TTA °£Ç๰ - ICT Standard Weekly

Ȩ > Ç¥ÁØÈ­ Âü¿© > TTA°£Ç๰ > ICT Standard Weekly

±â¼úÇ¥ÁØÀ̽´

´Ù¿î·Îµå (2015-42È£)
Æ®À§ÅÍ ÆäÀ̽ººÏ ¹ÌÅõµ¥ÀÌ

[Á¤º¸º¸È£] IETF ³×Æ®¿öÅ© º¸¾È ±â´É ÀÎÅÍÆäÀ̽º(I2NSF) Ç¥ÁØÈ­

IETF(Internet Engineering Task Force) I2NSF(Interface to Network Security Functions) BoF[1]¿¡¼­ 2015³â 7¿ù ȸÀÇ¿¡ º»ÀÎÀÌ ¼ÓÇÑ ¼º±Õ°ü´ëÇб³¿Í ÀüÀÚÅë½Å¿¬±¸¿øÀº ¡°I2NSF¸¦ ÀÌ¿ëÇÏ´Â SDN±â¹Ý º¸¾È ¼­ºñ½º¡±[2] Ç¥ÁØÀÇ Çʿ伺À» Á¦¾ÈÇÏ¿´´Ù. º»°í¿¡¼­´Â I2NSF¸¦ ¼Ò°³ÇÏ°í º»ÀÎÀÌ Ç¥ÁØÈ­Çϰí ÀÖ´Â ¡°I2NSF¸¦ ÀÌ¿ëÇÏ´Â SDN±â¹Ý º¸¾È ¼­ºñ½º¡±¸¦ ¼Ò°³ÇϰíÀÚ ÇÑ´Ù.

 

³×Æ®¿öÅ© º¸¾È ±â´É ÀÎÅÍÆäÀ̽º(I2NSF)

 

 

<±×¸² 1> I2NSF ¾ÆÅ°ÅØÃ³

 

I2NSF(Interface to Network Security Functions)´Â NFV(Network Functions Virtualization)[3]¸¦ ±âº» ÀÎÇÁ¶ó·Î ÀÌ¿ëÇÏ´Â ³×Æ®¿öÅ© ȯ°æ¿¡¼­ ³×Æ®¿öÅ© º¸¾È ¼­ºñ½º(Network Security Service)¸¦ Á¦°øÇϱâ À§ÇÑ Ç¥ÁØ ÀÎÅÍÆäÀ̽º¸¦ Á¤ÀÇÇÏ°í ±¸ÇöÇÏ´Â °ÍÀ» ¸ñÇ¥·Î ÇÑ´Ù. I2NSF´Â 2014³â 11¿ù¿¡ °³ÃÖµÈ IETF 91Â÷ ȸÀÇ¿¡¼­ BoF·Î ½ÃÀ۵Ǿú°í, Áö³­ IETF 93Â÷ ȸÀÇ¿¡¼­ µÎ ¹øÂ° BoF¸¦ °³ÃÖÇÏ¿´´Ù. I2NSF°¡ ½ÃÀÛµÈ ¹è°æÀº ÃÖ±Ù¿¡ ³×Æ®¿öÅ© ¼­ºñ½º ÀÎÇÁ¶ó ±¸Ãà ¹× ¿î¿µ ºñ¿ëÀ» Àý°¨Çϱâ À§ÇÑ ³×Æ®¿öÅ© ±â´É °¡»óÈ­ÀÎ NFV ¿¬±¸ ¹× °³¹ßÀÌ À¯·´ Ç¥ÁØÈ­ ±â±¸ÀÎ ETSI¸¦ Áß½ÉÀ¸·Î ÀÎÅÍ³Ý ¼­ºñ½º Á¦°øÀÚ, ³×Æ®¿öÅ© Àåºñ ȸ»ç¿¡ ÀÇÇØ ÁøÇàµÇ°í ÀÖ´Ù[3]. ¶ÇÇÑ ³×Æ®¿öÅ©ÀÇ À¯¿¬Çϰí È¿°úÀû ÁøÈ­¿Í °ü¸®¸¦ À§ÇØ µ¥ÀÌÅÍ Ç÷¹ÀÎ(Data Plane)°ú ÄÜÆ®·Ñ Ç÷¹ÀÎ(Control Plane)ÀÇ ºÐ¸®Çϰí Á¦¾î ¼­¹ö¸¦ ÅëÇØ ³×Æ®¿öÅ© µð¹ÙÀ̽º¸¦ °ü¸®ÇÏ´Â ¼ÒÇÁÆ®¿þ¾î Áß½ÉÀÇ ³×Æ®¿öÅ©ÀÎ SDN(Software-Defined Networking)[4]À» I2NSF¿¡ Àû¿ëÇÏ·Á´Â ¿¬±¸ ¹× °³¹ß Ȱµ¿ÀÌ È°¹ßÇÏ´Ù.

