ZSM security : threat surface and best practices
Benzaïd, Chafika; Taleb, Tarik (2020-02-12)
C. Benzaid and T. Taleb, "ZSM Security: Threat Surface and Best Practices," in IEEE Network, vol. 34, no. 3, pp. 124-133, May/June 2020, doi: 10.1109/MNET.001.1900273
© 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
https://rightsstatements.org/vocab/InC/1.0/
https://urn.fi/URN:NBN:fi-fe2020110288964
Tiivistelmä
Abstract
The ETSI’s Zero touch network and Service Management (ZSM) framework is a prominent initiative to tame the envisioned complexity in operating and managing 5G and beyond networks. To this end, the ZSM framework promotes the shift toward full Automation of Network and Service Management and Operation (ANSMO) by leveraging the flexibility of SDN/NFV technologies along with Artificial Intelligence, combined with the portability and reusability of model-driven, open interfaces. Besides its benefits, each leveraged enabler will bring its own security threats, which should be carefully tackled to make the ANSMO vision a reality. This paper introduces the ZSM’s potential attack surface and recommends possible mitigation measures along with some research directions to safeguard ZSM system security.
Kokoelmat
- Avoin saatavuus [31657]