You are on page 1of 4

Virtualized Network Functions Security Attacks and

Vulnerabilities

Ahamed Aljuhani Talal Alharbi


The Catholic University of America, United States The Catholic University of America, United States
University of Tabuk, Saudi Arabia University of Jeddah, Saudi Arabia
91aljuhani@cua.edu 60alharbit@cua.edu

Abstract—Network functions virtualization (NFV) is a new encourage innovation and competition in both the
paradigm in the network technology domain. NFV decouples telecommunication industry and academia [5].
network functions (NFs) from proprietary appliances and
deploys these functions into high-volume servers such as the x86. Another emerging network technology is the SDN, which
Instead of having NFs on propriety devices that are built-in enables networks to decouple underlying functions from the
software, NFV leverages virtualization to deploy NFs on high- hardware into different planes such as data and control planes
volume servers. This will enable innovations and opportunity for [11]. SDN and NFV are highly complementary and can work
industry and academia. In contrast with traditional networks, together, creating an interesting industry trend [12].
NFV reduces the capital expenditure (CAPEX) and operating Consolidating SDN with NFV can be great because of the
expenses (OPEX). However, its security becomes crucial. greater benefits they provide together [5]. However, SDN can
Specifically, virtualized network functions (VNFs) are an stand alone, as can NFV [12].
important part of NFV. In this paper, we aim to investigate
security issues in VNFs. Furthermore, we discuss security With all due respect to NFV’s benefits, its security issues
challenges in software defined networks (SDNs) when virtualized play critical roles and need to be addressed. More specifically,
as VNFs. In this paper, we also highlight some important VNFs become a significant part of NFVs’ architecture.
research directions in NFV that need more investigation to Therefore, VNFs can be vulnerable to diverse attacks from
mitigate security attacks. inside, outside and between VNFs. This paper, will investigate
specific security issues in VNFs. Furthermore, we will explore
Keywords—Network function virtualization; virtual network and discuss security challenges in SDN as virtualized as VNFs.
functions; NFV; security; VNF; Software Defined Network; SDN This paper also highlights some research directions in NFV
that necessitate more study to mitigate security attacks.
I. INTRODUCTION
Traditional networks operate and deploy in physical This paper is structured as follow: Section II briefly
proprietary devices that have their own software running [1]. outlines the architecture of NFV and SDN as VNFs. Section
The devices usually are built-in software to provide specific III discusses security issues in VNFs and SDN as VNFs.
network functions [2]. To provide services to consumers, the Section IV highlights some important research directions in
telecommunications industry must buy, store, and operate new NFV. Finally, we conclude this work in section V.
physical devices [2]. All the traditional network requirements
take long product cycles to provide service, and these II. OVERVIEW
requirements cause high CAPEX and OPEX [2].
To address these issues, NFV was proposed in 2012 at the A. NFV Architecture
SDN & OpenFlow World Congress [3]. NFV provides a new This section briefly outlines the architecture of NFV and
trend for telecommunication service providers (TSPs), and how it works. Moreover, this section discusses SDNs as
changes the way traditional networks operate [3]. The idea VNFs.
behind NFV is to decouple NFs from the proprietary
appliances’ hardware and leverage virtualization to run on The European Telecommunication Standards Institute
high-volume servers such as the 86x [2]. To illustrate, (ETSI) defines and produces different documents for NFV [6].
traditional networks have implemented NFs in proprietary One of these documents addresses NFV’s architecture
hardware that is limited to vendor specifications that cannot be framework.
changed [4]. Fig. 1 shows the high-level architecture of NFV, which
NFV, though, enables the network to implement NFs such consists of three main parts [7]:
as firewalls, gateways, and load balancers as virtualized
software running on high-volume servers instead of
proprietary hardware appliances. [4]. This process will

