ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å±â¼úº¸°í¼­(TTAR)
Ç¥ÁعøÈ£ TTAR-12.0051 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2022-10-20 ÃÑ ÆäÀÌÁö 12
ÇÑ±Û Ç¥Áظí SDN ±â¹ÝÀÇ ³×Æ®¿öÅ© º¸¾È ±â´ÉÀÇ ÀÎÅÍÆäÀ̽º(I2NSF) ÇÁ·¹ÀÓ¿öÅ© – Á¦11ºÎ: È°¿ë ¾È³»¼­(±â¼úº¸°í¼­)
¿µ¹® Ç¥Áظí Interface to Network Security Functions (I2NSF) Framework Using Software-Defined Networking – Part11: Usage Guide(Technical Report)
ÇÑ±Û ³»¿ë¿ä¾à º» ±â¼úº¸°í¼­´Â Ŭ¶ó¿ìµå ȯ°æ¿¡¼­ º¸¾È ¼­ºñ½º¸¦ Á¦°øÇϱâ À§ÇÑ ±â¼úÀÎ I2NSF ÇÁ·¹ÀÓ¿öÅ©¸¦ È°¿ëÇÏ´Â ¹æ¹ý¿¡ ´ëÇÏ¿© ±â¼úÇÑ´Ù. À̸¦ À§Çؼ­ ¿ÀǼҽº¸¦ È°¿ëÇÏ¿© I2NSF ÇÁ·¹ÀÓ¿öÅ© ±¸ÃàÇÏ°í, º» º¸°í¼­´Â I2NSF ÇÁ·¹ÀÓ¿öÅ©ÀÇ ÄÄÆ÷³ÍÆ®¿Í ÀÎÅÍÆäÀ̽ºÀÇ ¼³Ä¡ °úÁ¤À» ¼³¸íÇÑ´Ù. ¶ÇÇÑ ±¸ÃàµÈ I2NSF ÇÁ·¹ÀÓ¿öÅ©¿¡¼­ ¸Ó½Å·¯´× ¹× ºí·ÏüÀÎ ½Ã½ºÅÛ Àû¿ëÇÏ´Â ¹æ¹ýÀ» ±â¼úÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à This technical report describes how to utilize the I2NSF framework in order to provide security services in a cloud environment. Open source is used to build an I2NSF framework, and this report shows the installation procedure of components and interfaces in the I2NSF framework. Also, it describes the usage of machine learning and Blockchain system in the installed I2NSF framework.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAR-12.0051.pdf TTAR-12.0051.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
SDN ±â¹ÝÀÇ ³×Æ®¿öÅ© º¸¾È ±â´ÉÀÇ ÀÎÅÍÆäÀ̽º(I2NSF) ÇÁ·¹ÀÓ¿öÅ© – Á¦11ºÎ: È°¿ë ¾È³»¼­(±â¼úº¸°í¼­) TTAR-12.0051 2022-10-20 Á¦Á¤ À¯È¿ ¾øÀ½ TTAR-12.0051.pdf