{"id":401,"date":"2013-03-27T18:04:35","date_gmt":"2013-03-28T03:04:35","guid":{"rendered":"\/blog\/?p=401"},"modified":"2023-09-21T09:38:53","modified_gmt":"2023-09-21T00:38:53","slug":"%eb%84%a4%ed%8a%b8%ec%9b%8c%ed%81%ac-%ea%b3%b5%ea%b2%a9%ea%b8%b0%eb%b2%95%ec%9d%98-%ed%8c%a8%eb%9f%ac%eb%8b%a4%ec%9e%84-%eb%b3%80%ed%99%94%ec%99%80-%eb%8c%80%ec%9d%91%eb%b0%a9%ec%95%88","status":"publish","type":"post","link":"https:\/\/hasu0707.duckdns.org\/blog\/?p=401","title":{"rendered":"\ub124\ud2b8\uc6cc\ud06c \uacf5\uaca9\uae30\ubc95\uc758 \ud328\ub7ec\ub2e4\uc784 \ubcc0\ud654\uc640 \ub300\uc751\ubc29\uc548"},"content":{"rendered":"\n<p><font size=\"2\" face=\"\ub3cb\uc6c0\" style=\"color: rgb(0, 0, 0); line-height: normal;\"><p align=\"center\"><b><font color=\"#CC6600\">\ub124\ud2b8\uc6cc\ud06c \uacf5\uaca9\uae30\ubc95\uc758 \ud328\ub7ec\ub2e4\uc784 \ubcc0\ud654\uc640 \ub300\uc751\ubc29\uc548<\/font><\/b><\/p><p align=\"center\"><b>- Network Attack Paradigm Shift and Its Countermeasure -<\/b><\/p><p align=\"center\"><b>Part I : \ub124\ud2b8\uc6cc\ud06c \uacf5\uaca9\uae30\ubc95\uc758 \ud328\ub7ec\ub2e4\uc784 \ubcc0\ud654 v1.0<\/b><\/p><p>&nbsp;<\/p><p><\/p><p align=\"RIGHT\">\uc774\ud604\uc6b0 \uc5f0\uad6c\uc6d0,&nbsp;<a href=\"mailto:lotus@certcc.or.kr\">lotus@certcc.or.kr<\/a><br \/>CERTCC-KR,&nbsp;<a href=\"mailto:cert@certcc.or.kr\">cert@certcc.or.kr<\/a><br \/><\/p><p align=\"RIGHT\"><br \/><\/p><p><\/p><p><b>Document History<\/b>&nbsp;<br \/><\/p><p>2000. 5. : Part I. \ub124\ud2b8\uc6cc\ud06c \uacf5\uaca9\uae30\ubc95\uc758 \ud328\ub7ec\ub2e4\uc784 \ubcc0\ud654 v0.1<br \/>2000. 11 : Part I. \ub124\ud2b8\uc6cc\ud06c \uacf5\uaca9\uae30\ubc95\uc758 \ud328\ub7ec\ub2e4\uc784 \ubcc0\ud654 v1.0<br \/>Changes : Reference \ubc0f \ub0b4\uc6a9 \ucd94\uac00<\/p><p><\/p><p><b>I. \uc11c\ub860<\/b>&nbsp;<br \/><\/p><p><b>II. \ub124\ud2b8\uc6cc\ud06c\uacf5\uaca9\uae30\ubc95\uc758 \ud328\ub7ec\ub2e4\uc784 \ubcc0\ud654<\/b><\/p><p>1. \uc804\ud1b5\uc801\uc778 \uacf5\uaca9\uae30\ubc95<\/p><p>1.1 \uc815\ubcf4\uc218\uc9d1 \ub2e8\uacc4<br \/>1.2 \uc2dc\uc2a4\ud15c \uce68\uc785 \ub2e8\uacc4<br \/>1.3 \uacf5\uaca9\uc804\uc774 \ub2e8\uacc4<br \/>1.4 \uc804\ud1b5\uc801\uc778 \uacf5\uaca9\uae30\ubc95\uc758 \ud2b9\uc9d5<\/p><p>2. \uc0c8\ub85c\uc6b4 \uacf5\uaca9 \uae30\ubc95<\/p><p>2.1 \ubc31\uc624\ub7ec\ud53c\uc2a4<br \/>2.2 \ub124\ud2b8\uc6cc\ud06c \uc2a4\uce90\ub2dd<br \/>2.3 \uc778\ud130\ub137 \uc6dc<br \/>2.4 \ubc31\ub3c4\uc5b4<br \/>2.5 \uc545\uc131 \uc5d0\uc774\uc804\ud2b8<br \/>2.6 \uc0ac\ud68c\uacf5\ud559\uae30\ubc95(Social Engineering)<br \/>2.7 \uc0c8\ub85c\uc6b4 \uacf5\uaca9\uae30\ubc95\uc758 \ud2b9\uc9d5<\/p><p>3. \uc0c8\ub85c\uc6b4 \uacf5\uaca9\uae30\ubc95\uc758 \ubc1c\uc804\ubc29\ud5a5<\/p><p><b>[Reference]<\/b><\/p><p><\/p><p><b>I. \uc11c\ub860<\/b><\/p><p>\uc5f0\uad6c\uc640 \uad70\uc0ac \ubaa9\uc801\uc73c\ub85c \ubc1c\uc804\ud55c \uc778\ud130\ub137\uc740 \ud604\uc7ac \ub9ce\uc740 \uae30\uc5c5\ub4e4\uacfc \uc77c\ubc18\uc778\ub4e4\uc774 \uc0ac\uc6a9\ud558\uac8c \ub418\uc5c8\uace0 \ud604\ub300 \uc0ac\ud68c\uc5d0\uc11c \uc911\uc694\ud55c \uae30\ubc18\uc73c\ub85c \uc790\ub9ac\uc7a1\uac8c \ub418\uc5c8\ub2e4. \ub354\ubd88\uc5b4 \ubcf4\uc548\ubb38\uc81c\uac00 \uc778\ud130\ub137 \uc0ac\ud68c\uc5d0 \ub07c\uce58\ub294 \uc601\ud5a5\uc774 \ucee4\uc9d0\uc5d0 \ub530\ub77c \ubcf4\ub2e4 \ub9ce\uc740 \uce68\uc785\uc790\ub4e4\uc774 \ud604\uc7ac\uc758 \ubcf4\uc548\ubaa8\ub378\uc758 \ucde8\uc57d\uc810\uc744 \uacf5\uaca9\ud558\ub824 \ud558\uace0 \uc788\uc73c\uba70, \uacf5\uaca9\uc6a9 \ud504\ub85c\uadf8\ub7a8 \ub610\ud55c \ubcf4\ub2e4 \ubcf5\uc7a1\ud558\uace0 \uc815\uad50\ud574 \uc9c0\uace0 \uc788\ub2e4. \uc989 \uc778\ud130\ub137\uc758 \uc0c1\uc6a9\ud654 \ubc0f \uc601\ud5a5\ub825\uc774 \ucee4\uc9d0\uc5d0 \ub530\ub77c \uce68\uc785\uc790\ub4e4\uc774 \uc790\uc2e0\ub4e4\uc758 \ubb34\uae30\ub97c \uc815\uad50\ud788 \ub9cc\ub4e4\ub9cc\ud55c \ub3d9\uae30\ub97c \uac16\uac8c \ub41c \uac83\uc774\ub2e4.<\/p><p><b><i>\"\ub124\ud2b8\uc6cc\ud06c \uacf5\uaca9\uae30\ubc95\uc758 \ud328\ub7ec\ub2e4\uc784 \ubcc0\ud654\"<\/i><\/b>\ub294 \uc774\ubbf8 \uc5b8\ub354\uadf8\ub77c\uc6b4\ub4dc\uc5d0\uc11c\ub294 \uc2dc\uc791\ub418\uc5c8\uc73c\uba70, \ucd5c\uadfc Yahoo, amazon \ub4f1 \uc720\uba85 \uc804\uc790\uc0c1\uac70\ub798 \uc0ac\uc774\ud2b8\uc5d0 \ub300\ud55c \ubd84\uc0b0 \uc11c\ube44\uc2a4\uac70\ubd80\uacf5\uaca9(DDOS, Distributed Denial Of Service)\uc5d0\uc11c \uc0ac\uc6a9\ub41c \uacf5\uaca9\ub3c4\uad6c\uc5d0\uc11c \uc798 \ub098\ud0c0\ub098\uace0 \uc788\ub2e4. \ub610\ud55c \uc774\ub294 \ud604\uc7ac\uc758 \ubcf4\uc548\ubaa8\ub378\uc5d0 \ub300\ud55c \ubb38\uc81c\ub97c \ubcf4\uc5ec \uc900\ub2e4. \uc774\ub7ec\ud55c \ubcc0\ud654\ub294 \uc0c8\ub85c\uc6b4 \uacf5\uaca9\ub3c4\uad6c\uc758 \ud615\ud0dc \ubc0f \uacf5\uaca9 \uba54\ucee4\ub2c8\uc998\uc744 \ubd84\uc11d\ud568\uc73c\ub85c\uc11c \uc54c \uc218 \uc788\ub2e4.<\/p><p>\uc608\uc804\uc5d0\ub294 \ub2e8\uc21c\ud788 \ud2b9\uc815 \uc2dc\uc2a4\ud15c\uc758 \ubc84\uadf8\ub97c \uacf5\uaca9\ud558\ub294 \ub3c4\uad6c \ubc0f \uc774\ub7ec\ud55c \ucde8\uc57d\uc810\uc744 \ucc3e\uc544\uc8fc\ub294 \uc2a4\uce94 \uacf5\uaca9\ub3c4\uad6c\ub4e4\uc774 \uc8fc\ub958\ub97c \uc774\ub8e8\uc5c8\ub2e4. \uadf8\ub9ac\uace0 \uc880\ub354 \ub098\uc544\uac00 \ud30c\uc774\uc5b4\uc6d4 \uc2dc\uc2a4\ud15c \ubc0f \uae30\ud0c0 \ubcf4\uc548\uc2dc\uc2a4\ud15c\uc744 \uc6b0\ud68c\ud558\uae30 \uc704\ud55c \uc880\ub354 \uc9c4\ubcf4\ub41c \uc885\ub958\uc758 \uacf5\uaca9\ub3c4\uad6c\ub4e4\uc774 \ub098\ud0c0\ub0ac\ub2e4. \ud558\uc9c0\ub9cc \ucd5c\uadfc\uc5d0\ub294 \ubc31\uc624\ub7ec\ud53c\uc2a4\ub85c \ub300\ud45c\ub418\ub294 \ud2b8\ub85c\uc774\uc794\ubaa9\ub9c8, \uadf8\ub9ac\uace0 \uc778\ud130\ub137 \uc6dc(Worm), \ubc31\ub3c4\uc5b4 \ud615\ud0dc\uc758 \uacf5\uaca9\ub3c4\uad6c\uac00 \ub9ce\uc774 \ub4f1\uc7a5\ud558\uace0 \uc788\uc73c\uba70, \uc774\uc911 \uc77c\ubd80 \uacf5\uaca9\ub3c4\uad6c\ub4e4\uc740 \uc6d0\uaca9 \uc81c\uc5b4\uac00 \uac00\ub2a5\ud558\ub2e4. \ucd5c\uadfc\uc5d0 \ubc1c\uacac\ub418\ub294 \uacf5\uaca9\ub3c4\uad6c\uc758 \ud2b9\uc9d5\uc744 \uc885\ud569\ud574 \ubcf4\uba74 \uc740\ub2c9\ud654(Stealth)\ud654 \ubd84\uc0b0\ud654(Distributed), \uc5d0\uc774\uc804\ud2b8\ud654(agent)\uadf8\ub9ac\uace0 \uc790\ub3d9\ud654(Automation)\uc758 \ud2b9\uc9d5\uc744 \uac00\uc9c0\uace0 \uc788\ub2e4.