978-1-5090-4228-9/17/$31.00 ©2017 IEEE


Fig. 3 Possible SDN resource locations in the VNF

III. VNFS SECURITY ISSUES

Despite all the advantages of NFV, security challenges


become a major concern for both TSPs and consumers. A
single attack can cause massive damage and bring the entire
network down. As virtualized environment in NFV, VNFs are
a significant part of NFV architecture when discussing security
Fig. 1. NFV high-level architecture [7] problem include: virtualized functions that implemented on
vendor’s software, a third party involvement, and trust
1) Virtualized Network Functions: management between VNFs.
Network Functions decoupled from dedicated hardware and In this section, we dive deeply into three types of attack:
implemented as virtualized software running over the NFVI as insider attack, outsider attack, and between VNFs attack. Also,
illustrated in fig. 1 [7]. Examples of NFs are: Evolved Packet we investigate and discuss possible security concerns on SDN
Core (EPC), Gateways, Load Balancers, and Firewalls [7]. as virtualized as a VNF.
Fig. 2 shows the virtualization of network functions [6].
A. Insider Attack
Insider attack occurs inside VNFs framework; attacker
takes advantages of vulnerabilities in software in order to gain
unauthorized access. Even worse, attacks can compromise the
whole NFV components. In this subsection, we discuss deep
security concerns related to VNFs software.

1) Security issues in VNFs software

Fig. 2. Virtualized Network Functions [6]


