Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 33.866
Word version: 17.0.0
1…
5…
5
Key issues
6
Solutions
7
Conclusions
$
Change history
5
Key issues
p. 9
5.1
Key issues related to securing the data provided to any type of analytics function
p. 9
5.1.1
Key Issue #1.1:Integrity protection of data transferred between AF and NWDAF
p. 9
5.1.1.1
Key issue details
p. 9
5.1.1.2
Security Threats
p. 10
5.1.1.3
Potential Requirements
p. 10
5.1.2
Key Issue #1.2: Processing of tampered data
p. 10
5.1.2.1
Key issue details
p. 10
5.1.2.2
Security threats
p. 10
5.1.2.3
Potential security requirements
p. 11
5.1.3
Key Issue #1.3: Authorization of NF Service Consumers for data access via DCCF
p. 11
5.1.3.1
Key issue details
p. 11
5.1.3.2
Security threats
p. 11
5.1.3.3
Potential security requirements
p. 11
5.1.4
Key Issue #1.4: Security protection of data via Messaging Framework
p. 12
5.1.4.1
Key issue details
p. 12
5.1.4.2
Threats
p. 12
5.1.4.3
Potential security requirements
p. 13
5.1.5
Key Issue #1.5: UE data collection protection at NF/NWDAF
p. 13
5.1.5.1
Key issue details
p. 13
5.1.5.2
Security threats
p. 13
5.1.5.3
Potential security requirements
p. 13
5.2
Key issues related to the detection of cyber-attacks and anomaly events by analytics function
p. 14
5.2.1
Key Issue #2.1: Cyber-attacks detection supported by NWDAF
p. 14
5.2.1.1
Key issue details
p. 14
5.2.1.2
Security threats
p. 14
5.2.1.3
Potential security requirements
p. 14
5.2.2
Key Issue #2.2: Anomalous NF behaviour detection by NWDAF
p. 14
5.2.2.1
Key issue details
p. 14
5.2.2.2
Security threats
p. 15
5.2.2.3
Potential security requirements
p. 15
5.3
Key issues related to data transfer protection
p. 15
5.3.1
Key Issue #3.1: Privacy preservation for transmitted data between multiple NWDAF instances
p. 15
5.3.1.1
Key issue details
p. 15
5.3.1.2
Security threats
p. 15
5.3.1.3
Potential security requirements
p. 16
5.3.2
Key Issue #3.2: Protection of UE data in transit
p. 16
5.3.2.1
Key issue details
p. 16
5.3.2.2
Security Threats
p. 16
5.3.2.3
Potential security requirements
p. 16
5.3.3
Key Issue #3.3: Ensuring restrictive transfer of ML models between authorized NWDAF instances
p. 16
5.3.3.1
Key issue details
p. 16
5.3.3.2
Security Threats
p. 16
5.3.3.3
Potential security requirements
p. 16
6
Solutions
p. 17
6.0
Mapping of solutions to key issues
p. 17
6.1
Solution #1: UE data collection protection
p. 17
6.1.1
Introduction
p. 17
6.1.2
Solution details
p. 18
6.1.3
Evaluation
p. 18
6.2
Solution #2: Network Analysis Framework for DDoS Attack
p. 18
6.2.1
Introduction
p. 18
6.2.2
Solution details
p. 18
6.2.2.1
Introduction
p. 18
6.2.2.2
Network Analysis Framework for DDoS attack
p. 19
6.2.2.3
The Rational of Each Input Data
p. 19
6.2.3
Evaluation
p. 20
6.3
Solution #3: Usage of current SBA mechanisms to protect data in transit
p. 20
6.3.1
Introduction
p. 20
6.3.2
Solution details
p. 20
6.3.3
Evaluation
p. 20
6.4
Solution #4: DCCF determining if NF Service consumer is authorized to invoke a service to a Data Producer NF for data collection
p. 20
6.4.1
Introduction
p. 20
6.4.2
Solution details
p. 20
6.4.2.1
Detailed Procedure
p. 22
6.4.3
Evaluation
p. 23
6.5
Solution #5: Providing the Security protection of data via Messaging Framework
p. 24
6.5.1
Introduction
p. 24
6.5.2
Solution details
p. 24
6.5.2.1
DCCF initiated key refresh procedure
p. 26
6.5.3
Evaluation
p. 27
6.6
Solution #6: Integrity protection of data transferred between AF and NWDAF
p. 27
6.6.1
Introduction
p. 27
6.6.2
Solution details
p. 27
6.6.3
Evaluation
p. 27
6.7
Solution#7: Detection of anomalous NF behaviour by NWDAF
p. 28
6.7.1
Introduction
p. 28
6.7.2
Solution details
p. 28
6.7.2.1
General
p. 28
6.7.2.2
Collection of security related log data of NFs via NFs EventExposure APIs
p. 28
6.7.2.3
Collection of security related log data of NFs via OAM
p. 29
6.7.3
Evaluation
p. 32
6.8
Solution#8: Privacy preservation of transmitted data
p. 32
6.8.1
Introduction
p. 32
6.8.2
Solution details
p. 33
6.8.3
Evaluation
p. 34
6.9
Solution#9: Processing of tampered data
p. 34
6.9.1
Introduction
p. 34
6.9.2
Solution details
p. 34
6.9.3
Evaluation
p. 35
6.10
Solution #10: Authorization of NF Service Consumers for data access via DCCF
p. 36
6.10.1
Introduction
p. 36
6.10.2
Solution details
p. 36
6.10.2.1
Authorization of NF Service Consumer (i.e. Data consumer) when notification sent via DCCF
p. 36
6.10.2.2
Authorization of NF Service Consumer (i.e. Data consumer) when notification sent via MFAF
p. 38
6.10.3
Evaluation
p. 40
6.11
Solution #11: Authorization of NF Service Consumers to access data from ADRF via DCCF
p. 41
6.11.1
Introduction
p. 41
6.11.2
Solution details
p. 41
6.11.3
Evaluation
p. 44
6.12
Solution #12: Solution on Authorization of Data Consumers for data access via DCCF
p. 44
6.12.1
Introduction
p. 44
6.12.2
Solution details
p. 45
6.12.3
Evaluation
p. 47
6.13
Solution #13: Solution for UE data collection protection at NF/NWDAF
p. 47
6.13.1
Introduction
p. 47
6.13.2
Solution details
p. 48
6.13.3
System impact
p. 48
6.13.4
Evaluation
p. 48
6.14
Solution #14: Solution to ML restrictive transfer
p. 48
6.14.1
Introduction
p. 48
6.14.2
Solution details
p. 48
6.14.3
System impact
p. 49
6.14.4
Evaluation
p. 49
6.15
Solution #15: Protection of data sent via MFAF using existing SBA mechanisms
p. 49
6.15.1
Introduction
p. 49
6.15.2
Solution details
p. 49
6.15.3
Evaluation
p. 49
7
Conclusions
p. 49
7.1
Conclusions on Key Issue #1.1
p. 49
7.2
Conclusions on Key Issue #1.2
p. 50
7.3
Conclusions on Key Issue #1.3
p. 50
7.4
Conclusions on Key Issue #1.4
p. 50
7.5
Conclusions on Key Issue #1.5
p. 50
7.6
Conclusions on Key Issue #2.1
p. 50
7.7
Conclusions on Key Issue #2.2
p. 50
7.8
Conclusions on Key Issue #3.1
p. 50
7.9
Conclusions on Key Issue #3.2
p. 50
7.10
Conclusions on Key Issue #3.3
p. 50
$
Change history
p. 51