Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å±â¼úº¸°í¼(TTAR) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | TTAR-12.0051 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2022-10-20 | ÃÑ ÆäÀÌÁö | 12 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | SDN ±â¹ÝÀÇ ³×Æ®¿öÅ© º¸¾È ±â´ÉÀÇ ÀÎÅÍÆäÀ̽º(I2NSF) ÇÁ·¹ÀÓ¿öÅ© – Á¦11ºÎ: È°¿ë ¾È³»¼(±â¼úº¸°í¼) | ||||||||||||||||
¿µ¹® Ç¥Áظí | Interface to Network Security Functions (I2NSF) Framework Using Software-Defined Networking – Part11: Usage Guide(Technical Report) | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | º» ±â¼úº¸°í¼´Â Ŭ¶ó¿ìµå ȯ°æ¿¡¼ º¸¾È ¼ºñ½º¸¦ Á¦°øÇϱâ À§ÇÑ ±â¼úÀÎ I2NSF ÇÁ·¹ÀÓ¿öÅ©¸¦ È°¿ëÇÏ´Â ¹æ¹ý¿¡ ´ëÇÏ¿© ±â¼úÇÑ´Ù. À̸¦ À§Çؼ ¿ÀǼҽº¸¦ È°¿ëÇÏ¿© I2NSF ÇÁ·¹ÀÓ¿öÅ© ±¸ÃàÇÏ°í, º» º¸°í¼´Â I2NSF ÇÁ·¹ÀÓ¿öÅ©ÀÇ ÄÄÆ÷³ÍÆ®¿Í ÀÎÅÍÆäÀ̽ºÀÇ ¼³Ä¡ °úÁ¤À» ¼³¸íÇÑ´Ù. ¶ÇÇÑ ±¸ÃàµÈ I2NSF ÇÁ·¹ÀÓ¿öÅ©¿¡¼ ¸Ó½Å·¯´× ¹× ºí·ÏüÀÎ ½Ã½ºÅÛ Àû¿ëÇÏ´Â ¹æ¹ýÀ» ±â¼úÇÑ´Ù. | ||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à | This technical report describes how to utilize the I2NSF framework in order to provide security services in a cloud environment. Open source is used to build an I2NSF framework, and this report shows the installation procedure of components and interfaces in the I2NSF framework. Also, it describes the usage of machine learning and Blockchain system in the installed I2NSF framework. | ||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
°ü·ÃÆÄÀÏ | TTAR-12.0051.pdf | ||||||||||||||||
Ç¥ÁØÀÌ·Â |
|