Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0314-Part2 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2018-12-19 ÃÑÆäÀÌÁö 30
ÇѱÛÇ¥Áظí SDN ±â¹ÝÀÇ ³×Æ®¿öÅ© º¸¾È ±â´ÉÀÇ ÀÎÅÍÆäÀ̽º(I2NSF) ÇÁ·¹ÀÓ¿öÅ© - Á¦2ºÎ: º¸¾È ¼­ºñ½º À¯½ºÄÉÀ̽º
¿µ¹®Ç¥Áظí Interface to Network Security Functions (I2NSF) Framework Using Software-Defined Networking - Part2: Security Service Use Cases
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº I2NSF ÇÁ·¹ÀÓ¿öÅ© ±â¹Ý ³×Æ®¿öÅ© º¸¾È ¼­ºñ½ºÀÇ 3°¡Áö À¯½ºÄÉÀ̽º·Î¼­ ½Ã°£ ±â¹Ý À¥ Â÷´Ü, ȸ»ç À¥ ¼­¹ö Á¢±Ù¿¡ ´ëÇÑ DDoS °ø°Ý ¾àÈ­ ¼­ºñ½º, ¾ÇÀÇÀûÀÎ VoIP/VoLTE Æ®·¡ÇÈ Â÷´Ü ¼­ºñ½º¸¦ Á¦½ÃÇÏ°í, °¢ À¯½ºÄÉÀ̽º¿¡ ´ëÇÑ ½Ã³ª¸®¿À, µ¿ÀÛ ÀýÂ÷ ¹× ±¸Çö Äڵ带 ´Ù·ç°í ÀÖ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard shows three use cases of network security services in I2NSF framework, such as time-based web access control, DDoS attack mitigation service for corporate web server access, and malicious VoIP/VoLTE traffic access control service.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0314-part2.pdf TTAK.KO-12.0314-part2.pdf            

ÀÌÀü
SIP ±â¹Ý VoIP ¼­ºñ½º¿¡¼­ DTMF ó¸® ÇÁ·ÎÆÄÀÏ
´ÙÀ½
ÀÎÅÍ³Ý ÅÚ·¹Æ÷´Ï ¼­ºñ½º¸¦ À§ÇÑ ENUM È°¿ë