Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0314-Part6 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2019-12-11 | ÃÑÆäÀÌÁö | 73 |
ÇѱÛÇ¥Áظí | SDN ±â¹ÝÀÇ ³×Æ®¿öÅ© º¸¾È ±â´ÉÀÇ ÀÎÅÍÆäÀ̽º(I2NSF) ÇÁ·¹ÀÓ¿öÅ© - Á¦6ºÎ : ³×Æ®¿öÅ© º¸¾È ±â´É ¸ð´ÏÅ͸µ ÀÎÅÍÆäÀ̽º | ||
¿µ¹®Ç¥Áظí | Interface to Network Security Functions (I2NSF) Framework Using Software-Defined Networking – Part6: Network Security Function Monitoring Interface | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØÀº I2NSF ÇÁ·¹ÀÓ¿öÅ©¿¡¼ÀÇ NSF ¸ð´ÏÅ͸µÀ» À§ÇÑ Ç¥ÁØ ¸ð´ÏÅ͸µ ÀÎÅÍÆäÀ̽ºÀÇ Á¤º¸ ¸ðµ¨ ¹× µ¥ÀÌÅÍ ¸ðµ¨À» Á¤ÀÇÇÑ´Ù. ÀÌ·¯ÇÑ NSF ¸ð´ÏÅ͸µ ÀÎÅÍÆäÀ̽º¸¦ ÅëÇØ I2NSF ÇÁ·¹ÀÓ¿öÅ©´Â NSFÀÇ ¸®¼Ò½º »óŸ¦ È®ÀÎÇÏ°í, NSF¸¦ ´ë»óÀ¸·Î ÇÏ´Â ºñÁ¤»óÀûÀÎ ÇൿÀ̳ª ÀáÀçÀûÀÎ °ø°ÝÀ» °¨ÁöÇÏ°í, °¢ º¸¾È Á¤Ã¥ÀÌ NSFµéÀ» ÅëÇØ Àß Àû¿ëµÇ°í ÀÖ´ÂÁö È®ÀÎÇÒ ¼ö ÀÖ´Ù. ¸ð´ÏÅ͸µÀº Ä«¿îÅÍ(Counter), ¾Ë¸²(Notification), ·Î±×(Log)·Î ±¸¼ºµÈ´Ù. Ä«¿îÅÍ´Â ½Ã½ºÅÛ Ä«¿îÅÍ¿Í NSF Ä«¿îÅÍ·Î ±¸¼ºµÈ´Ù. ¾Ë¸²Àº °æ°í(Alarm)¿Í À̺¥Æ®(Event)·Î ±¸¼ºµÈ´Ù. ·Î±×´Â ½Ã½ºÅÛ ·Î±×¿Í NSF ·Î±×·Î ±¸¼ºµÈ´Ù. ÀÌ¿Í °°ÀÌ NSF ¸ð´ÏÅ͸µÀº NSF ÀÚü °ü¸®»Ó¸¸ ¾Æ´Ï¶ó º¸¾È °ø°ÝÀ» ŽÁöÇÏ¿© ´ëÀÀÇÒ ¼ö ÀÖ´Â ÀÚÀ² º¸¾È ¼ºñ½º¸¦ Á¦°øÇÒ ¼ö ÀÖ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The standard defines an information model and the corresponding data model of a standard monitoring interface for NSF monitoring in I2NSF framework. Through this NSF monitoring interface, I2NSF framework can check the resource states of NSFs, detect abnormal activities and potential attacks for NSFs, and check whether each security policy is applied through NSFs or not. The Monitoring consists of Counter, Notification, and Log. The Counter consists of System Counter and NSF Counter. The Notification consists of Alarm and Event. The Log consists of System Log and NSF Log. Therefore, the NSF monitoring can not only manage NSFs, but also provide autonomous security services by detecting security attacks and taking actions. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0314-Part6.pdf |