 

ÀÌ·¯ÇÑ I2NSF´Â ³×Æ®¿öÅ© ¼­ºñ½ºÀÇ »ç¿ëÀÚ(Client), »ç¿ëÀÚ°¡ NFV ȯ°æ¿¡¼­ º¸¾È ¼­ºñ½º¸¦ »ç¿ëÇÒ ¼ö ÀÖ°Ô º¸¾È Á¦¾î±â(Security Controller) ±×¸®°í º¸¾È ¼­ºñ½º¸¦ ½ÇÁ¦·Î ¼öÇàÇÏ´Â º¸¾È ±â´É(Security Function, SF)À¸·Î ±¸¼ºµÈ´Ù. ±×¸² 1Àº I2NSFÀÇ ¾ÆÅ°ÅØÃ³¸¦ º¸¿©ÁÖ°í ÀÖ´Ù. ¶ÇÇÑ I2NSF ¾ÆÅ°ÅØÃ³¿¡¼­ÀÇ ¼¼ °¡Áö ÀÎÅÍÆäÀ̽º¸¦ Á¤ÀÇÇϰí ÀÖ´Ù.

¨ç ¼­ºñ½º °èÃþ ÀÎÅÍÆäÀ̽º(Service Layer Interface): º¸¾È¼­ºñ½º »ç¿ëÀÚ(¿¹, À̵¿Åë½Å¸Á °ü¸®ÀÚ)°¡ ¼­ºñ½º °èÃþ ÀÎÅÍÆäÀ̽º¸¦ ÅëÇØ º¸¾È Á¦¾î±â¿¡°Ô °í¼öÁØ º¸¾ÈÁ¤Ã¥(High-level Security Policy)¸¦ Àü´ÞÇÑ´Ù.

¨è ±â´É °èÃþ ÀÎÅÍÆäÀ̽º(Capability Layer Interface): º¸¾È Á¦¾î±â´Â Àü´Þ¹ÞÀº °í¼öÁØ º¸¾ÈÁ¤Ã¥À» NFV »óÀÇ º¸¾È ±â´É(SF)¿¡¼­ ½ÇÇàµÉ ¼ö ÀÖ´Â Àú¼öÁØ º¸¾È±â´É(Low-level Security Functions)À¸·Î ¹ø¿ªÇÑ´Ù. º¸¾È Á¦¾î±â´Â ÀÌ º¸¾È±â´ÉÀ» ±â´É °èÃþ ÀÎÅÍÆäÀ̽º¸¦ ÅëÇØ ÀûÇÕÇÑ º¸¾È ±â´É °¡»ó ¸Ó½Å ¶Ç´Â ¹°¸® ¸Ó½Å¿¡ Àü´ÞÇÏ¿© ¿äûµÈ º¸¾È¼­ºñ½º¸¦ ½ÇÇàÇÑ´Ù.

¨é µî·Ï ÀÎÅÍÆäÀ̽º(Registration Interface): º¸¾È¼­ºñ½º °ø±ÞÀÚ(¿¹, Symantec, Verisign, AhnLab)´Â º¥´õ °ü¸® ½Ã½ºÅÛ(Vendor Management System)À» °¡Áö°í µî·Ï ÀÎÅÍÆäÀ̽º¸¦ ÅëÇØ º¸¾È Á¦¾î±â¸¦ °ÅÃļ­ I2NSFÀÇ SF¿¡¼­ ½ÇÇàµÉ º¸¾È¼­ºñ½º ÆÐŰÁö¸¦ ¼³Ä¡ÇÑ´Ù.

I2NSF´Â ÇöÀç <±×¸² 1>¿¡¼­ ¼­ºñ½º ÀÎÅÍÆäÀ̽º¿Í ±â´É ÀÎÅÍÆäÀ̽º¸¦ Ç¥ÁØÈ­¸¦ ÁøÇàÇÒ ¿¹Á¤À̰í, µî·Ï ÀÎÅÍÆäÀ̽º´Â I2NSF Ç¥ÁØÈ­¿¡ Æ÷ÇÔ½ÃŰÁö ¾ÊÀ» ¿¹Á¤ÀÌ´Ù.

 

³×Æ®¿öÅ© º¸¾È ±â´É ÀÎÅÍÆäÀ̽º(I2NSF)

