Abstract
Network Function Virtualization could be a quickly advancing innovation that guarantees to revolutionize the way networks are planned, sent, and overseen. However, as with any modern innovation, there are potential security risk that must be tended to guarantee the security of the network. Misuses attacks are one such risk that can compromise the security and integrity of NFV frameworks.
In recently years , data mining has risen as a promising approach for recognizing misuses attacks in NFV systems. This systematic mapping ponders points to supply an overview of the existing research on misuses attack detection based on data mining in NFV. Particularly, the study will recognize and analyze the research conducted in this region, counting the sorts of data mining methods utilized, the types of misuses attacks identified, and the assessment strategies utilized.
The results of this study will give experiences into the current state of investigate on misuses attack detection based on data mining in NFV, as well as recognize gaps and openings for future research in this range. Also, the study will serve as an important asset for analysts and professionals looking for to create successful and effective methods for recognizing misuses attacks in NFV frameworks
Publisher
Sakarya University Journal of Computer and Information Sciences
Reference29 articles.
1. [1] Firoozjaei, et al (2017). Security challenges with network functions virtualization. Future Generation Computer Systems, 67, 315-324.
[2] Alnaim, A. K., Alwakeel, A. M., & Fernandez, E. B. (2022). Towards a security reference architecture for NFV. Sensors, 22(10), 3750.
2. [3] Guleria, P., & Sood, M. (2014). Data mining in education: A review on the knowledge discovery perspective. International Journal of Data Mining & Knowledge Management Process, 4(5), 47.
3. [4] Saeed, M. M. (2022). A real-time adaptive network intrusion detection for streaming data: a hybrid approach. Neural Computing and Applications, 34(8), 6227-6240.
4. [5] Abbas, A. K., Fleh, S. Q., & Safi, H. H. (2015). Systematic Mapping Study On Managing Variability In Software Product Line Engineering: Communication. Diyala Journal of Engineering Sciences, 511-520.
5. [6] Fleh, S. Q., Abbas, A. K., & Saffer, K. M. (2015, December). A systematic mapping study on runtime monitoring of services. In The Iraqi Journal For Mechanical And Material Engineering, Special for Babylon First International Engineering Conference, Issue (A).