Tech-invite3GPPspaceIETF RFCsSIP
Quick21222324252627282931323334353637384‑5x

Content for  TR 33.866  Word version:  17.0.0

Top   Top   Up   Prev   None
1…   5…

 

5  Key issuesWord‑p. 9

5.1  Key issues related to securing the data provided to any type of analytics functionWord‑p. 9

5.2  Key issues related to the detection of cyber-attacks and anomaly events by analytics functionWord‑p. 14

5.3  Key issues related to data transfer protectionWord‑p. 15

6  SolutionsWord‑p. 17

6.0  Mapping of solutions to key issuesWord‑p. 17

6.1  Solution #1: UE data collection protectionWord‑p. 17

6.1.1  IntroductionWord‑p. 17

6.1.2  Solution detailsWord‑p. 18

6.1.3  EvaluationWord‑p. 18

6.2  Solution #2: Network Analysis Framework for DDoS AttackWord‑p. 18

6.3  Solution #3: Usage of current SBA mechanisms to protect data in transitWord‑p. 20

6.3.1  IntroductionWord‑p. 20

6.3.2  Solution detailsWord‑p. 20

6.3.3  EvaluationWord‑p. 20

6.4  Solution #4: DCCF determining if NF Service consumer is authorized to invoke a service to a Data Producer NF for data collectionWord‑p. 20

6.4.1  IntroductionWord‑p. 20

6.4.2  Solution detailsWord‑p. 20

6.4.3  EvaluationWord‑p. 23

6.5  Solution #5: Providing the Security protection of data via Messaging FrameworkWord‑p. 24

6.6  Solution #6: Integrity protection of data transferred between AF and NWDAFWord‑p. 27

6.6.1  IntroductionWord‑p. 27

6.6.2  Solution detailsWord‑p. 27

6.6.3  EvaluationWord‑p. 27

6.7  Solution#7: Detection of anomalous NF behaviour by NWDAFWord‑p. 28

6.8  Solution#8: Privacy preservation of transmitted dataWord‑p. 32

6.8.1  IntroductionWord‑p. 32

6.8.2  Solution detailsWord‑p. 33

6.8.3  EvaluationWord‑p. 34

6.9  Solution#9: Processing of tampered dataWord‑p. 34

6.9.1  IntroductionWord‑p. 34

6.9.2  Solution detailsWord‑p. 34

6.9.3  EvaluationWord‑p. 35

6.10  Solution #10: Authorization of NF Service Consumers for data access via DCCFWord‑p. 36

6.11  Solution #11: Authorization of NF Service Consumers to access data from ADRF via DCCFWord‑p. 41

6.11.1  IntroductionWord‑p. 41

6.11.2  Solution detailsWord‑p. 41

6.11.3  EvaluationWord‑p. 44

6.12  Solution #12: Solution on Authorization of Data Consumers for data access via DCCFWord‑p. 44

6.12.1  IntroductionWord‑p. 44

6.12.2  Solution detailsWord‑p. 45

6.12.3  EvaluationWord‑p. 47

6.13  Solution #13: Solution for UE data collection protection at NF/NWDAFWord‑p. 47

6.13.1  IntroductionWord‑p. 47

6.13.2  Solution detailsWord‑p. 48

6.13.3  System impactWord‑p. 48

6.13.4  EvaluationWord‑p. 48

6.14  Solution #14: Solution to ML restrictive transferWord‑p. 48

6.14.1  IntroductionWord‑p. 48

6.14.2  Solution detailsWord‑p. 48

6.14.3  System impactWord‑p. 49

6.14.4  EvaluationWord‑p. 49

6.15  Solution #15: Protection of data sent via MFAF using existing SBA mechanismsWord‑p. 49

6.15.1  IntroductionWord‑p. 49

6.15.2  Solution detailsWord‑p. 49

6.15.3  EvaluationWord‑p. 49

7  ConclusionsWord‑p. 49

$  Change historyWord‑p. 51


Up   Top