<\/p><p>\uae30\uc874\uc758 \uacf5\uaca9\ubc29\ubc95\uc740 \uc774\ubbf8 \uc798 \uc54c\ub824\uc838 \uc788\uc5b4 \uce68\uc785\ud0d0\uc9c0\uc2dc\uc2a4\ud15c \ub4f1\uc744 \uc774\uc6a9\ud558\uc5ec \uacf5\uaca9\ud328\ud134\uc5d0 \ub300\ud55c \ud0d0\uc9c0\uac00 \uac00\ub2a5\ud558\uc600\uace0 \ubcf4\uc548\uc2dc\uc2a4\ud15c\uad6c\ucd95\uc744 \ud1b5\ud558\uc5ec \uc801\uc808\ud788 \ubc29\uc5b4\ud560 \uc218 \uc788\uc5c8\ub2e4. \uc774\ub7ec\ud55c \ubcf4\uc548\uae30\uc220\uc758 \ubc1c\uc804\uacfc \ub354\ubd88\uc5b4 \uc774\ub97c \uadf9\ubcf5\ud558\uae30 \uc704\ud55c \uacf5\uaca9\uae30\uc220 \ub610\ud55c \ubc1c\uc804\ud558\uc600\uace0 \uc704\uc5d0\uc11c \uc5b8\uae09\ud55c \uc0c8\ub85c\uc6b4 \uacf5\uaca9\ubaa8\ub378\uc774 \ub4f1\uc7a5\ud558\uc600\ub2e4. \uc0c8\ub85c\uc6b4 \uacf5\uaca9\ubaa8\ub378\uc5d0\uc11c\ub294 \ubcf4\ub2e4 \ubcf5\uc7a1\ud55c \uacf5\uaca9 \ud0d0\uc9c0 \uae30\ubc95\uc774 \ud544\uc694\ud558\uba70, \uadf8 \ub300\uc751\ubc29\ubc95\uc5d0 \ub300\ud55c \ubcc0\ud654\ub97c \uc694\uad6c\ud55c\ub2e4. \ubc18\uba74 \uacf5\uaca9\uc790 \uc785\uc7a5\uc5d0\uc11c\ub294 \uacf5\uaca9\ub3c4\uad6c\uc758 \uc790\ub3d9\ud654\ub85c \uc778\ud558\uc5ec \uacf5\uaca9\uae30\uc220\uc774 \ub300\uc911\ud654\ub418\uace0 \uc788\uc73c\uba70, \ub530\ub77c\uc11c \uc778\ud130\ub137 \uacf5\uaca9\uc774 \uc810\uc810 \ub9ce\uc544\uc9c0\uace0 \uc788\ub2e4. \ud558\uc9c0\ub9cc \uc18c\uc704 \"Real Attack\"\uc744 \uc704\ud574\uc11c\ub294 \uacf5\uaca9\uc790 \uc5ed\uc2dc \uc608\uc804\uc758 \"Script Kiddies\"\uc758 \uacf5\uaca9\uacfc\ub294 \ub2e4\ub978 \ubcf4\ub2e4 \uace0\ub09c\uc704\ub3c4\uc758 \uae30\uc220\uc744 \uc694\uad6c\ud55c\ub2e4.<\/p><p><b><i>\"\uc55e\uc73c\ub85c \ub2e4\uac00\uc62c \ub124\ud2b8\uc6cc\ud06c \uacf5\uaca9\uc740 \uadf8 \uc804\ud30c\uc18d\ub3c4\uac00 \ube60\ub974\uace0 \ub300\uaddc\ubaa8 \uc801\uc774\uba70 \ubcf4\uc774\uc9c0 \uc54a\ub294 \uacf5\uaca9\uc774 \ub420 \uac83\uc774\uba70, \uc774\uc5d0 \ub300\ud55c \ub300\uc751\uc740 \ub9e4\uc6b0 \uc2dc\uae09\ud558\ub2e4. \uad6c\uccb4\uc801\uc774\uace0 \ube60\ub978 \ud574\uacb0\ucc45\uc774 \ud544\uc694\ud558\uba70, \uc774\ub7ec\ud55c \ud574\uacb0\ucc45\uc740 \ud604\uc874\ud558\ub294 \ubcf4\uc548\ubb38\uc81c\ub97c \ud3ec\ud568\ud558\uc5ec \uc55e\uc73c\ub85c \ubc1c\uc0dd\ud560 \uc7a0\uc7ac\uc801\uc778 \uc704\ud611\uc744 \ub9c9\uc744 \uc218 \uc788\uc5b4\uc57c \ub9cc \ud55c\ub2e4\"<\/i><\/b><\/p><p>\ubcf8 \ubb38\uc11c\uc5d0\uc11c\ub294 \uba3c\uc800 \uacf5\uaca9\uae30\ubc95\uc758 \uc0c8\ub85c\uc6b4 \ud328\ub7ec\ub2e4\uc784 \ubcc0\ud654\ub97c \ubcf4\uae30 \uc804\uc5d0 \uae30\uc874\uc758 \uc804\ud1b5\uc801\uc778 \uacf5\uaca9\uae30\ubc95\uc5d0 \ub300\ud558\uc5ec \uc124\uba85\ud55c\ub2e4. \uadf8\ub9ac\uace0 \uc5d0\uc774\uc804\ud2b8\ud654, \uc790\ub3d9\ud654, \ubd84\uc0b0\ud654, \uc740\ub2c9\ud654\uc758 \ud2b9\uc9d5\uc73c\ub85c \uad6c\ubd84\ub418\ub294 \ucd5c\uadfc\uc758 \uacf5\uaca9\uae30\ubc95 \ubcc0\ud654\uc5d0 \ub300\ud558\uc5ec \uc5b8\uae09\ud558\uace0 \uadf8\uc5d0 \ub300\ud55c \ub300\ucc45\uc744 \uc124\uba85\ud558\uace0\uc790 \ud55c\ub2e4.<\/p><p><\/p><hr noshade=\"\" size=\"1\"><\/font><span style=\"color: rgb(0, 0, 0); font-family: Gulim; font-size:12pt; line-height: normal;\"><\/span><p align=\"right\" style=\"color: rgb(0, 0, 0); font-family: Gulim; font-size:12pt; line-height: normal;\"><font size=\"2\" face=\"\ub3cb\uc6c0\"><a href=\"http:\/\/www.superuser.co.kr\/security\/certcc\/attack-shift-part1v1.0.htm#top\">Top<\/a><\/font><\/p><font size=\"2\" face=\"\ub3cb\uc6c0\" style=\"color: rgb(0, 0, 0); line-height: normal;\"><p><\/p><p><b>II. \ub124\ud2b8\uc6cc\ud06c \uacf5\uaca9\uae30\ubc95\uc758 \ud328\ub7ec\ub2e4\uc784 \ubcc0\ud654<\/b><\/p><p><b>1. \uc804\ud1b5\uc801\uc778 \uacf5\uaca9 \uae30\ubc95<\/b><\/p><p>\uc804\ud1b5\uc801\uc778 \ub124\ud2b8\uc6cc\ud06c \uacf5\uaca9\uc740 \uadf8 \uc808\ucc28 \ubc0f \uae30\ubc95\uc774 \uc774\ubbf8 \uc798 \uc54c\ub824\uc838 \uc788\uc5b4 \uc7a0\uc7ac\uc801\uc778 \ucde8\uc57d\uc810\uc744 \ubc29\uc5b4\ud558\uae30 \uc704\ud55c \uc218\ub2e8\uc774 \ub9ce\uc774 \uac15\uad6c\ub418\uc5b4 \uc654\ub2e4. \uc77c\ubc18\uc801\uc778 \uacf5\uaca9\uc808\ucc28\ub294 \uac00\uc7a5\uba3c\uc800 \uacf5\uaca9\ub300\uc0c1\uc5d0 \ub300\ud55c \"\uc815\ubcf4\uc218\uc9d1 \ub2e8\uacc4\"\uc774\uba70, \uadf8 \ub2e4\uc74c \uc218\uc9d1\ud55c \uc815\ubcf4\ub97c \ubc14\ud0d5\uc73c\ub85c \"\uc2dc\uc2a4\ud15c \uce68\uc785 \ub2e8\uacc4\"\ub97c \uac70\uce58\uac8c \ub41c\ub2e4. \uadf8\ub9ac\uace0 \uc9c0\uc18d\uc801\uc778 \uce68\uc785 \ubc0f \ub2e4\ub978 \uc2dc\uc2a4\ud15c\uc758 \uacf5\uaca9\uc744 \uc704\ud55c \"\uacf5\uaca9 \uc804\uc774 \ub2e8\uacc4\"\ub97c \uac70\uce58\uac8c \ub41c\ub2e4<b>[1]<\/b>.<\/p><p><font color=\"#336699\">1.1 \uc815\ubcf4\uc218\uc9d1 \ub2e8\uacc4<\/font><\/p><p>\uc815\ubcf4\uc218\uc9d1\uc740 \ub124\ud2b8\uc6cc\ud06c \uacf5\uaca9\uc758 \uccab \ubc88\uc9f8 \ub2e8\uacc4\ub85c \uacf5\uaca9\ub300\uc0c1 \ub124\ud2b8\uc6cc\ud06c\uc5d0 \ub300\ud55c \uc815\ubcf4\ub97c \ud30c\uc545\ud558\ub294 \uac83\uc774\ub2e4. \uc8fc\ub85c \ub124\ud2b8\uc6cc\ud06c \ud1a0\ud3f4\ub7ec\uc9c0, \uc2dc\uc2a4\ud15c OS, \ub124\ud2b8\uc6cc\ud06c \uc7a5\uce58\uc758 \uc885\ub958, \uadf8\ub9ac\uace0 WWW, FTP \ub4f1 \uacf5\uaca9\ub300\uc0c1 \ub124\ud2b8\uc6cc\ud06c\uac00 \uc81c\uacf5\ud558\ub294 \uc11c\ube44\uc2a4\uc640 \ubc84\uc804 \uc815\ubcf4\ub97c \uc218\uc9d1\ud55c\ub2e4. \uc815\ubcf4\uc218\uc9d1 \ubc29\ubc95\uc740 \uc2a4\uce94 \uacf5\uaca9\ub3c4\uad6c\ub97c \uc774\uc6a9\ud558\ub294 \uac83\uc5d0\uc11c\ubd80\ud130, \ub2e4\uc591\ud55c \ub124\ud2b8\uc6cc\ud06c \uc11c\ubc84\uac00 \uc81c\uacf5\ud558\ub294 \uc815\ubcf4\ub97c \uc218\uc9d1\ud558\ub294 \ubc29\ubc95\uc5d0 \uc774\ub974\uae30\uae4c\uc9c0 \uc0c1\ub2f9\ud788 \ub2e4\uc591\ud558\uba70, \ud30c\uc774\uc5b4\uc6d4\uc744 \uc6b0\ud68c\ud560 \uc218 \uc788\ub294 \ubc29\ubc95\ub3c4 \uc874\uc7ac\ud55c\ub2e4.<b>[2]<\/b><\/p><p><font color=\"#336699\">1.1.1 \uc2dc\uc2a4\ud15c \ubc0f \uc11c\ube44\uc2a4 \ud0d0\uc9c0<\/font><\/p><p>\uacf5\uaca9 \ub300\uc0c1 \ub124\ud2b8\uc6cc\ud06c\uc5d0 \uc2dc\uc2a4\ud15c\uc774 \uc788\ub294\uc9c0\ub97c \ud30c\uc545\ud558\uae30 \uc704\ud558\uc5ec \uc77c\ubc18\uc801\uc73c\ub85c \"Ping\"\uc744 \uc774\uc6a9\ud55c \uacf5\uaca9\ub3c4\uad6c\ub97c \uc0ac\uc6a9\ud55c\ub2e4. \ub610\ud55c DNS \uc11c\ubc84\ub97c \uc870\ud68c\ud558\uc5ec \uc5b4\ub5a0\ud55c \uc2dc\uc2a4\ud15c\uc774 \uc788\ub294\uc9c0\ub97c \ud30c\uc545\ud560 \uc218\ub3c4 \uc788\ub2e4. \uc2dc\uc2a4\ud15c\uc758 \uc874\uc7ac\uc5ec\ubd80\uc5d0 \ub300\ud55c \uc815\ubcf4\uc218\uc9d1\uc774 \ub05d\ub098\uba74, \uac01 \uc2dc\uc2a4\ud15c\uc774 \uc5b4\ub5a0\ud55c \uc11c\ube44\uc2a4\ub97c \uc81c\uacf5\ud558\uace0 \uc788\ub294\uc9c0\ub97c \uc810\uac80\ud558\uae30 \uc704\ud574 \uc5f4\ub824\uc9c4 \ud3ec\ud2b8\ub97c \uc810\uac80\ud55c\ub2e4. \ud2b9\ud788 \ubc84\uadf8\uac00 \uc788\ub294 \uc11c\ube44\uc2a4\ub97c \uc9d1\uc911\uc801\uc73c\ub85c \uc870\uc0ac\ud558\uac8c\ub418\uba70, \uc774\ub7ec\ud55c \uacfc\uc815\uc740 Sscan, Mscan, vanilla scanner \ub4f1 \"\ucde8\uc57d\uc810 \uc2a4\uce90\ub108\" \ub610\ub294 \"\ud3ec\ud2b8 \uc2a4\uce90\ub108\"\ub77c\ub294 \uc790\ub3d9\ud654\ub41c \uacf5\uaca9\ub3c4\uad6c\ub97c \uc774\uc6a9\ud55c\ub2e4<b>[3]<\/b>. \uc77c\ubc18\uc801\uc73c\ub85c \uc2dc\uc2a4\ud15c\uc758 \uc874\uc7ac\uc5ec\ubd80\uc640 \uc11c\ube44\uc2a4\uc5d0 \ub300\ud55c \uc2a4\uce94\uc740 \ub3d9\uc2dc\uc5d0 \uc774\ub8e8\uc5b4\uc9c4\ub2e4.