GVHD :Ths.Hà Văn Kha Ly
SVTH :Mai Thanh Minh
Phan Anh Dũng
!
"#$
"
NGN SECURITY ARCHITECTURE – BEST PRACTI CE
%&'$
!
" #$%&'(#)$
#*+!
"
,-
%"
*." !
#
/ ""+
(
*
(0
12
2
00
NGN SECURI TY ARCHITECTURE – BEST PRACTICE
EXAMPLE
"##!""+
"
#+(- +"+
"
3"(
*+
)4.
,(".
(
EXAMPLE (CONTD.)
# "#5
'67687% 9'6'*."
"
#++ ".:6;" <&'=6/
"0/
# (1*/<. 9>96
?.&:66@"*@
#"ABC,D"A+
#0*
EXAMPLE
#E.
@3( " +7'F7669.
+$7666"" * 1(+
.#".4
A
#".#$ '6768
G:7:(#. (-HD$#"""
(3+-. @/(1@/(<.3"
C
%
#)#
%*
(#)D%6'!
Access Control
Authentication
Non-Repudiation
Data Confidentiality
Communication
Data Integrity
Availability
Privacy
8 Security Dimensions
Management Plane
Control Plane
Vulnerabilities
Threats
Attacks
Destruction
Corruption
Disclosure
Interruption
Removal
Applications Security
Services Security
Infrastructure Security
SECURITY LAYERS
End-User Plane
+<-4
![]()
![]()
![]()
APPIN’S NGN FRAMEWORK
C B"
+2
$++
2 +B<
<
APPIN’S NGN FRAMEWORK FEATURES (ITU-T
REC. X.805)
22
@4
(
(
"
APPIN’S PROPOSED NGN FRAMEWORK
FEATURES
(I+@
(",
0
#
2#"
2
2
CONCERNS OF OPERATOR
•
@+ !
•
##!"
•
+5BJ
•
•
)
•
@
•
(
@+
H+!
EXAMPLE - IMPLEMENTATION
IPSEC AND OSS
8+@.(
+
(++3+"-"
(++3+"-"
"+( <"
(G,.C<
A
IPSEC IMPLEMENTATION
IPSEC IN NGN
IPSEC DPI
$++0("(
G + 0(
.0($(, 0(
,-)// "
+-
G($,)//4
" ,,
IMPLEMENTATION REQUIREMENTS
2+"." <(.
8.+ .-+!
"!<""#+
+5
3+3!
D'6;4--44
+3
IMPLEMENTATION REQUIREMENTS (CONTD.)
#5
(K,
K((# K(!K
K@C.+-
-#@#@!"#)0!
*+4"++
*@*@!