Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.866  Word version:  17.0.0

Top   Top   Up   Prev   None
1…   5…

 

5  Key issuesp. 9

5.1  Key issues related to securing the data provided to any type of analytics functionp. 9

5.2  Key issues related to the detection of cyber-attacks and anomaly events by analytics functionp. 14

5.3  Key issues related to data transfer protectionp. 15

6  Solutionsp. 17

6.0  Mapping of solutions to key issuesp. 17

6.1  Solution #1: UE data collection protectionp. 17

6.2  Solution #2: Network Analysis Framework for DDoS Attackp. 18

6.3  Solution #3: Usage of current SBA mechanisms to protect data in transitp. 20

6.4  Solution #4: DCCF determining if NF Service consumer is authorized to invoke a service to a Data Producer NF for data collectionp. 20

6.5  Solution #5: Providing the Security protection of data via Messaging Frameworkp. 24

6.6  Solution #6: Integrity protection of data transferred between AF and NWDAFp. 27

6.7  Solution#7: Detection of anomalous NF behaviour by NWDAFp. 28

6.8  Solution#8: Privacy preservation of transmitted datap. 32

6.9  Solution#9: Processing of tampered datap. 34

6.10  Solution #10: Authorization of NF Service Consumers for data access via DCCFp. 36

6.11  Solution #11: Authorization of NF Service Consumers to access data from ADRF via DCCFp. 41

6.12  Solution #12: Solution on Authorization of Data Consumers for data access via DCCFp. 44

6.13  Solution #13: Solution for UE data collection protection at NF/NWDAFp. 47

6.14  Solution #14: Solution to ML restrictive transferp. 48

6.15  Solution #15: Protection of data sent via MFAF using existing SBA mechanismsp. 49

7  Conclusionsp. 49

$  Change historyp. 51


Up   Top