<\/p><p><font color=\"#336699\">1.1.2 OS \ud0d0\uc9c0<\/font><\/p><p>\uc880\ub354 \uc138\ubc00\ud55c \uacf5\uaca9\uc744 \uc704\ud558\uc5ec \ud574\ub2f9 \uc2dc\uc2a4\ud15c\uc758 OS \ubc84\uc804\uc5d0 \ub300\ud55c \uc815\ubcf4\uc218\uc9d1\uc744 \ud55c\ub2e4. OS \ubc84\uc804\uc744 \ud0d0\uc9c0\ud558\ub294 \uae30\uc220\uc740 \"IP stack fingerprinting\" \uc774\ub77c\ub294 \ud2b9\uc131\uc744 \uc774\uc6a9\ud55c\ub2e4. \uc2dc\uc2a4\ud15c\uc5d0 \ub530\ub77c IP stack\uc758 \uad6c\ud604\uc774 \ub2e4\ub978 \uc810\uc744 \uc774\uc6a9\ud558\uc5ec, \ud2b9\uc815 \ud328\ud0b7\uc744 \ub9cc\ub4e4\uc5b4 \ubcf4\ub0b4\uc5b4 \uadf8 \uc751\ub2f5\uc5d0 \ub530\ub77c \uc2dc\uc2a4\ud15c\uc744 \uad6c\ubcc4\ud574\ub0b4\ub294 \ubc29\ubc95\uc774\ub2e4<b>[4]<\/b>. \ub300\ud45c\uc801\uc778 \ub3c4\uad6c\ub85c\ub294 queso<b>[5]<\/b>, nmap\uc744 \ub4e4 \uc218 \uc788\ub2e4.<\/p><p><font color=\"#336699\">1.1.3 \ub124\ud2b8\uc6cc\ud06c \ud1a0\ud3f4\ub7ec\uc9c0\/\ud30c\uc774\uc5b4\uc6d4 \ud544\ud130\ub9c1\uaddc\uce59 \ud0d0\uc9c0<\/font><\/p><p>\ub124\ud2b8\uc6cc\ud06c \ud3ec\ud3f4\ub7ec\uc9c0\ub294 \ud638\uc2a4\uac04\uc758 \uac70\ub9ac\ub97c \ub098\ud0c0\ub0b4\ub294 \"hop count\"\ub97c \uc774\uc6a9\ud558\uc5ec \uc54c\uc544\ub0bc \uc218 \uc788\uc73c\uba70, \"traceroute\" \ud504\ub85c\uadf8\ub7a8\uc744 \uc751\uc6a9\ud55c \uacf5\uaca9\ub3c4\uad6c\ub97c \uc774\uc6a9\ud55c\ub2e4. \ub610\ud55c \ud30c\uc774\uc5b4\uc6d4\uc5d0 \uc758\ud574 \ubcf4\ud638\ub418\ub294 \uc2dc\uc2a4\ud15c\uc5d0 \ub300\ud55c \uc815\ubcf4 \ubc0f \ud30c\uc774\uc5b4\uc6d4 \uc790\uccb4\uc758 \ud544\ud130\ub9c1 \uaddc\uce59 \uc815\ubcf4\ub97c \uc218\uc9d1\ud558\ub294 \ubc29\ubc95\ub3c4 \uc874\uc7ac\ud55c\ub2e4. \uc774\ub7ec\ud55c \uacf5\uaca9\uc740 \ub300\ubd80\ubd84\uc758 \ud30c\uc774\uc5b4\uc6d4\uc774 \ud544\ud130\ub9c1\ud558\uc9c0 \uc54a\ub294 \ud2b9\uc815 ICMP type \ud328\ud0b7\uc774\ub098 udp\ub97c \uc774\uc6a9\ud55c traceroute \ud328\ud0b7\uc744 \uc774\uc6a9\ud558\uba70, \ub300\ud45c\uc801\uc778 \uacf5\uaca9\ub3c4\uad6c\ub85c\ub294 Firewalk<b>[6]<\/b>, hping<b>[7]<\/b>, nmap<b>[8]<\/b>&nbsp;\ub4f1\uc774 \uc788\ub2e4.<\/p><p><font color=\"#336699\">1.1.4 \ub124\ud2b8\uc6cc\ud06c \uc11c\ubc84\uc758 \uc815\ubcf4 \uc218\uc9d1<\/font><\/p><p>DNS, SNMP, Sednmail, NetBIOS \ub4f1 \uc77c\ubc18 \ub124\ud2b8\uc6cc\ud06c \uc11c\ubc84\uac00 \uc81c\uacf5\ud558\ub294 \uc815\ubcf4\ub97c \uc218\uc9d1\ud558\uc5ec \uacf5\uaca9\uc5d0 \uc720\uc6a9\ud558\uac8c \uc0ac\uc6a9\ud560 \uc218 \uc788\ub2e4. DNS\uc758 \uacbd\uc6b0 \"zone transfer\" \ub610\ub294 \uc77c\ubc18\uc801\uc778 query\ub97c \uc774\uc6a9\ud558\uc5ec \ub4f1\ub85d\ub41c \ud638\uc2a4\ud2b8\uc758 \uc815\ubcf4\ub97c \uc54c \uc218 \uc788\uc73c\uba70, \uc798\ubabb \uc124\uc815\ub41c SNMP\ub294 \ub124\ud2b8\uc6cc\ud06c\uc758 \ud1a0\ud3f4\ub7ec\uc9c0 \ubc0f \uac01 \uc885 \ub124\ud2b8\uc6cc\ud06c \uc815\ubcf4\ub97c \uc54c\ub824\uc900\ub2e4. \ub610\ud55c \ub77c\uc6b0\ud130\ub97c \ud1b5\ud558\uc5ec \uc911\uc694\ud55c \uc815\ubcf4\ub97c \uc54c\uc544\ub0bc \uc218 \uc788\ub294 \ubc29\ubc95\ub3c4 \uc874\uc7ac\ud55c\ub2e4.<\/p><p>\"\uc815\ubcf4\uc218\uc9d1\ub2e8\uacc4\"\ub294 \uacf5\uaca9\ub300\uc0c1 \ub124\ud2b8\uc6cc\ud06c\uc5d0 \uc5b4\ub5a0\ud55c \ud638\uc2a4\ud2b8\uac00 \uc788\uc73c\uba70, \uc774 \ud638\uc2a4\ud2b8\uac00 \uc5b4\ub5a0\ud55c \uc11c\ube44\uc2a4\ub97c \uc81c\uacf5\ud558\ub294\uac00, \uadf8\ub9ac\uace0 \ub124\ud2b8\uc6cc\ud06c\uac00 \uc5b4\ub5bb\uac8c \uad6c\uc131\ub418\uc5b4 \uc788\ub294\uac00\ub97c \ud30c\uc545\ud558\uc5ec \ucd5c\uc885 \uacf5\uaca9 \ub300\uc0c1\uc744 \ucc3e\uc544\ub0b4\ub294 \ub2e8\uacc4\uc774\ub2e4.<\/p><p><font color=\"#336699\">1.2 \uc2dc\uc2a4\ud15c \uce68\uc785 \ub2e8\uacc4<\/font><\/p><p>\uc2dc\uc2a4\ud15c \uce68\uc785\ub2e8\uacc4\ub294 \uc2e4\uc81c \uac1c\ubcc4 \uc2dc\uc2a4\ud15c\uc5d0 \uce68\uc785\ud558\ub294 \ub2e8\uacc4\ub85c \uc815\ubcf4\uc218\uc9d1\ub2e8\uacc4\uc5d0\uc11c \uc218\uc9d1\ud55c \uc815\ubcf4\ub97c \ubc14\ud0d5\uc73c\ub85c \uac00\uc7a5 \ucde8\uc57d\ud55c \ubd80\ubd84\uc744 \uacf5\uaca9\ud558\uac8c \ub41c\ub2e4. \uc77c\ubc18\uc801\uc73c\ub85c \ubc84\uadf8\uac00 \uc788\ub294 \ub124\ud2b8\uc6cc\ud06c \uc11c\ubc84\ub97c \uacf5\uaca9\ud558\uac8c \ub418\ub294\ub370 sadmind, amd, amountd, statd, POP, Imap \ub4f1 \uac01\uc885 \uc11c\ubc84\uc758 \uc6d0\uaca9 \ubc84\ud37c\uc624\ubc84\ud50c\ub85c\uc6b0(buffer overflow) \ucde8\uc57d\uc810<b>[9]<\/b>\uc744 \uacf5\uaca9\ud55c\ub2e4. \uadf8\ubc16\uc5d0 \uc11c\ubc84\uc758 \uc124\uc815 \uc624\ub958\ub97c \uc774\uc6a9\ud558\ub294 \ubc29\ubc95\ub3c4 \uc788\uc73c\uba70, \ud328\uc2a4\uc6cc\ub4dc \ud30c\uc77c\uc744 \ud68d\ub4dd\ud55c \uacbd\uc6b0\uc5d0\ub294 \"crack\"\uc774\ub77c\ub294 \uacfc\uc815\uc744 \uac70\uccd0 \ud328\uc2a4\uc6cc\ub4dc\ub97c \ud574\ub3c5\ud558\uc5ec \uce68\uc785\ud560 \uc218\ub3c4 \uc788\ub2e4.<\/p><p>\uc2dc\uc2a4\ud15c \uce68\uc785\ub2e8\uacc4\uc5d0 \uc0ac\uc6a9\ub418\ub294 \ubc29\ubc95\uc740 \uc774\ubbf8 \uc798 \uc54c\ub824\uc838 \uc788\uace0 \ub9ce\uc740 \uacf5\uaca9\ub3c4\uad6c\ub4e4\uc774 \uacf5\uac1c\ub418\uc5b4 \uc788\uc73c\uba70 \uccb4\uacc4\ud654\ub418\uc5b4 \uc788\ub2e4<b>[10]<\/b>. \ub530\ub77c\uc11c \uc2dc\uc2a4\ud15c\/\ub124\ud2b8\uc6cc\ud06c\uc5d0 \ub300\ud574 \uae4a\uc740 \uc9c0\uc2dd\uc774 \uc5c6\ub294 \uc18c\uc704 \"Script kiddies\"\ub77c \ubd88\ub9ac\ub294 \ud574\ud0b9 \uad00\uc2ec\uc790\ub4e4\ub3c4 \ub204\uad6c\ub098 \uc190\uc27d\uac8c \uc2dc\uc2a4\ud15c\uc5d0 \uce68\uc785\ud560 \uc218 \uc788\ub2e4.<\/p><p><font color=\"#336699\">1.3 \uacf5\uaca9\uc804\uc774 \ub2e8\uacc4<\/font><\/p><p>\"\uacf5\uaca9\uc804\uc774 \ub2e8\uacc4\"\ub294 1\ucc28\uc801\uc778 \uc2dc\uc2a4\ud15c \uce68\uc785 \uc774\ud6c4\uc5d0 \uc77c\uc5b4\ub098\ub294 \uce68\uc785\uc744 \ub9d0\ud558\ub294\ub370, 1\ucc28\uc801\uc778 \uce68\uc785\uc73c\ub85c\ubd80\ud130 \uc5bb\uc740 \uc815\ubcf4 \ubc0f \ucd94\uac00 \uc791\uc5c5\uc744 \ud1b5\ud558\uc5ec \uc2dc\uc2a4\ud15c \uce68\uc785\uc744 \ud655\ub300\ud558\uace0 \ub2e4\ub978 \uc2dc\uc2a4\ud15c\uc5d0 \uce68\uc785\ud558\ub294 \ub2e8\uacc4\uc774\ub2e4.