ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å±â¼úº¸°í¼­(TTAR)
Ç¥ÁعøÈ£ TTAR-12.0056 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2024-10-24 ÃÑ ÆäÀÌÁö 47
ÇÑ±Û Ç¥Áظí 5G SBA(Service Based Architecture) ±â¹Ý º¸¾È µ¥ÀÌÅÍ ºÐ¼® ±â´É ±¸Çö ¹æ¹ý ¹× À¯½ºÄÉÀ̽º (±â¼úº¸°í¼­)
¿µ¹® Ç¥Áظí Implementation Methods and Use Cases of Security Data Analysis Function Based on 5G SBA (Service Based Architecture) (Technical Report)
ÇÑ±Û ³»¿ë¿ä¾à ÀÌ ±â¼úº¸°í¼­´Â SDAFÀÇ 3°³ º¸¾È ºÐ¼® ±â´ÉÀ» ¼öÇàÇÏ°í ºÐ¼® °á°ú¸¦ Á¦°øÇϱâ SDAF ÀÀ¿ë ±â´ÉÀ» Á¤ÀÇÇÑ´Ù. À̸¦ À§ÇØ SDAFÀÇ ¼¼ºÎ ºÐ¼® ±â´É°ú °ü·ÃµÈ Åë½Å ÀÎÅÍÆäÀ̽º¸¦ Á¤ÀÇÇÑ´Ù. ¶ÇÇÑ, SDAF º¸¾ÈºÐ¼®±â´ÉÀÇ µ¿ÀÛÀýÂ÷¸¦ ¼³¸íÇÑ À¯½ºÄÉÀ̽º¸¦ ±â¼úÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à The Technical Report outlines the definition of the SDAF (Security Data Analysis Function) application, which performs three security analysis functions and provides analysis results. To achieve this, it defines the communication interfaces related to the detailed analysis functions of SDAF. Additionally, use cases describing the operational procedures of the SDAF security analysis function are provided.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAR-12.0056.pdf TTAR-12.0056.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
5G SBA(Service Based Architecture) ±â¹Ý º¸¾È µ¥ÀÌÅÍ ºÐ¼® ±â´É ±¸Çö ¹æ¹ý ¹× À¯½ºÄÉÀ̽º (±â¼úº¸°í¼­) TTAR-12.0056 2024-10-24 Á¦Á¤ À¯È¿ ¾øÀ½ TTAR-12.0056.pdf