One of NFV advantages is to build open source software
and deploy them on virtualized environments [14]. However,
software is subject to diverse security attacks and caution is
2) NFV Infrastructure (NFVI): required before deploying any software into virtualized NFV
The NFVI consists hardware resources, virtualization layer environments. An adversary can exploit vulnerabilities in the
and virtualized physical resources (Compute, Storage and deployed software, these vulnerabilities include
Network) on the top of virtualization layer; additionally, NFVI implementation flaws and design flaws [15] [16].
provides execution for VNFs [7].
Another related issue is dealing with a vendor who is
3) Management and Orchestration (MANO): untrustworthy, which may leads to weak security features and
MANO provides the lifecycle management and control of difficulty in communication [15]. One more security concern in
the NFV, also it provides performance analysis and it has three deployed software is to follow up with software’s
main components as follow [9] [10]: update/upgrade and make it up to date; updating software will
• Network Functions Virtualization Orchestration help to fix bugs and other errors in order to keep software
(NFVO). secured from attackers who can take advantage of
vulnerabilities [17].
• Virtualized Infrastructure Manager (VIM).
a) Software validation
• Virtual Network Functions Manager (VNFM). Another important part of VNFs software is validation;
according to the ETSI document (ETSI GS NFV-SEC 001) a
B. SDN as a VNF validation of VNF software has certain procedures beginning
One objective of this paper is to discuss the SDN as with installation and ending with launching of a VNF [16].
virtualized as a VNF. According to the ETSI document, an Validation emphasizes that the loaded code is authentic and has
SDN controller can exist in many different locations in the not been manipulated by unauthorized operation [16].
context of NFV [13]. In another possible scenario shown in b) Software crashes
Fig. 3, the SDN exists inside a VNF framework with a switch In this section, we consider security issues in case of
or a router as a VNF [13]. In this paper, we discuss security crashes; if the software operates on VM crashes, the hypervisor
concerns when SDN becomes a part of a VNF. requires and makes sure there is no alteration to the existing
authorizations. [16].
The following table summarizes security issues in VNFs also important both to provide and prevent attacks between
software: entities such as spoofing and tampering [19]. The following
are different forms of trust between VNFs [20]:
TABLE I. SECURITY ISSUES IN VNFS SOFTWARE • Trusting the information correctness output between
software entities.
VNF Software
Security Concerns
Types Consequences • Trusting between software entities to produce the
correct operations.
Exploiting
Implementation flaws
vulnerabilities by • Trusting to perform operations that have indirect
and design flaws
Security Issues in attackers
VNFs Software [15] influence on data.
[16] An attacker gets
Software’s The Virtual Network Function Component Instances
advantages of bugs and
update/upgrade
errors (VNCIs) build the trust relationships between VNFs [20]. once
the VNFs are established, they require a guarantee that other
Software Validation Validation of VNF
Boot integrity
entities which they might react with can be trusted in order to
[16] software execute certain operations [20]. Therefore, without trusting
relationships, entities are not able to validate their own
Loss of data,
Software Crashes [16] Crash
unauthorized access operations or other entities that they interact with. Also the SPs
are not able to assure that the service which they provided will
work as they expected [20]. However, establishing a longer
chain of trust with additional software remains one of the
B. Outsider Attack security challenges [2].
An outsider attack means when an entity from outside such 2) Sharing host
as a third party has an access to NFVs by a remote access. In Sharing underlying infrastructure among multiple hosted
this part, we discuss possible attacks that might be caused by a virtual machines is a significant security issue in VNFs.
third party. Attackers can perform malicious activities and attack the
1) A Third-party network shared resources between VMs [16]. Another way if the
attacker finds a way through one of the hosted VMs like a
VNFs infrastructure can be managed from outside access “noisy neighbor” in order to consume a large number of
such as a third party network [18]. A third party controls the resources [16]. Therefore, we should isolate and protect
specific VNFs through a portal [15]. Therefore, significant different VMs in case if one of them has been compromised;
security issues are raised not only in the VNFs themselves, but the others should be able to work perfectly [2]. However,
also NFV generally will suffer in terms of security threats [15]. providing a secure isolation among shared resources is not
Attacks occur when a third party is malicious; the infrastructure simple [15].
gets exposed by performing network attacks, such as DDOS, or
even software attacks such as taking advantage of D. SDN as a VNF
vulnerabilities in the deployed virtualization software [15].
Fig. 3 shows NFV deployment with a third party network [15]. As we stated in the overview part “section B”, there are
many different positions that SDN can be located in the context
of NFV framework; however, our focus was on identifying
possible security issues in the case of SDN virtualized as
VNFs. Now, we discuss in this subsection SDN application,
SDN controller, and SDN resources. Security concerns can be
related to their deployments and the communications and
interfaces between them.
1) SDN application
It is responsible for network resources customization
including: allocation, automation, and management of the
services [23]. Unauthenticated and unauthorized application or
malicious application causes failure to the network. Therefore,
specified and verified application should be guaranteed and
Fig. 3 NFV deployment with a third party [15] checked all the time to prevent exploit of such vulnerability.
2) SDN controller
