Classification of network slicing threats based on slicing enablers: A survey

Mohammad J.K. Abood , Ghassan H. Abdul-Majeed
{"title":"Classification of network slicing threats based on slicing enablers: A survey","authors":"Mohammad J.K. Abood ,&nbsp;Ghassan H. Abdul-Majeed","doi":"10.1016/j.ijin.2023.04.002","DOIUrl":null,"url":null,"abstract":"<div><p>One of the Main expectation of the 5G environment is supporting various services in many areas such as healthcare, education, energy, streaming, V2X (vehicle to everything) communication, etc. To implement such an expectation, there is a need to assign dedicated resources and functionalities for each service by slicing the network which means creating a virtual network for each service inside a physical network. Each virtual network (Slice) should be isolated from the other virtual network (Slice), and the security of that slice becomes a core issue in most research and studies. In this study, after focusing on security challenges in network slices, we describe the network slicing idea, the isolation concept, and the enablers of the network slicing, as well as the prevention of related attacks, risks, and concerns in each enabler. The research also lists the previous surveys and maps out taxonomies to illustrate the contribution of each survey in presenting threats and attacks against network slicing.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"4 ","pages":"Pages 103-112"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Intelligent Networks","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2666603023000076","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

One of the Main expectation of the 5G environment is supporting various services in many areas such as healthcare, education, energy, streaming, V2X (vehicle to everything) communication, etc. To implement such an expectation, there is a need to assign dedicated resources and functionalities for each service by slicing the network which means creating a virtual network for each service inside a physical network. Each virtual network (Slice) should be isolated from the other virtual network (Slice), and the security of that slice becomes a core issue in most research and studies. In this study, after focusing on security challenges in network slices, we describe the network slicing idea, the isolation concept, and the enablers of the network slicing, as well as the prevention of related attacks, risks, and concerns in each enabler. The research also lists the previous surveys and maps out taxonomies to illustrate the contribution of each survey in presenting threats and attacks against network slicing.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于切片使能因子的网络切片威胁分类:一项调查
5G环境的主要期望之一是支持许多领域的各种服务,如医疗保健、教育、能源、流媒体、V2X(车辆到一切)通信等。为了实现这样的期望,需要通过对网络进行切片来为每个服务分配专用资源和功能,这意味着在物理网络内为每个服务创建虚拟网络。每个虚拟网络(Slice)都应该与另一个虚拟网络(Slice)隔离,而该切片的安全性成为大多数研究的核心问题。在这项研究中,在关注网络切片中的安全挑战之后,我们描述了网络切片的思想、隔离概念和网络切片的使能因素,以及每个使能因素中相关攻击、风险和问题的预防。该研究还列出了以前的调查,并绘制了分类法,以说明每项调查在呈现针对网络切片的威胁和攻击方面的贡献。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
12.00
自引率
0.00%
发文量
0
期刊最新文献
Designing a novel network anomaly detection framework using multi-serial stacked network with optimal feature selection procedures over DDOS attacks Infrared spectral imaging-based image recognition for motion detection Online and offline collaborative abnormal traffic intelligent detection system based on elastic lightweight width learning algorithm Resource optimization algorithm for 5G core network integrating NFV and SDN technologies Teacher Probability Reconstruction based knowledge distillation within intelligent network compression
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1