Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0362 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2020-12-10 ÃÑÆäÀÌÁö 15
ÇѱÛÇ¥ÁØ¸í ´Éµ¿Àû ³×Æ®¿öÅ© ¹æ¾î ¼­ºñ½º¸¦ À§ÇÑ ¼­¹ö Àº´Ð¿ë ¹Ì³¢ ³ëµå ¿î¿µ ÀýÂ÷
¿µ¹®Ç¥Áظí Decoy Node Operating Procedures for Server Concealment in Network Moving Target Defense Service
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº ³×Æ®¿öÅ© ´Éµ¿Àû ³×Æ®¿öÅ© ¹æ¾î ¼­ºñ½º Áß¿¡¼­ ÅäÆú·ÎÁö ÁÖ¼Ò º¯ÀÌ ¼­ºñ½º¸¦ Àû¿ëÇϱâ À§ÇÑ ¹Ì³¢ ³ëµå ¿î¿µ ÀýÂ÷¸¦ Á¤ÀÇÇÑ´Ù. ÁÖ¿ä ³»¿ëÀº, ÅäÆú·ÎÁö º¯ÀÌ ¼­ºñ½ºÀÇ ±¸¼º ¿ä¼Ò Á¤ÀÇ, º¸È£´ë»ó ¼­¹öÀÇ °ø°Ý Á¢Á¡ È®Àå ¹æ¹ý, ¹Ì³¢ ³ëµå ¿î¿µÀ» À§ÇÑ »ç¼³ ³×Æ®¿öÅ© ±¸¼º ¹× ÆÐŶ Á¦¾î ±×¸®°í ¹Ì³¢ ³ëµå ºñ½Äº°È­ ¹æ¹ýÀ¸·Î ±¸¼ºµÈ´Ù.
¿µ¹®³»¿ë¿ä¾à This standard defines decoy node operating procedures for implementing topology addres mutation service of network moving target defense service. The main content of this standard consists of defining components of topology mutation service, how to extend atack surface on the protected server, configuring private networks and controling packets for decoy node operations, and decoy node de-identifcation procedure.
±¹Á¦Ç¥ÁØ -
°ü·ÃÆÄÀÏ TTAK.KO-12.0362.pdf TTAK.KO-12.0362.pdf            

ÀÌÀü
3rd Generation Partnership Project;Technical Specification Group Core Network and Terminals;Diameter based protocols to support Short Message Service (SMS) capable Mobile Management Entities (MMEs)(Release 11)
´ÙÀ½
3rd Generation Partnership Project;Technical Specification Group Core Network and Terminals;Diameter based protocols to support Short Message Service (SMS) capable Mobile Management Entities (MMEs)(Release 13)