ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0314-Part2 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2018-12-19 ÃÑ ÆäÀÌÁö 30
ÇÑ±Û Ç¥Áظí SDN ±â¹ÝÀÇ ³×Æ®¿öÅ© º¸¾È ±â´ÉÀÇ ÀÎÅÍÆäÀ̽º(I2NSF) ÇÁ·¹ÀÓ¿öÅ© - Á¦2ºÎ: º¸¾È ¼­ºñ½º À¯½ºÄÉÀ̽º
¿µ¹® Ç¥Áظí Interface to Network Security Functions (I2NSF) Framework Using Software-Defined Networking - Part2: Security Service Use Cases
ÇÑ±Û ³»¿ë¿ä¾à º» Ç¥ÁØÀº I2NSF ÇÁ·¹ÀÓ¿öÅ© ±â¹Ý ³×Æ®¿öÅ© º¸¾È ¼­ºñ½ºÀÇ 3°¡Áö À¯½ºÄÉÀ̽º·Î¼­ ½Ã°£ ±â¹Ý À¥ Â÷´Ü, ȸ»ç À¥ ¼­¹ö Á¢±Ù¿¡ ´ëÇÑ DDoS °ø°Ý ¾àÈ­ ¼­ºñ½º, ¾ÇÀÇÀûÀÎ VoIP/VoLTE Æ®·¡ÇÈ Â÷´Ü ¼­ºñ½º¸¦ Á¦½ÃÇÏ°í, °¢ À¯½ºÄÉÀ̽º¿¡ ´ëÇÑ ½Ã³ª¸®¿À, µ¿ÀÛ ÀýÂ÷ ¹× ±¸Çö Äڵ带 ´Ù·ç°í ÀÖ´Ù.
¿µ¹® ³»¿ë¿ä¾à The standard shows three use cases of network security services in I2NSF framework, such as time-based web access control, DDoS attack mitigation service for corporate web server access, and malicious VoIP/VoLTE traffic access control service.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0314-part2.pdf TTAK.KO-12.0314-part2.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
SDN ±â¹ÝÀÇ ³×Æ®¿öÅ© º¸¾È ±â´ÉÀÇ ÀÎÅÍÆäÀ̽º(I2NSF) ÇÁ·¹ÀÓ¿öÅ© - Á¦2ºÎ: º¸¾È ¼­ºñ½º À¯½ºÄÉÀ̽º TTAK.KO-12.0314-Part2 2018-12-19 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0314-part2.pdf