Virtualized Network Functions security attacks and vulnerabilities.
Ahamed AljuhaniTalal AlharbiPublished in: CCWC (2017)
Keyphrases
- buffer overflow
- security threats
- security risks
- security mechanisms
- denial of service
- security vulnerabilities
- countermeasures
- dos attacks
- security measures
- network administrators
- information security
- security issues
- cyber attacks
- network security
- security problems
- denial of service attacks
- security breaches
- network management
- traffic analysis
- fault injection
- attack scenarios
- security flaws
- computer networks
- intrusion detection
- computer security
- network monitoring
- network attacks
- security protocols
- attack graphs
- intrusion prevention
- operating system
- access control
- java card
- network access
- ddos attacks
- key management
- security requirements
- intrusion detection and prevention
- resource constrained
- security policies
- smart card
- network traffic
- intrusion detection system
- data corruption
- attack detection
- cryptographic protocols
- virtual private network
- wireless sensor networks