C. Between VNFs Attacks
This is a middle component between the applications and
1) Trust between VNFs the network resources. It controls and relays the configuration
Establishing and managing trust between VNFs is very that received from application to the network resources [23]
important to provide security validation and integrity [1]. It is [24]. However, compromised SDN controller might modify the
VNF forwarding graph [13]. Another security issue could be challenges,” IEEE Commun. Surv. Tutorials, vol. 18, no. 1, pp. 236–262,
the Denial of Service attack (DoS), where the attack sends 2016.
packets to consume the networking resources [25]. Integrity [3] M. Chiosi, D. Clarke, P. Willis, A. Reid, J. Feger, M. Bugenhagen, W.
Khan, M. Fargano, C. Cui, H. Deng, D. Telekom, and U. Michel,
and confidentiality of the controller traffic should be verified. “Network functions virtualisation,an introduction, benefits, enablers,
3) SDN resources challenges & call for action,” Citeseer, no. 1, pp. 1–16, 2012.
[4] V. Network and I. Planning, “SDN-NFV reference architecture,” no.
The SDN network resources are responsible for routing and February, pp. 1–220, 2016.
packet processing. The data plane such as router and switch [5] Y. Li, M. I. N. Chen, and S. Member, “Software-defined network
could be implemented as VNF. Every virtualized network function virtualization : a survey,” vol. 3, 2015.
resources should ensure the configurations from authentic SDN [6] B. Chatras and F. F. Ozog, “Network functions virtualization: The
controller. portability challenge,” IEEE Netw., vol. 30, no. 4, pp. 4–8, 2016.
[7] ETSI, “Network functions virtualisation (NFV); Architectural
4) Interfaces Framework,” vol. 1, pp. 1–21, 2014.
SDN components: application, controller and resources [8] ETSI, “NFV infrastructure overview,” Etsi, vol. 1, pp. 1–59, 2015.
communicate via standardized interfaces. This communication [9] Etsi and J. Quittek, “NFV- management and orchestration,” vol. 1, pp.
should be secured using resistant protocols. 1–184, 2014.
[10] B. Thekkedath, Network functions virtualization for dummies, Hewlett
Packard Enterprice, Hoboken, NJ, USA, 2016
IV. RESEARCH DIRECTION
[11] D. B. Rawat and S. R. Reddy, “Software defined networking
architecture, security and energy efficiency: a survey,” IEEE Commun.
As NFV is a new emerging technology, more studies are Surv. Tutorials, no. c, pp. 1–1, 2016.
needed to solve the existing issues. Specifically, security [12] J. Costa-Requena, J. L. Santos, V. F. Guasch, K. Ahokas, G.
concerns are a crucial part of research which need more study Premsankar, S. Luukkainen, O. L. Pérez, M. U. Itzazelaia, I. Ahmad, M.
to improve security and make NFV more valuable to use. In Liyanage, M. Ylianttila, and E. M. De Oca, “SDN and NFV integration
this section we identify important security issues in NFV. in generalized mobile network architecture,” 2015 Eur. Conf. Networks
Commun. EuCNC 2015, no. November, pp. 154–158, 2015.
[13] “ETSI group specification: network functions virtualization (NFV);
• Reduced isolation of NFs is one of the security Ecosystem; Report in SDN usage in NFV Architecure Framework,”
challenges [18]. Dec. 2015.
[14] C. Price and S. Rivera, “Opnfv: an open platform to accelerate NFV,”
• A longer chain of trust on additional software that White Paper, 2012.
provided from different vendors [21] [22]. [15] M. D. Firoozjaei, J. (Paul) Jeong, H. Ko, and H. Kim, “Security
challenges with network functions virtualization,” Futur. Gener.
• Sharing resources among VMs and multi tenancy Comput. Syst., 2016.
cause privacy and security issues [22]. [16] “ETSI group specification: network functions virtualization (nfv) nfv
security; problem statemetn,” Dec. 2015.
• How to defend properly against DDoS remains a [17] “ETSI group specification: network functions virtualization (nfv) virtula
serious security issue in NFV [21]. network functions architecture,” Dec. 2014.
[18] Alcatel-Lucent, Providing security in nfv- challenges and opportunities,
V. CONCLUSION Alcatel-Lucent White Paper. Technical Report, Alcatel-Lucent, 2014.
[19] Huawei Technologies Co., “White paper - huawei observation to nfv,” p.
16, 2014.
NFV is a new approach that introduces many benefits
compared to a traditional network. However, its security issues [20] “ETSI group specification: network functions virtualization (nfv) nfv
security; security and trust guidance,” Dec. 2014.
remain significant and need further investigation. In this article
[21] W. Yang and C. Fung, “A survey on security in network functions
we give an overview of NFV; then, we focus on VNFs which virtualization,” IEEE NETSOFT 2016 - 2016 IEEE NetSoft Conf. Work.
are an important part of NFV framework. This paper discusses Software-Defined Infrastruct. Networks, Clouds, IoT Serv., pp. 15–19,
three types of attack: insider attack, outsider attack, and 2016.
between VNFs attack. Also, we mention SDN as virtualized as [22] J. Sen, “Security and privacy issues in cloud computing,” Archit. Protoc.
VNFs and discuss security issues with two possible positions: Secur. Inf. Technol., no. iv, p. 42, 2013.
SDN controller as a VNF and SDN switch or a router as a [23] Recommendation ITU-T Y.3300, “Framework of software-defined
VNF. Finally, this paper highlights future research directions in networking,” ITU-T, Jun. 2014.
NFV, which require further study. [24] Understanding the SDN architecture - definition -. (n.d.). Retrieved Nov
09, 2016, from https://www.sdxcentral.com/resources/sdn/inside-sdn-
architecture/.
[25] S. Shin and G. Gu, “Attacking software-defined networks: a first
REFERENCES feasibility study,” In Proceedings of the 2nd ACM SIGCOMM
[1] F. Reynaud, F. X. Aguessy, O. Bettan, M. Bouet, and V. Conan, Workshop on Hot Topics in Software Defined Networking (HotSDN),
“Attacks against network functions virtualization and software-defined pages 165– 166. ACM Press, 2013.
networking: state-of-the-art,” IEEE NETSOFT 2016 - 2016 IEEE
NetSoft Conf. Work. Software-Defined Infrastruct. Networks, Clouds,
IoT Serv., pp. 471–476, 2016.
[2] R. Mijumbi, J. Serrat, J. L. Gorricho, N. Bouten, F. De Turck, and R.
Boutaba, “Network function virtualization: state-of-the-art and research

You might also like