¼º±Õ°ü´ëÇб³¿¡ ¼Ò¼ÓµÈ º»ÀÎÀº ÀüÀÚÅë½Å¿¬±¸¿ø°ú °øµ¿À¸·Î I2NSF ÇÁ·¹ÀÓ¿öÅ©¿Í Á¤º¸ ¸ðµ¨À» ±â¹ÝÀ¸·Î SDN±â¹ÝÀÇ º¸¾È ¼­ºñ½º ¹®¼­¸¦ ¹ßÇ¥Çß´Ù. ¸ÕÀú I2NSFÀ» »ç¿ëÇÏ´Â SDN±â¹ÝÀÇ º¸¾È ¼­ºñ½º¿¡¼­ÀÇ ¸ñÀû ¹× ¿ä±¸»çÇ×À» ±â¼úÇÏ¿´°í, ¾Æ¿ï·¯ Áß¾ÓÁýÁᫎ ¹æÈ­º® ½Ã½ºÅÛ°ú Áß¾ÓÁýÁᫎ DDoS °ø°Ý ¾àÈ­ ½Ã½ºÅÛÀÇ µÎ °¡Áö À¯½ºÄÉÀ̽º¸¦ Á¦½ÃÇÏ¿´´Ù. ´ÙÀ½ ´Ü°è·Î SDN ³×Æ®¿öÅ©¿¡¼­ NETCONF/YANGÀ» ±â¹ÝÀ¸·Î ¹æÈ­º®ÀÇ ¿¹Á¦·Î IP Address FilteringÀ» ±¸ÇöÀ» À§ÇÑ ±â´É °èÃþ ÀÎÅÍÆäÀ̽º¸¦ ±¸ÇöÇÒ ¿¹Á¤ÀÌ´Ù. ¶ÇÇÑ ¼­ºñ½º °èÃþ ÀÎÅÍÆäÀ̽ºÀÇ Á¤º¸ ¸ðµ¨À» À§ÇØ SUPA BoF¿¡¼­ Á¤ÀÇÇÑ Policy AbstractionÀ» ÀÌ¿ëÇÒ ¿¹Á¤ÀÌ´Ù.

 

I2NSF´Â 2015³â 7¿ù¿¡ üÄÚ ÇÁ¶óÇÏ¿¡¼­ °³ÃÖµÈ IETF 93Â÷ ȸÀÇ¿¡¼­ ¿öÅ·±×·ìÀ¸·Î ½Â°ÝÇϱâ À§ÇÑ µÎ ¹øÂ° BoF¿¡¼­´Â I2NSF ÇÁ·¹ÀÓ¿öÅ© ¹®¼­, Gap Analysis ¹®¼­, ¹®Á¦ ±â¼ú ¹®¼­, I2NSF Á¤º¸ ¸ðµ¨ ¹®¼­, À¯½ºÄÉÀ̽º ¹®¼­, °¡´ÉÇÑ ÇØ°á±â¹ý ¹®¼­µéÀÌ ¹ßÇ¥µÇ¾ú°í, I2NSF BoF Charter ÁúÀÇ ¹× ÀÀ´ä°ú ¼öÁ¤¿¡ ´ëÇÑ ³íÀǸ¦ ÇÏ¿´´Ù.

 

°á¾ð

Áö³­ IETF 93Â÷ ȸÀÇ¿¡¼­´Â Âü°¡ÇÑ ¸¹Àº º¸¾È Àü¹®°¡µéÀÌ I2NSFÀÇ Çʿ伺¿¡ µ¿ÀÇÇÏ¿´°í, ¿Ã 9¿ù¿¡ I2NSF´Â ¿öÅ·±×·ìÀ¸·Î ½ÂÀεǾ º»°ÝÀûÀΠǥÁØÈ­ Ȱµ¿À» ½ÃÀÛÇÏ¿´´Ù. ¼º±Õ°ü´ëÇб³¿Í Çѱ¹ÀüÀÚÅë½Å¿¬±¸¿øµµ I2NSF¿¡¼­ SDN±â¹Ý º¸¾È ¼­ºñ½º, ±â´É °èÃþ ÀÎÅÍÆäÀ̽º ¹× YANG±â¹Ý Á¤º¸ ¸ðµ¨¿¡ Àû±ØÀûÀ¸·Î Âü¿©ÇÒ ¿¹Á¤ÀÌ´Ù.

 

Âü°í¹®Çå

[1] I2NSF, https://datatracker.ietf.org/wg/i2nsf/charter/

[2] Á¤ÀçÈÆ, ±èÇü½Ä, ¹ÚÁ¤¼ö, ¡°Software-Defined Networking Based Security Services using Interface to Network Security Functions¡±, draft-jeong-i2nsf-sdn-security-services-02, 2015³â 7¿ù.

[3] ETSI-NFV, ¡°Network Functions Virtualisation (NFV); Architectural Framework¡±, ETSI GS NFV 002 V1.1.1, October 2013.

[4] M. Boucadair and C. Jacquenet, 'Software-Defined Networking: A Perspective from within a Service Provider Environment', RFC 7149, March 2014.

Á¤ÀçÈÆ (¼º±Õ°ü´ëÇб³ ¼ÒÇÁÆ®¿þ¾îÇаú ±³¼ö, pauljeong@skku.edu)

* º» ±ÛÀº ÀúÀÚÀÇ ÀǰßÀÏ »Ó TTA ±â°üÀÇ ÀÔÀå°ú´Â ¹«°üÇÕ´Ï´Ù.