<\/p><p>\uc77c\ub2e8 \uc2dc\uc2a4\ud15c \uce68\uc785\uc774 \uc131\uacf5\ud558\uace0 \ub098\uba74 \uacf5\uaca9\uc790\ub294 \uc2dc\uc2a4\ud15c \uce68\uc785\ud754\uc801\uc744 \uc81c\uac70\ud558\uac8c \ub41c\ub2e4. \ub610\ud55c \uc815\ubcf4\uc218\uc9d1\ub2e8\uacc4\ub85c \uc778\ud558\uc5ec \ub0a8\uc740 \ud754\uc801\ub3c4 \uc81c\uac70\ud558\uac8c \ub41c\ub2e4. \ub610\ud55c \uc77c\ubc18 \uacc4\uc815\uc73c\ub85c \uce68\uc785\ud55c \uacbd\uc6b0\uc5d0\ub294 \ucda9\ubd84\ud55c \uad8c\ud55c(\uc720\ub2c9\uc2a4\uc758 \uacbd\uc6b0 root \uad8c\ud55c)\uc744 \uac16\uae30 \uc704\ud558\uc5ec \ub85c\uceec \uc2dc\uc2a4\ud15c\uc758 \ucde8\uc57d\uc810\uc744 \uacf5\uaca9\ud558\uac8c \ub418\ub294\ub370, \ub300\ubd80\ubd84\uc758 \uc2dc\uc2a4\ud15c\uc5d0\uc11c \uc774\ub7ec\ud55c \ucde8\uc57d\uc810\uc744 \uac16\uace0 \uc788\ub2e4. \uadf8\ub9ac\uace0 \uc7ac \uce68\uc785\uc744 \uc704\ud558\uc5ec \ube44\uc778\uac00\ub41c \uc811\uadfc\uc744 \uc81c\uacf5\ud574\uc8fc\ub294 \"\ubc31\ub3c4\uc5b4\"\ub97c \uc124\uce58\ud558\uac8c \ub418\ub294\ub370 \uc774\ub7ec\ud55c \ubc31\ub3c4\uc5b4\ub294 \ub370\ubaac \uc11c\ube44\uc2a4 \ud615\ud0dc, \ub610\ub294 \uc11c\ube44\uc2a4\uc758 \ube44\uc815\uc0c1\uc801\uc778 \uc124\uc815 \ub4f1\uc744 \uc774\uc6a9\ud558\uc5ec \ud2b9\uc815 \ud3ec\ud2b8\ub97c \uc5f4\uc5b4\ub193\uac8c \ub41c\ub2e4. \uc774\ub7ec\ud55c \uc791\uc5c5\uc744 \uc190\uc27d\uac8c \ud574\uc8fc\ub294 \ud234\ud0b7\uc774 \uc874\uc7ac\ud558\ub294\ub370 \ud754\ud788 \"rootkit\"\uc774\ub77c \ubd80\ub974\uba70 \uc2dc\uc2a4\ud15c \uc885\ub958\ubcc4\ub85c \ub2e4\uc591\ud55c \ub3c4\uad6c\uac00 \uc874\uc7ac\ud55c\ub2e4<b>[11]<\/b>.<\/p><p>\uacf5\uaca9\uc790\ub294 \uc2dc\uc2a4\ud15c \uce68\uc785\uc5d0 \uc131\uacf5\ud55c \uc2dc\uc2a4\ud15c\uc744 \uc774\uc6a9\ud558\uc5ec \ubcf4\ub2e4 \uc2ec\ub3c4 \uc788\ub294 \uacf5\uaca9\uc744 \uc218\ud589\ud558\uac8c \ub41c\ub2e4. \uac00\uc7a5 \uc804\ud1b5\uc801\uc778 \ubc29\ubc95\uc740 \"password sniffer\"\ub85c \uc790\uc2e0\uc774 \uce68\uc785\ud55c \uc2dc\uc2a4\ud15c\uc5d0 \uc124\uce58\ud558\uc5ec \uacf5\uaca9\ub300\uc0c1 \ub124\ud2b8\uc6cc\ud06c\uc0c1\uc758 Telnet. POP, FTP \ub4f1\uc5d0 \ub300\ud55c \ud2b8\ub798\ud53d\uc744 \uac10\uc2dc\ud558\uba70, \uc0ac\uc6a9\uc790 \uc774\ub984\uacfc \ud328\uc2a4\uc6cc\ub4dc\ub97c \uc218\uc9d1\ud55c\ub2e4<b>[12]<\/b>. \ub610\ud55c \uce68\uc785\ud55c \uc2dc\uc2a4\ud15c\uacfc \"\uc2e0\ub8b0\uad00\uacc4\"\uc5d0 \uc788\ub294 \uc2dc\uc2a4\ud15c\uc758 \uc815\ubcf4\ub97c \uc54c\uc544\ub0b4\uc5b4 \ubcc4\ub3c4\uc758 \uacf5\uaca9\uc744 \ud558\uc9c0 \uc54a\uace0\ub3c4 \uc778\uac00\ub41c \uc0ac\uc6a9\uc790\ub85c\uc11c \ub2e4\ub978 \uc2dc\uc2a4\ud15c\uc744 \uacf5\uaca9\ud560 \uc218\ub3c4 \uc788\ub2e4. \uac00\uc7a5 \ub300\ud45c\uc801\uc778 \uc608\uac00 \"r\" \uacc4\uc5f4\uc758 \uba85\ub839\uc744 \uc0ac\uc6a9\ud558\ub294 \uacbd\uc6b0\uc774\uba70, \uc774\uc678\uc5d0\ub3c4 \ub370\uc774\ud130\ubca0\uc774\uc2a4\uc5d0 \uc811\uadfc\ud560 \uc218 \uc788\ub294 \uacbd\uc6b0\ub3c4 \uc788\ub2e4.<\/p><p>\uacf5\uaca9\uc804\uc774\uc758 \ub610 \ub2e4\ub978 \uacbd\uc6b0\ub294 \uce68\uc785\uc5d0 \uc131\uacf5\ud55c \uc2dc\uc2a4\ud15c\uc744 \ub2e4\ub978 \ub124\ud2b8\uc6cc\ud06c\ub97c \uacf5\uaca9\ud558\uae30 \uc704\ud55c \uacbd\uc720\uc9c0\ub85c \uc0ac\uc6a9\ud558\ub294 \uac83\uc774\ub2e4. \uc774 \uacbd\uc6b0 \ub2e4\uc2dc \uc815\ubcf4\uc218\uc9d1\ub2e8\uacc4\ubd80\ud130 \uc0c8\ub85c\uc774 \uc2dc\uc791\ud558\uac8c \ub41c\ub2e4. \uacbd\uc720\uc9c0\ub97c \uc774\uc6a9\ud558\ub294 \uc774\uc720\ub294 \uacf5\uaca9\uc790\uc758 \ud754\uc801\uc744 \ucd94\uc801\ud558\uae30 \uc5b4\ub835\uac8c \ud558\uae30 \uc704\ud568\uc774\uba70, \ub9ce\uc740 \uacbd\uc6b0\uc5d0 \uc788\uc5b4 \ucd5c\uc18c 2 - 5\uac1c \uc0ac\uc774\ud2b8 \uc774\uc0c1\uc744 \uacbd\uc720\uc9c0\ub85c \uc0ac\uc6a9\ud55c\ub2e4. \uc2dc\uc2a4\ud15c \uce68\uc785\uc758 \ub9ce\uc740 \uacbd\uc6b0\uac00 \uc774\ub7ec\ud55c \uacbd\uc720\uc9c0\ub85c \uc0ac\uc6a9\ud558\uae30 \uc704\ud568\uc774\ub2e4<b>[13]<\/b>.<\/p><p><font color=\"#336699\">1.4 \uc804\ud1b5\uc801\uc778 \uacf5\uaca9\uae30\ubc95\uc758 \ud2b9\uc9d5<\/font><\/p><p>\uc804\ud1b5\uc801\uc778 \uacf5\uaca9\ubaa8\ub378\uc758 \uc815\ubcf4\uc218\uc9d1 \ub2e8\uacc4\uc5d0\uc11c\ub294 \ud558\ub098\uc758 \uc2dc\uc2a4\ud15c\uc5d0\uc11c \ub2e8\uc77c\uc758 \uacf5\uaca9\ub300\uc0c1 \uc2dc\uc2a4\ud15c\uc774\ub098 \ub610\ub294 \ub300\uaddc\ubaa8\uc758 \uad11\ubc94\uc704\ud55c \ub124\ud2b8\uc6cc\ud06c\ub97c \ub300\uc0c1\uc73c\ub85c \uc2a4\uce94\uacf5\uaca9\uc744 \uc218\ud589\ud558\uac8c \ub41c\ub2e4. \ucde8\uc57d\uc810 \uc2a4\uce94\uacf5\uaca9 \ub3c4\uad6c\ub97c \ubd84\ub958\ud574\ubcf4\uba74 \ub2e8\uc77c \ucde8\uc57d\uc810\uc744 \uc2a4\uce94\ud558\ub294 \ub3c4\uad6c\uc640 \ub2e4\uc218\uc758 \ucde8\uc57d\uc810\uc744 \uc2a4\uce94\ud558\ub294 \ub3c4\uad6c\ub85c \uad6c\ubd84\ub420 \uc218 \uc788\uc73c\uba70, \uc774\ub4e4 \ub3c4\uad6c\ub294 \ud558\ub098\uc758 \uc2dc\uc2a4\ud15c \ub610\ub294 \ub124\ud2b8\uc6cc\ud06c \ube14\ub85d \ub2e8\uc704\ub85c \uc2a4\uce94\ud558\ub294 \uae30\ub2a5\uc744 \uac00\uc9c0\uace0 \uc788\ub2e4.<\/p><p>\ub610 \ub2e4\ub978 \ud2b9\uc9d5\uc740 \uc11c\ubc84 \uc911\uc2ec\uc758 \uacf5\uaca9\uae30\ubc95\uc774\ub2e4. \ub300\ubd80\ubd84\uc758 \uacf5\uaca9\ub3c4\uad6c(\uc2e4\uc81c \uc2dc\uc2a4\ud15c \uce68\uc785\uc5d0 \uc0ac\uc6a9\ub418\ub294 \uacf5\uaca9\uc6a9 \uc2a4\ud06c\ub9bd\ud2b8\ub85c \uc18c\uc704 \"exploits\"\ub77c\uace0 \ubd88\ub9ac\uc6b4\ub2e4.)\ub294 \uc11c\ubc84\uc758 \ucde8\uc57d\uc810\uc744 \uacf5\uaca9\ud558\uba70, \ubc31\ub3c4\uc5b4\ub098 \ud2b8\ub85c\uc774\uc794\ubaa9\ub9c8\ub3c4 \uacf5\uaca9\ud558\uace0\uc790 \ud558\ub294 \uc2dc\uc2a4\ud15c\uc5d0 \uc11c\ubc84\ub97c \uc124\uce58\ud558\uc5ec \uacf5\uaca9\uc790\uc758 \ud074\ub77c\uc774\uc5b8\ud2b8\uc5d0\uc11c \uce68\uc785\ud558\ub294 \ubc29\uc2dd\uc744 \uc0ac\uc6a9\ud55c\ub2e4.