MonTrees: Automated Detection and Classification of Networking Anomalies in Cellular Networks

The active growth and dynamic nature of cellular networks makes network ...

Please sign up or login with your details

Forgot password? Click here to reset