Subtopic Deep Dive

SDN/NFV Security in Telecommunication Networks
Research Guide

What is SDN/NFV Security in Telecommunication Networks?

SDN/NFV Security in Telecommunication Networks secures software-defined networking (SDN) controllers and network function virtualization (NFV) environments against vulnerabilities in 5G orchestration and edge computing.

This subtopic addresses threats to SDN controllers and NFV virtual functions in telecom infrastructures, emphasizing anomaly detection and secure slicing for 5G cores. Key works include Ageyev et al. (2018) proposing security provisions in SDN/NFV (35 citations) and Guerzoni et al. (2014) outlining SDN architectures for 5G (46 citations). Over 10 papers from the list focus on related DDoS detection and traffic analysis in SDN contexts.

11
Curated Papers
3
Key Challenges

Why It Matters

SDN/NFV security enables reliable 5G/6G deployments by protecting programmable networks from controller exploits and DDoS attacks, as analyzed in Privalov et al. (2020) for early cyber-attack detection via traffic filtering (26 citations). Ageyev et al. (2018) demonstrate policy-based access control to mitigate NFV vulnerabilities in telecom. Lysenko et al. (2020) apply self-similarity analysis to detect low-rate botnet DDoS in SDN flows (30 citations), impacting resilient network slicing for edge computing.

Key Research Challenges

Controller Vulnerabilities

SDN controllers face single-point failures from DDoS and unauthorized access, as NFV orchestration amplifies risks in 5G. Ageyev et al. (2018) highlight policy gaps in SDN/NFV provisioning. Mitigation requires anomaly detection without performance overhead.

Low-Rate DDoS Detection

Botnet low-rate DDoS evade traditional thresholds in SDN traffic, exploiting self-similar patterns. Lysenko et al. (2020) propose behavior-based detection for telecom networks. Challenges persist in real-time scaling for high-volume 5G flows.

Secure NFV Orchestration

NFV virtual functions lack isolation against malware in edge environments, per Guerzoni et al. (2014) three-level control architecture. Privalov et al. (2020) improve sensitivity via extreme filtering but struggle with false positives. Balancing flexibility and security remains critical.

Essential Papers

1.

Security Threats and Mitigation Techniques in UAV Communications: A Comprehensive Survey

Gaurav K. Pandey, Devendra S. Gurjar, Ha H. Nguyen et al. · 2022 · IEEE Access · 100 citations

Unmanned aerial vehicles (UAVs) have been instrumental in enabling many new applications and services, including military and rescue operations, aerial surveillance, civilian applications, precisio...

2.

Enhanced method of fast re-routing with load balancing in software-defined networks

Олександр Лемешко, Oleksandra Yeremenko · 2017 · Journal of Electrical Engineering · 57 citations

Abstract A two-level method of fast re-routing with load balancing in a software-defined network (SDN) is proposed. The novelty of the method consists, firstly, in the introduction of a two-level h...

3.

SDN-Based Architecture and Procedures for 5G Networks

Riccardo Guerzoni, Riccardo Trivisonno, David Soldani · 2014 · 46 citations

This article presents a plastic architecture for the advanced 5G infrastructure based on the latest advances of SDN, NFV and edge computing. The novel approach consists of three levels of control, ...

4.

The Vulnerability of the Production Line Using Industrial IoT Systems under DDoS Attack

Tibor Horák, Peter Střelec, Ladislav Huraj et al. · 2021 · Electronics · 40 citations

Internet of Things (IoT) devices are not only finding increasing use in ordinary households, but they have also become a key element for the Industry 4.0 concept. The implementation of industrial I...

5.

Provision security in SDN/NFV

Dmytro Ageyev, Oleg Bondarenko, Walla Alfroukh et al. · 2018 · 2018 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (TCSET) · 35 citations

Software-defined networks (SDNs) are a new approach to building networks, which has given impetus to the development of many technologies used as the basis for many modern applications, such as acc...

6.

Improving The Security Of Internet Of Things Using Encryption Algorithms

Amirhossein Safi · 2017 · Zenodo (CERN European Organization for Nuclear Research) · 30 citations

Internet of things (IOT) is a kind of advanced information technology which has drawn societies’ attention. Sensors and stimulators are usually recognized as smart devices of our environment. Simul...

7.

