Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0314-Part2 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2018-12-19 | ÃÑÆäÀÌÁö | 30 |
ÇѱÛÇ¥Áظí | SDN ±â¹ÝÀÇ ³×Æ®¿öÅ© º¸¾È ±â´ÉÀÇ ÀÎÅÍÆäÀ̽º(I2NSF) ÇÁ·¹ÀÓ¿öÅ© - Á¦2ºÎ: º¸¾È ¼ºñ½º À¯½ºÄÉÀ̽º | ||
¿µ¹®Ç¥Áظí | Interface to Network Security Functions (I2NSF) Framework Using Software-Defined Networking - Part2: Security Service Use Cases | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØÀº I2NSF ÇÁ·¹ÀÓ¿öÅ© ±â¹Ý ³×Æ®¿öÅ© º¸¾È ¼ºñ½ºÀÇ 3°¡Áö À¯½ºÄÉÀ̽º·Î¼ ½Ã°£ ±â¹Ý À¥ Â÷´Ü, ȸ»ç À¥ ¼¹ö Á¢±Ù¿¡ ´ëÇÑ DDoS °ø°Ý ¾àÈ ¼ºñ½º, ¾ÇÀÇÀûÀÎ VoIP/VoLTE Æ®·¡ÇÈ Â÷´Ü ¼ºñ½º¸¦ Á¦½ÃÇÏ°í, °¢ À¯½ºÄÉÀ̽º¿¡ ´ëÇÑ ½Ã³ª¸®¿À, µ¿ÀÛ ÀýÂ÷ ¹× ±¸Çö Äڵ带 ´Ù·ç°í ÀÖ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The standard shows three use cases of network security services in I2NSF framework, such as time-based web access control, DDoS attack mitigation service for corporate web server access, and malicious VoIP/VoLTE traffic access control service. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0314-part2.pdf |