<\/p><p>\uc804\ud1b5\uc801\uc778 \uacf5\uaca9\ubaa8\ub378\uc5d0\uc11c\uc758 \uce68\uc785\uacbd\ub85c\ub294 \ub2e4\ub2e8\uacc4\uc758 \uacbd\ub85c\ub97c \uac70\uce58\uac8c \ub41c\ub2e4. \uacf5\uaca9\uc790\ub294 \uc790\uc2e0\uc758 \ud754\uc801\uc744 \uac10\ucd94\uae30 \uc704\ud574 2 - 5\uac1c \uc774\uc0c1\uc758 \uc2dc\uc2a4\ud15c\uc5d0 \ucc28\ub840\ub85c \uce68\uc785\ud558\uc5ec \ucd5c\uc885 \uacf5\uaca9 \ub300\uc0c1 \uc2dc\uc2a4\ud15c\uc744 \uacf5\uaca9\ud55c\ub2e4. \uacb0\uad6d \uce68\uc785\uc744 \ub2f9\ud55c \ud638\uc2a4\uac04\uc5d0 \uccb4\uc778\uc744 \uc774\ub8e8\uace0 \ub9c8\uc9c0\ub9c9\uc758 \ud53c\ud574 \uc2dc\uc2a4\ud15c\uc740 \ubc14\ub85c \uc804\ub2e8\uacc4\uc758 \uc2dc\uc2a4\ud15c\uc5d0 \ub300\ud55c \uc815\ubcf4\ub9cc\uc744 \uac00\uc9c0\uac8c \ub41c\ub2e4. \ubb3c\ub860 \uc804 \ub2e8\uacc4\uc758 \uc2dc\uc2a4\ud15c\uc5d0\uc11c\ub294 \uc774\ubbf8 \uacf5\uaca9\uc790\uac00 \uc790\uc2e0\uc758 \ud754\uc801\uc744 \uc81c\uac70\ud558\uae30 \ub54c\ubb38\uc5d0 \uc5ed\ucd94\uc801\uc740 \uac70\uc758 \ubd88\uac00\ub2a5\ud558\uac8c \ub41c\ub2e4. \uc774\ub7ec\ud55c \uccb4\uc778 \ubaa8\ub378\uc5d0\uc11c \uacf5\uaca9\uc790\ub294 \uac01\uac01\uc758 \uc2dc\uc2a4\ud15c\uc5d0 \uce68\uc785\ud560 \ub54c\ub9c8\ub2e4 \ucde8\uc57d\uc810 \uc2a4\uce90\ub108 \ub4f1\uc744 \uc0ac\uc6a9\ud558\uac8c \ub418\ub294\ub370, \uc774 \uacbd\uc6b0 \uc0c1\ub2f9\ud55c \uc2dc\uac04\uc744 \ud544\uc694\ub85c \ud558\uba70 \uacf5\uaca9\uc790\ub294 \ubc31\ub3c4\uc5b4 \ub4f1\uc744 \ud1b5\ud558\uc5ec \ub098\uc911\uc5d0 \ub2e4\uc2dc \uc2dc\uc2a4\ud15c\uc5d0 \ub4e4\uc5b4\uc640\uc11c \uc815\ubcf4\ub97c \uac00\uc838\uac00\uc57c \ud558\ub294 \uc704\ud5d8\uc774 \uc874\uc7ac\ud55c\ub2e4.<\/p><p align=\"right\"><a href=\"http:\/\/www.superuser.co.kr\/security\/certcc\/attack-shift-part1v1.0.htm#top\">Top<\/a><\/p><p><\/p><p><b>2. \uc0c8\ub85c\uc6b4 \uacf5\uaca9 \uae30\ubc95<\/b><\/p><p>\uc804\ud1b5\uc801\uc778 \uacf5\uaca9\ubaa8\ub378\uc758 \ubcc0\ud654\ub294 \ubbf8\uad6d\uc5d0\uc11c \ubcf4\uc548 \uc2dc\uc2a4\ud15c\uc774 \ubcf4\ud3b8\ud654\ub418\uba74\uc11c \uc774\ub97c \uadf9\ubcf5\ud558\uace0\uc790\ud558\ub294 \uacf5\uaca9\uc790\ub4e4\uc758 \ub178\ub825\uc5d0\uc11c \uc2dc\uc791\ub41c\ub2e4(\uc65c \ubbf8\uad6d\uc774\ub0d0\ub294 \uc9c8\ubb38\uc5d0 \ub300\ud55c \ub300\ub2f5\uc740 \uac04\ub2e8\ud558\ub2e4. \ub300\ub2e4\uc218 \uacf5\uaca9\uc790\uc758 \uacf5\uaca9\ub300\uc0c1\uc774 \ubbf8\uad6d\uc774\uae30 \ub54c\ubb38\uc774\uba70, \ubcf4\uc548\uc774 \uac00\uc7a5 \uc798 \ub41c \uc0ac\uc774\ud2b8\ub97c \uce68\uc785\ud574\uc57c \uacf5\uaca9\uc790\ub85c\uc11c \uc778\uc815\ubc1b\uae30 \ub54c\ubb38\uc774\ub2e4). \uc989, \uacf5\uaca9\uc790\uc640 \ubc29\uc5b4\uc790\uc758 \ub6ab\uace0 \ub9c9\ub294 \uacbd\uc7c1\uc73c\ub85c \uc778\ud55c \uac83\uc774\ub2e4. \ud604\uc7ac\uc758 \ubcf4\uc548\ubaa8\ub378\uc5d0\uc11c\ub294 \uc77c\ubc18\uc801\uc73c\ub85c \uacf5\uaca9\uc790\uac00 \ud56d\uc0c1 \uc6b0\uc138\ud558\uba70 \ubc29\uc5b4\uc790\ub294 \uc54c\ub824\uc9c4 \uacf5\uaca9\ubc29\ubc95\uc5d0\ub9cc \ub300\uc751\ud558\ub294 \ubc29\uc2dd\uc758 \uc0ac\uc774\ud074\uc744 \uac00\uc9c4\ub2e4. \ub610\ud55c \uc778\ud130\ub137\uc774 \uc2e4\uc138\uacc4\uc758 \uc911\uc694\ud55c \uc77c\ubd80\uac00 \ub418\uba74\uc11c \"\uc0ac\uc774\ubc84\ud14c\ub7ec\", \"\uc0ac\uc774\ubc84\ubc94\uc8c4\" \ub610\ud55c \uad6c\uccb4\ud654, \uc870\uc9c1\ud654 \ub418\ub294 \uac83\ub3c4 \uc804\ud1b5\uc801\uc778 \uacf5\uaca9\ubaa8\ub378\uc758 \ubcc0\ud654\uc5d0 \ud070 \uc601\ud5a5\uc744 \uc8fc\uace0 \uc788\ub2e4.<\/p><p>\uc804\ud1b5\uc801\uc778 \uacf5\uaca9\uae30\ubc95 \ubcc0\ud654\uc758 \uac00\uc7a5 \ud070 \uc6d0\ub3d9\ub825\uc740 \ubc29\uc5b4\uc790\uc758 \ubcf4\uc548\uc218\uc900 \ud5a5\uc0c1\uc774\ub2e4. \ud30c\uc774\uc5b4\uc6d4 \ubc0f \uce68\uc785\ud0d0\uc9c0\uc2dc\uc2a4\ud15c(IDS, Intrusion Detection System)\uc758 \ubcf4\ud3b8\ud654\ub294 \uc804\ud1b5\uc801\uc778 \uacf5\uaca9\uae30\ubc95\uc5d0 \ub9e4\uc6b0 \ud6a8\uacfc\uc801\uc778 \ub300\uc751\uc218\ub2e8\uc744 \uc81c\uacf5\ud55c\ub2e4. \uadf8\ub9ac\uace0 \uc5ec\ub7ec \uad6d\uac00\uc758 CERT \uac04\uc758 \uacf5\uc870\uccb4\uacc4\ub3c4 \uacf5\uaca9\uc790\uc758 \ud65c\ub3d9\ubc94\uc704\ub97c \uc881\ud600\uac00\uace0 \uc788\ub2e4<b>[14]<\/b>. \ud558\uc9c0\ub9cc \uc774\ub7ec\ud55c \uc7a5\ubcbd\uc744 \uadf9\ubcf5\ud558\uace0 \uc131\uacf5\uc801\uc73c\ub85c \uc2dc\uc2a4\ud15c\uc5d0 \uce68\uc785\ud558\uae30 \uc704\ud55c \uae30\uc220 \ubc0f \ub3c4\uad6c\ub4e4\uc774 \ucd5c\uadfc \uba87 \ub144\uac04 \uc9c0\uc18d\uc801\uc73c\ub85c \uac1c\ubc1c\ub418\uace0 \uc788\ub2e4. \ub300\ud45c\uc801\uc778 \ub3c4\uad6c\ub85c\ub294 hping, Firewalk, Loki Project<b>[15]<\/b>, pcap<b>[16]<\/b>, libnet<b>[17]<\/b>&nbsp;\ub4f1\uc744 \ub4e4 \uc218 \uc788\ub2e4. \uadf8\ub9ac\uace0 \uc774\ub7ec\ud55c \ubcc0\ud654\uc911 \uc8fc\ubaa9\uc744 \ub04c\ub9cc\ud55c \uac83\uc740 \ubc14\ub85c '98\ub144 \uc911\ubc18\uc5d0 \uacf5\uac1c\ub41c \ubc31\uc624\ub7ec\ud53c\uc2a4\uc774\ub2e4. \uc774\ub7ec\ud55c \uae30\uc220 \ubc0f \ub3c4\uad6c\ub4e4\uc758 \ub4f1\uc7a5\uc740 \uc0c8\ub85c\uc6b4 \uacf5\uaca9\uae30\ubc95\uc758 \ud328\ub7ec\ub2e4\uc784\uc73c\ub85c \uac00\ub294 \uacfc\ub3c4\uae30\uc774\uba70, \uae30\ubc18 \uae30\uc220\uc774 \ub41c\ub2e4.<\/p><p><font color=\"#336699\">2.1 \ubc31\uc624\ub7ec\ud53c\uc2a4<b>[18]<\/b><\/font><\/p><p>\uac1c\uc778\uc801\uc778 \uc758\uacac\uc73c\ub85c\ub294 \ubc31\uc624\ub7ec\ud53c\uc2a4\uc758 \ucd9c\ud604\uc740 \uacf5\uaca9\uae30\ubc95\uc758 \uc0c8\ub85c\uc6b4 \ud328\ub7ec\ub2e4\uc784\uc5d0\uc11c \ud070 \uc704\uce58\ub97c \ucc28\uc9c0\ud55c\ub2e4\uace0 \ubcf8\ub2e4. \ubc31\uc624\ub7ec\ud53c\uc2a4\ub294 \uc0c8\ub85c\uc6b4 \ub124\ud2b8\uc6cc\ud06c \uacf5\uaca9\uae30\ubc95\uc758 \ub9ce\uc740 \ud2b9\uc9d5\uc744 \ub0b4\ud3ec\ud558\uace0 \uc788\uc73c\uba70, \uac00\uc7a5 \uc131\uacf5\uc801\uc778 \uacf5\uaca9\uacfc \uba85\uc131(\uc801\uc5b4\ub3c4 \uad6d\ub0b4\uc5d0\uc11c\ub294)\uc744 \uc774\ub8e8\uc5c8\ub2e4.<\/p><p>\ub2e4\ub978 \uacf5\uaca9\ub3c4\uad6c\uc640 \ub9c8\ucc2c\uac00\uc9c0\ub85c \ubc31\uc624\ub7ec\ud53c\uc2a4 \ub610\ud55c \uacf5\uaca9\uc790\uc5d0\uac8c \uc778\uac00 \ubc1b\uc9c0 \uc54a\uc740 \uc811\uadfc\uad8c\ud55c\uc744 \uc81c\uacf5\ud55c\ub2e4. \uc774\uc640 \ub354\ubd88\uc5b4 \uc0c8\ub85c\uc6b4 \uae30\ub2a5\uc73c\ub85c\ub294 \ud328\ud0b7 \ub9b4\ub808\uc774 \uae30\ub2a5\uc744 \uac00\uc9c0\uace0 \uc788\uc73c\uba70, \uc0c8\ub85c\uc6b4 \uacf5\uaca9 \ud504\ub85c\uadf8\ub7a8\uc744 \ucd94\uac00\ud560 \uc218 \uc788\ub294 \uae30\ub2a5\uc744 \uac00\uc9c0\uace0 \uc788\ub2e4. \uc774\ub294 \ucd5c\uadfc\uc758 IT \uae30\uc220\uc5d0\uc11c \ub098\ud0c0\ub098\uace0 \uc788\ub294 \uc5d0\uc774\uc804\ud2b8 \uac1c\ub150\uacfc \ube44\uc2b7\ud55c \uac1c\ub150\uc73c\ub85c \uc81c\ud488\uc758 \uae30\ub2a5 \ubc0f \ubc84\uc804\uc5c5\uc744 \uc790\ub3d9\uc73c\ub85c \ud558\ub294 \uac83\uacfc \ube44\uc2b7\ud558\ub2e4. IT\uc758 \uae30\uc220\ubc1c\uc804\uc774 \uacf5\uaca9\uae30\uc220\uc5d0\ub3c4 \uc801\uc6a9\ub418\uace0 \uc788\ub294 \uac83\uc774\ub2e4.