Detection of the botnets’ low-rate DDoS attacks based on self-similarity

Sergii Lysenko, Kira Bobrovnikova, Serhii Matiukh et al. · 2020 · International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering · 30 citations

An article presents the approach for the botnets’ low-rate a DDoS-attacks detection based on the botnet’s behavior in the network. Detection process involves the analysis of the network traffic, ge...

Reading Guide

Foundational Papers

Start with Guerzoni et al. (2014) for SDN/NFV architecture in 5G (46 citations), then Ageyev et al. (2018) for core security provisioning (35 citations), establishing telecom context.

Recent Advances

Study Lysenko et al. (2020) for self-similarity DDoS detection (30 citations) and Privalov et al. (2020) for enhanced traffic filtering (26 citations) to grasp current anomaly methods.

Core Methods

Core techniques include policy-based access control (Ageyev et al., 2018), self-similarity traffic analysis (Lysenko et al., 2020), and extreme filtering for early detection (Privalov et al., 2020).

How PapersFlow Helps You Research SDN/NFV Security in Telecommunication Networks

Discover & Search

Research Agent uses searchPapers and citationGraph to map SDN/NFV security literature from Ageyev et al. (2018), revealing clusters around DDoS detection; exaSearch uncovers 5G-specific threats, while findSimilarPapers links Guerzoni et al. (2014) to NFV orchestration papers.

Analyze & Verify

Analysis Agent employs readPaperContent on Lysenko et al. (2020) for self-similarity DDoS models, verifies claims with CoVe chain-of-verification, and runs PythonAnalysis with NumPy/pandas to replicate traffic anomaly stats; GRADE scores evidence strength for Privalov et al. (2020) filtering methods.

Synthesize & Write

Synthesis Agent detects gaps in controller security across Ageyev et al. (2018) and Guerzoni et al. (2014), flags contradictions in DDoS strategies; Writing Agent uses latexEditText, latexSyncCitations, and latexCompile to draft secure slicing architectures, with exportMermaid for SDN flow diagrams.

Use Cases

"Replicate self-similarity DDoS detection from Lysenko et al. (2020) on SDN traffic datasets."

Research Agent → searchPapers → Analysis Agent → runPythonAnalysis (NumPy/pandas for Hurst exponent computation) → matplotlib plot of anomaly scores.

"Draft LaTeX paper on SDN controller hardening for 5G NFV."

Synthesis Agent → gap detection → Writing Agent → latexEditText + latexSyncCitations (Ageyev et al., Guerzoni et al.) → latexCompile → PDF with secure architecture diagram.

"Find GitHub repos implementing NFV security from recent papers."

Research Agent → paperExtractUrls (Privalov et al. 2020) → Code Discovery → paperFindGithubRepo → githubRepoInspect → verified SDN filtering code snippets.

Automated Workflows

Deep Research workflow scans 50+ SDN/NFV papers via citationGraph, structures reports on DDoS trends from Lysenko et al. (2020) and Ageyev et al. (2018). DeepScan applies 7-step CoVe analysis to verify Privalov et al. (2020) filtering sensitivity with Python sandbox checkpoints. Theorizer generates hypotheses for NFV slicing security from Guerzoni et al. (2014) architecture.

Frequently Asked Questions

What defines SDN/NFV security in telecom networks?

It secures SDN controllers and NFV functions against vulnerabilities in 5G orchestration, focusing on anomaly detection and DDoS mitigation (Ageyev et al., 2018).

What are key methods for DDoS detection in SDN?

Self-similarity analysis detects low-rate botnet attacks (Lysenko et al., 2020); extreme filtering boosts early cyber-attack sensitivity (Privalov et al., 2020).

Which papers are foundational?

Guerzoni et al. (2014) define SDN architecture for 5G (46 citations); Ageyev et al. (2018) provision security in SDN/NFV (35 citations).

What open problems exist?

Real-time low-rate DDoS scaling in high-volume 5G flows and NFV isolation without overhead persist, as noted in Lysenko et al. (2020) and Guerzoni et al. (2014).

Research Cybersecurity and Information Systems with AI

PapersFlow provides specialized AI tools for Computer Science researchers. Here are the most relevant for this topic:

See how researchers in Computer Science & AI use PapersFlow

Field-specific workflows, example queries, and use cases.

Computer Science & AI Guide

Start Researching SDN/NFV Security in Telecommunication Networks with AI

Search 474M+ papers, run AI-powered literature reviews, and write with integrated citations — all in one workspace.

See how PapersFlow works for Computer Science researchers