|
Work item:
|
X.2014 (ex X.dtns)
|
|
Subject/title:
|
Guidelines of using digital twin of network for network security
|
|
Status:
|
Approved on 2026-03-29 [Issued from previous study period]
|
|
Approval process:
|
AAP
|
|
Type of work item:
|
Recommendation
|
|
Version:
|
New
|
|
Equivalent number:
|
-
|
|
Timing:
|
-
|
|
Liaison:
|
SG13, SG20
|
|
Supporting members:
|
China Mobile, China Unicom, China Telecom
|
|
Summary:
|
Digital twin network (DTN) provides a virtual representation of a physical network and may support network applications including security drill [ITU-T Y.3090]. With profound and full-scale understanding of historical, real-time and static network related data, DTN is able to be used as a test bed where various network situations could be sensed; security risk or security devices could be simulated; different security strategies could be generated, tested, optimized and decided. Some network security applications, such as security forecast, security operation, security device manufacture and so on, could be provided in a better and more intelligent way when supported by DTN. DTN has the capability to bring features like verifiability, real-time, crossing-time, visualization to network security applications.
This recommendation specifies requirements and use-cases of DTN to support security related network applications for unified and standardized interoperability and to guide stakeholders to construct, operate, maintain and use digital twin-based network security capabilities.
|
|
Comment:
|
incubation queue
|
|
Reference(s):
|
|
|
Historic references:
|
|
Contact(s):
|
|
| ITU-T A.5 justification(s): |
|
|
|
|
First registration in the WP:
2023-03-06 08:41:14
|
|
Last update:
2026-02-25 18:26:27
|