<\/p><p>\ud328\ud0b7 \ub9b4\ub808\uc774 \uae30\ub2a5\uc740 \uacf5\uaca9\uc790\uac00 \ub2e4\uc2dc \uc2dc\uc2a4\ud15c\uc5d0 \uce68\uc785\ud558\uc9c0 \uc54a\uace0 \uc774\ubbf8 \uce68\uc785\uc5d0 \uc131\uacf5\ud55c \uc2dc\uc2a4\ud15c\uc744 \uc774\uc6a9\ud558\uc5ec \ub2e4\ub978 \uc2dc\uc2a4\ud15c\uc744 \uacf5\uaca9\ud558\ub294\ub370 \uc774\uc6a9\ud560 \uc218 \uc788\uc74c\uc744 \uc758\ubbf8\ud55c\ub2e4. \ubb3c\ub860 \uc708\ub3c4\uc6b0 \uc2dc\uc2a4\ud15c\uc774\ub77c\ub294 \ud2b9\uc131\uc5d0\uc11c \uc5f0\uc720\ub41c \uac83\uc774\uae30\ub294 \ud558\uc9c0\ub9cc \ucd5c\uadfc \uc774\ub7ec\ud55c \ud615\ud0dc\uc758 \uacf5\uaca9\ub3c4\uad6c\ub4e4\uc774 \uc720\ub2c9\uc2a4\uc5d0\uc11c\ub3c4 \ubc1c\uacac\ub418\uace0 \uc788\ub2e4.<\/p><p>\ubc31\uc624\ub7ec\ud53c\uc2a4\ub294 \ubc14\uc774\ub7ec\uc2a4\uc640 \ubc84\uae08\uac00\ub294 \uc804\ud30c\ub825\uc744 \uac00\uc84c\ub2e4. \uc804\ud30c \ub9e4\uccb4\uac00 \uc804\uc790\uba54\uc77c, \uc6f9\uc744 \ud1b5\ud55c \ub2e4\uc6b4\ub85c\ub4dc \ub4f1 \ubcf4\uc548\uc2dc\uc2a4\ud15c\uc744 \uc6b0\ud68c\ud560 \uc218 \uc788\ub294 \uc218\ub2e8\uc744 \uc774\uc6a9\ud558\uae30 \ub54c\ubb38\uc774\uae30\ub3c4 \ud558\uc9c0\ub9cc, \uc5b8\ub860\uc5d0\uc11c \uc870\uc7a5\ud55c \uc601\ud5a5\uc774 \uc801\uc9c0 \uc54a\ub2e4. \ub610\ud55c \uc81c\uc791\uc790\uc758 \uace0\uc758\uc801\uc778 \uc758\ub3c4\uac00 \uc788\uc5c8\ub294\uc9c0\ub294 \ubaa8\ub974\uaca0\uc9c0\ub9cc \ubc31\uc624\ub7ec\ud53c\uc2a4\uc758 \uc7ac\ubbf8\uc788\ub294 \uae30\ub2a5\ub4e4\uc740 \ud574\ud0b9\uc758 \uac1c\ub150\uc744 \ub300\uc911\ud654\ud558\uc600\uace0, \uc2a4\ud06c\ub9bd\ud2b8\ud0a4\ub514(script kiddies)\ub77c \ubd88\ub9ac\uc6b0\ub294 \uacf5\uaca9\uc790\ubcf4\ub2e4\ub3c4 \uc218\uc900\uc774 \ub0ae\uc740 \"\uc6cc\ub108\ube44\"(want to be, \ud574\ucee4\uac00 \ub418\uace0 \uc2f6\uc5b4\ud558\ub294 \uc0ac\ub78c)\ub4e4\uc5d0\uac8c \ud574\ud0b9\uc744 \ub9db\uc744 \ubcf4\uc5ec\uc8fc\ub294 \ub3c4\uad6c\ub97c \uc81c\uacf5\ud568\uc73c\ub85c\uc11c \ubc31\uc624\ub7ec\ud53c\uc2a4\ub97c \ub110\ub9ac \ud37c\uc9c0\uac8c \ud558\uc600\ub2e4<b>[19]<\/b>. \uc774\ub7ec\ud55c \uba74\uc5d0\uc11c \ubc31\uc624\ub7ec\ud53c\uc2a4\ub294 \uac00\uc7a5 \uc131\uacf5\uc801\uc778 \uacf5\uaca9\ub3c4\uad6c\ub77c\uace0 \ub9d0\ud560 \uc218 \uc788\ub2e4.<\/p><p>\uc0ac\uc2e4 \ubc31\uc624\ub7ec\ud53c\uc2a4\uc758 \uc9c4\uc815\ud55c \uc704\ud611\uc740 \uc774\ub7ec\ud55c \uc6cc\ub108\ube44(want to be)\ub4e4\uc5d0 \uc758\ud55c \uacf5\uaca9\uc774 \uc544\ub2c8\ub2e4. \uc6cc\ub108\ube44\uc758 \ud638\uae30\uc2ec\uc73c\ub85c \uc778\ud558\uc5ec \uc774\ubbf8 \uc778\ud130\ub137\uc0c1\uc758 \uc218\ub9ce\uc740 \uc2dc\uc2a4\ud15c\uc5d0 \ubc31\uc624\ub7ec\ud53c\uc2a4\ub97c \ube44\ub86f\ud55c \ube44\uc2b7\ud55c \uc885\ub958\uc758 \uacf5\uaca9\ub3c4\uad6c\ub4e4\uc774 \uc124\uce58\ub418\uc5c8\uace0, \uc774\ub7ec\ud55c \uc2dc\uc2a4\ud15c\uc740 \ud5a5\ud6c4 \ub354 \uac15\ub825\ud55c \uacf5\uaca9\uc744 \uc218\ud589\ud560 \uc218 \uc788\ub294 \uacf5\uaca9\ub3c4\uad6c\ub85c \ubc14\ub014 \uc218 \uc788\ub2e4\ub294\ub370\uc11c \uadf8 \uc704\ud611\uc774 \uc874\uc7ac\ud55c\ub2e4. \uc608\ub97c \ub4e4\uba74, \ubc31\uc624\ub7ec\ud53c\uc2a4\uac00 \uc124\uce58\ub41c 1000\uac1c\uc758 \uc2dc\uc2a4\ud15c \uc815\ubcf4\ub97c \uac00\uc9c4 \uacf5\uaca9\uc790\uac00 Win\/trin00<b>[20]<\/b>\uc640 \uac19\uc740 \uc0c8\ub85c\uc6b4 \ubd84\uc0b0\uc11c\ube44\uc2a4\uacf5\uaca9 \ub3c4\uad6c\ub97c \ub9cc\ub4e4\uace0 \uc774\ub97c \ubc31\uc624\ub7ec\ud53c\uc2a4\ub97c \uc774\uc6a9\ud558\uc5ec \uc2dc\uc2a4\ud15c\uc5d0 \uc778\uc2a4\ud1a8\ud55c \ub4a4 \uacf5\uaca9\uc744 \uc218\ud589\ud55c\ub2e4\uace0 \uac00\uc815\ud560 \uc218 \uc788\ub2e4.<\/p><p>\ubc31\uc624\ub7ec\ud53c\uc2a4\uc758 \ub610 \ub2e4\ub978 \ud2b9\uc9d5\uc73c\ub85c\ub294 \uc77c\ubc18 \uc0ac\uc6a9\uc790\ub97c \uacf5\uaca9 \ub300\uc0c1\uc73c\ub85c \ud588\ub2e4\ub294 \uc810\uc774\ub2e4. \ubcf4\uc548 \uc778\uc2dd\uc774 \ud655\uc0b0\ub418\uba74\uc11c \uc11c\ubc84 \ubc0f \ub124\ud2b8\uc6cc\ud06c\uc5d0 \ub300\ud55c \ubcf4\uc548\uc774 \ud5a5\uc0c1\ub418\uc5c8\uace0 \uacb0\uacfc\uc801\uc73c\ub85c \uacf5\uaca9\uc790\ub294 \ubcf4\uc548\uc5d0 \ub300\ud55c \uc778\uc2dd\uc774 \uc5c6\ub294 \uc77c\ubc18 \uc0ac\uc6a9\uc790\ub4e4\uc744 \uacf5\uaca9\ub300\uc0c1\uc73c\ub85c \uc0bc\uc740 \uac83\uc774\ub2e4. \uadf8\ub9ac\uace0 \uc77c\ub2e8 \uc77c\ubc18 \uc0ac\uc6a9\uc790\ub97c \ub300\uc0c1\uc73c\ub85c \uc77c\ucc28\uc801\uc778 \uacf5\uaca9\uc774 \uc131\uacf5\ud558\uace0 \ub098\uba74 \uacf5\uaca9\uc804\uc774 \ub2e8\uacc4\ub97c \uac70\uccd0 \uc11c\ubc84\uc5d0\ub3c4 \uce68\uc785\ud560 \uc218 \uc788\ub294 \uae30\ud68c\ub97c \uac16\uac8c \ub41c\ub2e4. \ubc31\uc624\ub7ec\ud53c\uc2a4\uc758 \ud0a4\uc2a4\ud2b8\ub85c\ud06c \ub85c\uae45\uae30\ub2a5\uc744 \uc774\uc6a9\ud558\uac70\ub098 PC\uc5d0 \uc800\uc7a5\ub41c \ud328\uc2a4\uc6cc\ub4dc\ub97c \uc720\ucd9c\ud558\uc5ec \uc11c\ubc84\uc5d0 \uce68\uc785\ud560 \uc218 \uc788\ub2e4.<\/p><p><font color=\"#336699\">2.2 \ub124\ud2b8\uc6cc\ud06c \uc2a4\uce90\ub2dd<\/font><\/p><p>\ud30c\uc774\uc5b4\uc6d4\uc758 \ub3c4\uc785\uc740 \uc804\ud1b5\uc801\uc778 \ub124\ud2b8\uc6cc\ud06c \uc2a4\uce90\ub2dd \uacf5\uaca9\uc744 \ud6a8\uc728\uc801\uc73c\ub85c \ucc28\ub2e8\ud574 \uc8fc\ub294 \ubcf4\uc548 \uc218\ub2e8\uc774 \ub41c\ub2e4. \ud558\uc9c0\ub9cc \ud30c\uc774\uc5b4\uc6d4\uc744 \uc6b0\ud68c\ud560 \uc218 \uc788\ub294 \uacf5\uaca9\uae30\uc220 \ub610\ud55c \ub9ce\uc774 \ubc1c\uc804\ud558\uc600\ub2e4. \ub300\ubd80\ubd84\uc758 \uc2dc\uc2a4\ud15c\uc5d0\uc11c \ub124\ud2b8\uc6cc\ud06c \ud328\ud0b7\uc744 \uc2a4\ub2c8\ud551\ud560 \uc218 \uc788\ub3c4\ub85d \ud574\uc8fc\ub294 pcap \ub77c\uc774\ube0c\ub7ec\ub9ac, \uc784\uc758\uc758 \ud328\ud0b7\uc744 \ub9cc\ub4e4\uc5b4 \ubcf4\ub0bc \uc218 \uc788\ub3c4\ub85d \ud574\uc8fc\ub294 libnet \ub77c\uc774\ube0c\ub7ec\ub9ac\uc758 \uacf5\uac1c\ub294 \ud30c\uc774\uc5b4\uc6d4\uc744 \uacf5\uaca9\ud558\uae30 \uc704\ud55c \uacf5\uaca9\ub3c4\uad6c\uc758 \uae30\ubc18\uae30\uc220\uc774 \ub418\uba70, firewalk, hping, nmap \ub4f1\uacfc \uac19\uc740 \uace0\ub3c4\uc758 \uc2a4\uce90\ub2dd \ub3c4\uad6c\uc5d0 \uc0ac\uc6a9\ub41c\ub2e4.