Javascript must be enabled to continue!
Securing Virtual Architecture of Smartphones based on Network Function Virtualization
View through CrossRef
One of the most difficult parts of Network Function Virtualization (NFV) installations is security. The NFV environment is a large-scale, software-driven one with a variety of components. Network topologies and traffic flows are continuously and managed to change. Such complexity necessitates a comprehensive security framework that permits automatic and to manage changeable network conditions, a quick response is required with the least amount of manual involvement. This paper introduced many solutions for securing the NFV environment from attacks such as (Specter and DoS) that attack parts of this architecture based on some experiments. Applied NFV on an operating system of smartphones (Android). We tested some attacks on the device and then on some of the layers in the architecture. We obtain new and obvious results, by comparison, to traditional and updated NFV architecture. Also, update the NFV architecture using vCenter/ESX and Hyper-V being two important terms in security After adding the necessary algorithms to protect the NFV architecture, we noticed about 128 hours to hack a 1,4 megabyte (WinRAR) file, while the same file and the same size needed 126 hours to reach the root without the algorithms used to protect the architecture.
Title: Securing Virtual Architecture of Smartphones based on Network Function Virtualization
Description:
One of the most difficult parts of Network Function Virtualization (NFV) installations is security.
The NFV environment is a large-scale, software-driven one with a variety of components.
Network topologies and traffic flows are continuously and managed to change.
Such complexity necessitates a comprehensive security framework that permits automatic and to manage changeable network conditions, a quick response is required with the least amount of manual involvement.
This paper introduced many solutions for securing the NFV environment from attacks such as (Specter and DoS) that attack parts of this architecture based on some experiments.
Applied NFV on an operating system of smartphones (Android).
We tested some attacks on the device and then on some of the layers in the architecture.
We obtain new and obvious results, by comparison, to traditional and updated NFV architecture.
Also, update the NFV architecture using vCenter/ESX and Hyper-V being two important terms in security After adding the necessary algorithms to protect the NFV architecture, we noticed about 128 hours to hack a 1,4 megabyte (WinRAR) file, while the same file and the same size needed 126 hours to reach the root without the algorithms used to protect the architecture.
Related Results
Assessment of Network & Processor Virtualization in Cloud Computing
Assessment of Network & Processor Virtualization in Cloud Computing
Cloud Computing is an emerging field in applied computer science. Cloud computing depends on virtualization, where a sole physical resource is virtualized into numerous virtual res...
Emerging Virtualization Technology
Emerging Virtualization Technology
Virtualization represents a class of technologies that covers a wide range of applications and implementations. Virtualization can be applied to hardware or s...
Are Hypervisors Microkernels Done Right? An Architectural Analysis
Are Hypervisors Microkernels Done Right? An Architectural Analysis
Abstract
Modern computing infrastructures increasingly rely on virtualization technologies to improve resource utilization, system scalability, a...
The architecture of differences
The architecture of differences
Following in the footsteps of the protagonists of the Italian architectural debate is a mark of culture and proactivity. The synthesis deriving from the artistic-humanistic factors...
Features of building virtual PBX
Features of building virtual PBX
The article considers the features of organizing highly efficient telephone communication using cloud-based PBXs.
The advantages of solutions based on IP-telephony compared to cla...
A Survey of Middleware for Sensor and Network Virtualization
A Survey of Middleware for Sensor and Network Virtualization
Wireless Sensor Network (WSN) is leading to a new paradigm of Internet of Everything (IoE). WSNs have a wide range of applications but are usually deployed in a particular applicat...
Contribution to the system architecture design for electromagnetic nano-network communications
Contribution to the system architecture design for electromagnetic nano-network communications
(English) A nano-network is a communication network at the nano-scale between nano-devices. Nanodevices face certain challenges in functionalities, because of limitations in their ...
Comparative analysis for the selection of a virtualization tool using the AHP Model
Comparative analysis for the selection of a virtualization tool using the AHP Model
This paper presents a comprehensive comparative analysis of virtualization tools, grounding its study on applying the AHP model. Virtualization is introduced as an emerging technol...

