ZSM Security: Threat Surface and Best Practices
Loading...
Access rights
openAccess
URL
Journal Title
Journal ISSN
Volume Title
A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä
This publication is imported from Aalto University research portal.
View publication in the Research portal (opens in new window)
View/Open full text file from the Research portal (opens in new window)
Other link related to publication (opens in new window)
View publication in the Research portal (opens in new window)
View/Open full text file from the Research portal (opens in new window)
Other link related to publication (opens in new window)
Authors
Date
2020-05-01
Major/Subject
Mcode
Degree programme
Language
en
Pages
10
124-133
124-133
Series
IEEE NETWORK, Volume 34, issue 3
Abstract
The ETSI's Zero touch network and Service Management (ZSM) framework is a prominent initiative to tame the envisioned complexity in operating and managing 5G and beyond networks. To this end, the ZSM framework promotes the shift toward full Automation of Network and Service Management and Operation (ANSMO) by leveraging the flexibility of SDN/NFV technologies along with Artificial Intelligence, combined with the portability and reusability of model-driven, open interfaces. Besides its benefits, each leveraged enabler will bring its own security threats, which should be carefully tackled to make the ANSMO vision a reality. This paper introduces the ZSM's potential attack surface and recommends possible mitigation measures along with some research directions to safeguard ZSM system security.Description
| openaire: EC/H2020/871808/EU//INSPIRE-5Gplus
Keywords
5G, ZSM, AI, ML, Security, SDN, NFV
Other note
Citation
Benzaid, C & Taleb, T 2020, ' ZSM Security: Threat Surface and Best Practices ', IEEE Network, vol. 34, no. 3, 8994962, pp. 124-133 . https://doi.org/10.1109/MNET.001.1900273