<\/p><p>\uacf5\uaca9\uc790\uc758 \uc2dc\uc2a4\ud15c\uc5d0\uc11c \uc9c1\uc811 \uc2a4\uce94\uc744 \uc2dc\ub3c4\ud558\ub294 \uc804\ud1b5\uc801\uc778 \uacf5\uaca9\uae30\ubc95\uacfc \ub2ec\ub9ac \uc81c\uc0bc\uc758 \uc11c\ubc84\ub97c \uc774\uc6a9\ud558\uc5ec \uacf5\uaca9\ub300\uc0c1\uc758 \ub124\ud2b8\uc6cc\ud06c\ub97c \uc2a4\uce90\ub2dd\ud560 \uc218 \uc788\ub294 ftp bounce attack, DNS bounce attack \ub4f1\uc758 bounce \uae30\uc220\uc774 \ub9ce\uc774 \uc0ac\uc6a9\ub418\uace0 \uc788\uc73c\uba70, hping\uacfc \uac19\uc774 \uc18c\uc2a4\uc8fc\uc18c\ub97c \uc18d\uc5ec \uc2a4\uce94\uacf5\uaca9\uc744 \ud560 \uc218 \uc788\ub294 \ubc29\ubc95\ub3c4 \uc874\uc7ac\ud55c\ub2e4. \uadf8\ub9ac\uace0 wingate\ub4f1\uc758 proxy \uae30\ub2a5\uc744 \uc81c\uacf5\ud558\ub294 \uc2dc\uc2a4\ud15c\uc744 \uc774\uc6a9\ud568\uc73c\ub85c\uc11c \uacf5\uaca9\uc790\uc758 \uc704\uce58\ub97c \ub178\ucd9c\uc2dc\ud0a4\uc9c0 \uc54a\ub294\ub2e4.<\/p><p>\uc804\ud1b5\uc801\uc778 \uacf5\uaca9\ubaa8\ub378\uc740 \uc774\ubbf8 \uc798 \uc54c\ub824\uc838 \uc788\uc5b4 \uce68\uc785\ud0d0\uc9c0\uc2dc\uc2a4\ud15c(IDS)\ub4f1\uc5d0 \uc758\ud558\uc5ec \uc27d\uac8c \ub178\ucd9c\ub418\uace0 \ucd94\uc801\ub420 \uc218 \uc788\ub2e4. \uc774\ub7ec\ud55c \uce68\uc785\ud0d0\uc9c0\uc2dc\uc2a4\ud15c\uc744 \ubb34\ub825\ud654\uc2dc\ud0a4\uae30 \uc704\ud55c \ucd5c\uc120\uc758 \uacf5\uaca9\ubc29\ubc95\uc73c\ub85c \uc0c8\ub85c\uc774 \ubd80\uac01\ub418\ub294 \ubc29\ubc95\uc740 \ubd84\uc0b0 \uc2a4\uce94\uacf5\uaca9<b>[21]<\/b>\uc774\ub2e4. \ubd84\uc0b0 \uc2a4\uce94\uacf5\uaca9\uc740 \uc5ec\ub7ec \ud638\uc2a4\ud2b8\uc5d0\uc11c \ud558\ub098\uc758 \uacf5\uaca9\ub300\uc0c1 \ub124\ud2b8\uc6cc\ud06c\ub97c \uc2a4\uce94\ud558\uc5ec \ubcf4\ub2e4 \ube60\ub974\uace0 \ub2e4\uc591\ud55c \uc815\ubcf4\ub97c \ud68d\ub4dd\ud560 \ubfd0\ub9cc \uc544\ub2c8\ub77c, \uc218 \ub9ce\uc740 \uc2dc\uc2a4\ud15c\uc744 \uc774\uc6a9\ud558\uace0 \uadf8\ub9ac\uace0 \ub54c\ub85c\ub294 \uac00\uc9dc \uacf5\uaca9\ud328\ud0b7\uc744 \uc774\uc6a9\ud558\uae30 \ub54c\ubb38\uc5d0 \uce68\uc785\ud0d0\uc9c0\uc2dc\uc2a4\ud15c\uc774 \ud0d0\uc9c0\ud558\ub294 \uc815\ubcf4\ub97c \ubb34\uc758\ubbf8\ud558\uac8c \ub9cc\ub4e4\uac8c \ub41c\ub2e4. \ub610\ud55c \uc5d0\uc774\uc804\ud2b8 \ud615\ud0dc\uc758 \uc2a4\uce94 \uacf5\uaca9\ub3c4\uad6c\ub97c \uc774\uc6a9\ud558\uac8c \ub418\uba74 \uacf5\uaca9\uc790\ub294 \uacf5\uaca9 \uc2dc\uc2a4\ud15c\uc5d0 \ub85c\uadf8\uc778 \ud558\uc9c0 \uc54a\uace0 \uc6d0\uaca9\uc5d0\uc11c \ub2e4\uc218\uc758 \uc5d0\uc774\uc804\ud2b8\ub97c \ud1b5\uc81c\ud558\uc5ec \uc27d\uac8c \uc815\ubcf4\ub97c \uc218\uc9d1\ud560 \uc218 \uc788\uac8c \ub41c\ub2e4.<\/p><p><font color=\"#336699\">2.3 \uc778\ud130\ub137 \uc6dc(Internet Worm)<\/font><\/p><p>\uc778\ud130\ub137\uc5d0\uc11c \ub9ce\uc740 \uc0ac\uc774\ud2b8\ub4e4\uc758 \ub124\ud2b8\uc6cc\ud06c \uad6c\uc870\uac00 \ud68d\uc77c\ud654\ub418\uace0 \uadf8\ub9ac\uace0 \uba87\uba87 \uc2dc\uc2a4\ud15c \ubc0f \uc194\ub8e8\uc158\uc774 \ub300\ub2e4\uc218\uc758 \uc2dc\uc7a5\uc744 \ucc28\uc9c0\ud788\uac8c \ub418\uba74\uc11c \uc774\ub7ec\ud55c \uc2dc\uc2a4\ud15c \ubc0f \uc194\ub8e8\uc158\uc758 \uc0c8\ub85c\uc6b4 \ucde8\uc57d\uc810\uc740 \uadf8 \ud30c\uae09\ud6a8\uacfc\uac00 \ucee4\uc9c0\uace0 \uc788\ub2e4. \uc608\ub97c \ub4e4\uba74, solaris\ub294 \ud604\uc7ac \uc6cc\ud06c\uc2a4\ud14c\uc774\uc158 \ubd84\uc57c\uc5d0\uc11c \uac00\uc7a5 \ub9ce\uc740 \uc2dc\uc7a5\uc744 \ud655\ubcf4\ud558\uace0 \uc788\ub2e4. \uadf8\ub9ac\uace0 \ucd5c\uadfc\uc5d0 \uc9c0\uc18d\uc801\uc73c\ub85c \ubc1c\uacac\ub418\uace0 \uc788\ub294 RPC \uad00\ub828 \ucde8\uc57d\uc810\uc740 \uc218\ub9ce\uc740 Solaris \uc2dc\uc2a4\ud15c\uc744 \uacf5\uaca9\ud558\ub294\ub370 \ub9e4\uc6b0 \ud6a8\uacfc\uc801\uc774\uc5c8\ub2e4.<\/p><p>\uc778\ud130\ub137 \ud658\uacbd\uc758 \ud68d\uc77c\ud654\ub294 \uacb0\uad6d \uc778\ud130\ub137 \uc6dc\uacfc \uac19\uc740 \uc790\ub3d9\ud654\ub41c \uacf5\uaca9\ub3c4\uad6c\uc758 \ucd9c\ud604\uc744 \uc57c\uae30 \uc2dc\ud0a4\uace0 \uc788\ub2e4. 1998\ub144\uc5d0 ADM Internet worm(ADMw0rm)<b>[22]<\/b>\uc774, 1999\ub144\uc5d0\ub294 ADMw0rm\uacfc \uc720\uc0ac\ud55c Millennium Internet Worm<b>[23]<\/b>\uc774 \uacf5\uac1c\ub418\uc5c8\uc73c\uba70, \uad6d\ub0b4 \uce68\ud574\uc0ac\uace0\uc5d0\uc11c\ub3c4 \ubc1c\uacac\ub41c \uc801\uc774 \uc788\ub2e4. \uc774\ub7ec\ud55c \uc778\ud130\ub137 \uc6dc\uc740 \uc790\ub3d9\uc73c\ub85c \uc784\uc758\uc758 \uacf5\uaca9 \ubaa9\ud45c\ub97c \uc815\ud558\uace0 \uacf5\uaca9\uc774 \uc131\uacf5\ud558\uace0 \ub098\uba74 \uadf8 \uc9c0\uc810\ubd80\ud130 \ub610 \ub2e4\ub978 \uacf5\uaca9\uc744 \uc2dc\uc791\ud558\ubbc0\ub85c \uc704\uc758 \ucde8\uc57d\uc810\uc744 \uac00\uc9c4 \ub9ce\uc740 \uc0ac\uc774\ud2b8\uac00 \uacf5\uaca9\uc744 \ub2f9\ud560 \uc218 \uc788\ub2e4. trin00, TFN \ub4f1 DDOS \uacf5\uaca9\ub3c4\uad6c \ub610\ud55c \uc704\uc640 \ube44\uc2b7\ud55c \uc885\ub958\uc758 \uc778\ud130\ub137 \uc6dc\uc744 \ud1b5\ud558\uc5ec \uc11c\ubc84\uc5d0 \uc124\uce58\ub420 \uc218 \uc788\ub294\ub370, \uc2e4\uc81c\ub85c \uba87 \uba87 \uce68\ud574\uc0ac\uace0\uc5d0\uc11c \uc778\ud130\ub137 \uc6dc\uacfc \ube44\uc2b7\ud55c \uae30\ub2a5\uc758 \uc2a4\ud06c\ub9bd\ud2b8\ub4e4\uc774 \ubc1c\uacac\ub418\uc5c8\ub2e4<b>[24]<\/b>.<\/p><p>\ub610\ud55c \uc720\ub2c9\uc2a4 \ubc0f \uc708\ub3c4\uc6b0 \uae30\ubc18\uc758 \uacf5\uaca9 \ud504\ub85c\uadf8\ub7a8\ub4e4\uc774 \ub2e4\uc591\ud55c \ud50c\ub7ab\ud3fc\ubcc4\ub85c \ud3ec\ud305\ub418\uc5b4 \uacf5\uac1c\ub418\ub294 \uacbd\uc6b0\uac00 \uc99d\uac00\ud558\uace0 \uc788\uc5b4, \uacf5\uaca9\ub3c4\uad6c\uc758 \uc790\ub3d9\ud654 \ub610\ub294 \ud328\ud0a4\uc9c0\ud654\ub294 \uac00\uc18d\ud654 \ub420 \uac83\uc774\ub2e4. \uc774\ubbf8 \uc5b8\ub354\uadf8\ub77c\uc6b4\ub4dc\uc5d0\uc11c\ub294 \uc774\ub7ec\ud55c \uc790\ub3d9\ud654\ub41c \uacf5\uaca9 \uc2dc\uc2a4\ud15c(Automated Attack Machine)<b>[25]<\/b>\uc5d0 \ub300\ud55c \uc5f0\uad6c\uac00 \uc9c4\ud589\uc911\uc774\ub2e4.<\/p><p><b><i>\"\uc790\ub3d9\ud654\ub41c \uacf5\uaca9\ub3c4\uad6c\ub294 \ud328\ub7ec\ub810(parerall)\ud55c \ud615\ud0dc\uc758 \uacf5\uaca9\ud328\ud134\uc744 \uc81c\uacf5\ud558\ub294\ub370, \uc774\ub294 \uacf5\uaca9\uc790\uc5d0\uac8c \uacf5\uaca9\ubc94\uc704 \ubc0f \uc18d\ub3c4\ub97c \ud5a5\uc0c1\uc2dc\ucf1c\uc8fc\uba70, \uacb0\uad6d \uc870\ub9cc\uac04 \uacf5\uaca9\uc790\uc5d0\uac8c \uc778\ud130\ub137\uc744 \uc804\ubcf5\uc2dc\ud0ac\ub9cc\ud55c \uc2dc\uc2a4\ud15c \ubc0f \ub124\ud2b8\uc6cc\ud06c \uc790\uc6d0\uc744 \uc81c\uacf5\ud560 \uc218\ub3c4 \uc788\ub2e4<\/i><\/b><i>.\"&nbsp;<br \/><\/i><\/p><p>\uadf8\ub9ac\uace0 \uc774\ub7ec\ud55c \uacf5\uaca9\uc5d0 \uc5d0\uc774\uc804\ud2b8 \ud615\ud0dc\uc758 \uacf5\uaca9\ub3c4\uad6c\ub97c \uc0ac\uc6a9\ud558\uac8c \ub418\uba74 \uacf5\uaca9\uc790\ub294 \uc2e4\uc81c\uc758 \uacf5\uaca9\ub77c\uc778\uc73c\ub85c\ubd80\ud130 \ub5a8\uc5b4\uc838 \uc788\uac8c \ub418\uace0, \uc5ed\ucd94\uc801\uc740 \uc0ac\uc2e4\uc0c1 \ubd88\uac00\ub2a5\ud558\uac8c \ub41c\ub2e4.