Threats Against the Virtual Machine Environment of NFV
Title | Threats Against the Virtual Machine Environment of NFV |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Alnaim, Abdulrahman K., Alwakeel, Ahmed M., Fernandez, Eduardo B. |
Conference Name | 2019 2nd International Conference on Computer Applications Information Security (ICCAIS) |
Date Published | may |
Publisher | IEEE |
ISBN Number | 978-1-7281-0108-8 |
Keywords | architectural modeling, cloud computing, Computer architecture, computer network security, Hardware, misuse patterns, network function virtualization, NFV, on-demand network functions, privilege escalation, pubcrawl, security, security reference architecture, security threats, Software, UML diagrams, Unified modeling language, virtual machine environment, Virtual machine monitors, virtual machine security, virtual machines, Virtual machining, virtualisation, virtualization, VM escape threats |
Abstract | Network Function Virtualization (NFV) is an implementation of cloud computing that leverages virtualization technology to provide on-demand network functions such as firewalls, domain name servers, etc., as software services. One of the methods that help us understand the design and implementation process of such a new system in an abstract way is architectural modeling. Architectural modeling can be presented through UML diagrams to show the interaction between different components and its stakeholders. Also, it can be used to analyze the security threats and the possible countermeasures to mitigate the threats. In this paper, we show some of the possible threats that may jeopardize the security of NFV. We use misuse patterns to analyze misuses based on privilege escalation and VM escape threats. The misuse patterns are part of an ongoing catalog, which is the first step toward building a security reference architecture for NFV. |
URL | https://ieeexplore.ieee.org/document/8769561 |
DOI | 10.1109/CAIS.2019.8769561 |
Citation Key | alnaim_threats_2019 |
- privilege escalation
- VM escape threats
- Virtualization
- virtualisation
- architectural modeling
- Cloud Computing
- computer architecture
- computer network security
- Hardware
- misuse patterns
- network function virtualization
- NFV
- on-demand network functions
- Virtual machining
- pubcrawl
- security
- security reference architecture
- security threats
- Software
- UML diagrams
- Unified modeling language
- virtual machine environment
- Virtual machine monitors
- virtual machine security
- virtual machines