<\/p><p><font color=\"#336699\">2.4 \ubc31\ub3c4\uc5b4<\/font><\/p><p>\uc2a4\uce90\ub2dd \uae30\uc220\uacfc \ub354\ubd88\uc5b4 \uac00\uc7a5 \ube68\ub9ac \ubcc0\ud654\ud558\uace0 \uc788\ub294 \uacf5\uaca9 \uae30\uc220\ubd84\uc57c\uac00 \ubc31\ub3c4\uc5b4 \uc774\ub2e4. \uc55e\uc11c \uc124\uba85\ud55c \uac83\ucc98\ub7fc \ubc31\ub3c4\uc5b4\ub294 \uce68\uc785\uc790\uac00 \uc544\ubb34\ub7f0 \uc778\uc99d\uc218\ub2e8\uc5c6\uc774 \uadf8\ub9ac\uace0 \ub85c\uadf8\uae30\ub85d\uc744 \ub0a8\uae30\uc9c0 \uc54a\uace0 \uc2dc\uc2a4\ud15c\uc5d0 \ub2e4\uc2dc \ub4e4\uc5b4\uc62c \uc218 \uc788\ub3c4\ub85d \ud558\ub294 \uc218\ub2e8\uc744 \ub9d0\ud55c\ub2e4. \ud558\uc9c0\ub9cc \uc804\ud1b5\uc801\uc778 \ubc31\ub3c4\uc5b4 \uae30\uc220\uc740 \uc774\ubbf8 \uc798 \uc54c\ub824\uc838 \uc788\uace0 \ub300\ubd80\ubd84\uc758 \ubcf4\uc548 \uc2dc\uc2a4\ud15c\uc5d0\uc11c \uc774\ub97c \ud0d0\uc9c0\ud560 \uc218 \uc788\uc5b4 \uacf5\uaca9\uc790\uc5d0\uac8c\ub294 \ud070 \uc704\ud5d8\ubd80\ub2f4\uc744 \uc548\uaca8\uc900\ub2e4.<\/p><p>\ucd5c\uadfc\uc5d0 \ubc1c\uacac\ub418\ub294 \ubc31\ub3c4\uc5b4\ub294 \ud2b9\uc815 \ud3ec\ud2b8\ub97c \uc5f4\uac70\ub098 \ub124\ud2b8\uc6cc\ud06c \ucee4\ub125\uc158\uc744 \ud544\uc694\ub85c \ud558\uc9c0 \uc54a\ub294\ub2e4. raw socket\ub97c \uc5f4\uc5b4 \ud2b9\uc815 \ud328\ud0b7\uc774 \uc624\uae30\ub97c \uae30\ub2e4\ub9b0\ub2e4. \uadf8\ub9ac\uace0 \uc870\uac74\uc5d0 \ub9de\ub294 \ud328\ud0b7\uc774 \uc624\uba74 \uadf8\uc5d0 \uc801\uc808\ud55c \uc751\ub2f5\uc744 \uc81c\uacf5\ud55c\ub2e4. \uc774\ub7ec\ud55c \uae30\uc220\uc744 tunneling \uae30\uc220\uc774\ub77c \ud558\uba70 ICMP, UDP, IP, TCP<b>[26]<\/b>&nbsp;\ub4f1 \ub2e4\uc591\ud55c \ud504\ub85c\ud1a0\ucf5c \uacc4\uce35\uc5d0\uc11c \uad6c\ud604\ub420 \uc218 \uc788\uc73c\uba70, http<b>[27]<\/b>, Mail<b>[28]<\/b>, DNS<b>[29]<\/b>&nbsp;\ub4f1 \uc751\uc6a9\ud504\ub85c\uadf8\ub798\ubc0d \uacc4\uce35\uc5d0\uc11c\ub3c4 \uad6c\ud604\ub420 \uc218 \uc788\uc5b4 \ud30c\uc774\uc5b4\uc6d4\uc744 \uc6b0\ud68c\ud560 \uc218 \uc788\ub294 \uc218\ub2e8\uc744 \uc81c\uacf5\ud55c\ub2e4. \ub610\ud55c \uce68\uc785\ud0d0\uc9c0\uc2dc\uc2a4\ud15c\uc744 \uc6b0\ud68c\ud558\uae30 \uc704\ud558\uc5ec \uc554\ud638\ud654 \uae30\ub2a5\uc744 \uc81c\uacf5\ud558\uae30\ub3c4 \ud55c\ub2e4.<\/p><p>\ub124\ud2b8\uc6cc\ud06c \ubc31\ub3c4\uc5b4 \uc774\uc678\uc5d0\ub3c4 \uc2dc\uc2a4\ud15c\uc5d0\uc11c \ud2b9\uc815 \ud30c\uc77c\uc774\ub098 \ud504\ub85c\uc138\uc2a4\ub97c \uc228\uae30\uae30 \uc704\ud55c \uae30\uc220\ub3c4 \ubc1c\uc804\ud558\uace0 \uc788\ub2e4. \ub2e8\uc21c\ud788 login, ps, ls, find \ub4f1\uacfc \uac19\uc740 \ud504\ub85c\uadf8\ub7a8\uc744 \ubcc0\uc870\ud558\ub294 \uac83\uc774 \uc544\ub2c8\ub77c \ucee4\ub110\ub808\ubca8\uc5d0\uc11c \uc740\ub2c9\uae30\ub2a5\uc744 \uad6c\ud604\ud55c\ub2e4. \uc774\ubbf8 FreeBSD, linux\uc640 solaris\uc5d0 \ub300\ud55c \ucee4\ub110 \ubc31\ub3c4\uc5b4<b>[30]<\/b>\uac00 \uacf5\uac1c\ub418\uc5c8\ub2e4. \uc774\ub7ec\ud55c \ucee4\ub110 \ubc31\ub3c4\uc5b4\ub294 \uc0ac\uc2e4\uc0c1 \ud0d0\uc9c0\ud558\uae30\uac00 \ubd88\uac00\ub2a5\ud558\ub2e4. \uc608\ubc29\ud558\uae30 \uc704\ud574\uc11c\ub294 \ucee4\ub110\uc5d0\uc11c LKM \uae30\ub2a5\uc744 \uc81c\uac70\ud558\uba74 \ub418\uc9c0\ub9cc \ucd5c\uadfc \uc2e4\ud589\ub418\uace0 \uc788\ub294 \ucee4\ub110\uc5d0 \ucf54\ub4dc\ub97c \uc0bd\uc785\ud558\ub294 \ubc29\ubc95<b>[31]<\/b>\uc5d0 \uad00\ud55c \uae30\uc220\ub3c4 \uc774\ubbf8 \uc5b8\uae09\ub418\uace0 \uc788\uc5b4 \uc774 \ub610\ud55c \uc644\uc804\ud55c \ubc29\ubc95\uc740 \uc544\ub2c8\ub2e4.<\/p><p>\ubc31\ub3c4\uc5b4\uc758 \ud615\ud0dc \ubc0f \uae30\ub2a5 \ub610\ud55c \ub2e4\uc591\ud654\ub418\uace0 \uc788\ub2e4. \uacf5\uaca9\uc790\uac00 \ubc31\ub3c4\uc5b4\ub85c \uc5f0\uacb0\uc744 \ub9fa\ub294 \uc11c\ubc84 \uac1c\ub150\uc758 \ubc31\ub3c4\uc5b4\uc5d0\uc11c \ubc97\uc5b4\ub098 Reverse Pimpage<b>[32]<\/b>, reverse ssh<b>[33]<\/b>\uc640 \uac19\uc774 \ud074\ub77c\uc774\uc5b8\ud2b8 \ud615\uc2dd\uc758 \ubc31\ub3c4\uc5b4\uac00 \uc788\ub2e4. \uc774\ub294 \ub300\ubd80\ubd84\uc758 \uc0ac\uc774\ud2b8\uac00 \uc678\ubd80\ub85c \ub098\uac00\ub294 \ud328\ud0b7\uc5d0 \ub300\ud55c \ud544\ud130\ub9c1\uc744 \ud558\uc9c0\uc54a\ub294 \ubaa8\uc548\ubaa8\ub378\uc758 \ucde8\uc57d\uc810\uc744 \uc774\uc6a9\ud55c \uac83\uc774\ub2e4. tunneling \uae30\uc220\uc744 \uc774\uc6a9\ud558\uc5ec \ubaa8\ub4c8 \uc5c5\uadf8\ub808\uc774\ub4dc, \uc6d0\uaca9 \uacf5\uaca9\uba85\ub839 \uc218\ud589 \ub4f1\uc744 \uc218\ud589\ud558\ub294 \uc5d0\uc774\uc804\ud2b8 \ud615\ud0dc\uc758 \ubc31\ub3c4\uc5b4\ub3c4 \uc874\uc7ac\ud55c\ub2e4. \uc774\ub7ec\ud55c \uae30\ub2a5\uc774 \ucd94\uac00\ub418\uace0 \uc788\ub2e4\ub294 \uc0ac\uc2e4\uc740 \uacf5\uaca9\uc790\uac00 \uc9c0\uc18d\uc801\uc73c\ub85c \ubc31\ub3c4\uc5b4\ub97c \uc774\uc6a9\ud558\uaca0\ub2e4\ub294 \uc758\ubbf8\uc774\uba70, \uc218\ucc9c\ub300\uc758 \ud638\uc2a4\ud2b8\uac00 \uacf5\uaca9\uc5d0 \uc0ac\uc6a9\ub418\uc5c8\ub358 \ucd5c\uadfc\uc758 DDOS \uacf5\uaca9\uc5d0\uc11c\ucc98\ub7fc \ud5a5\ud6c4\uc758 \uacf5\uaca9\uc744 \uc900\ube44\ud55c\ub2e4\ub294 \uc758\ubbf8\ub85c \ubc1b\uc544\ub4e4\uc77c \uc218 \uc788\ub2e4.<\/p><p>\uac1c\uc778\uc801\uc778 \uc758\uacac\uc774\uc9c0\ub9cc, \"<b><i>\ucd5c\uadfc\uc758 \uae09\uaca9\ud55c \uacf5\uaca9 \uc99d\uac00\uc758 \uc0c1\ub2f9\uc218\uac00 \uc774\ub7ec\ud55c \ubc31\ub3c4\uc5b4\ub97c \uc2ec\uae30\uc704\ud55c \uc791\uc5c5\uc744 \uc704\ud55c \uac83\uc774\uba70, \uc774\ub294 \ud5a5\ud6c4 \ubcf4\uc548 \uc2dc\uc2a4\ud15c\uc774 \ubcf4\ud3b8\ud654\ub41c \ub4a4\uc5d0\ub3c4 \ubc31\ub3c4\uc5b4\ub97c \uc774\uc6a9\ud558\uc5ec \uacf5\uaca9\uc744 \ud6a8\uc728\uc801\uc73c\ub85c \uadf8\ub9ac\uace0 \uc9c0\uc18d\uc801\uc73c\ub85c \uc218\ud589\ud558\uae30 \uc704\ud55c \uac83\ucc98\ub7fc \ubcf4\uc778\ub2e4.\"<\/i><\/b><\/p><p><font color=\"#336699\">2.5 \uc545\uc131 \uc5d0\uc774\uc804\ud2b8<b>[34]<\/b><\/font><\/p><p>\uc708\ub3c4\uc6b0 \uc2dc\uc2a4\ud15c \uae30\ubc18\uc758 \uacf5\uaca9\ub3c4\uad6c\uac00 \uc99d\uac00\ud558\uace0 \uc788\ub2e4. \uc55e\uc11c \uc124\uba85\ud55c \ubc14\uc640 \uac19\uc774 \ubcf4\uc548\uc778\uc2dd\uc774 \uc5c6\ub294 \uc77c\ubc18 \uc0ac\uc6a9\uc790\ub97c \ub300\uc0c1\uc73c\ub85c \uacf5\uaca9\ud568\uc73c\ub85c\uc11c \ubcf4\uc548\uc2dc\uc2a4\ud15c\uc744 \uc6b0\ud68c\ud560 \uc218 \uc788\uae30 \ub54c\ubb38\uc774\ub2e4. \uadf8\ub9ac\uace0 \uc708\ub3c4\uc6b0 \uc2dc\uc2a4\ud15c\uc758 \uc131\ub2a5\ud5a5\uc0c1 \ub610\ud55c \uacf5\uaca9\uc790\ub85c \ud558\uc5ec\uae08 \uc708\ub3c4\uc6b0 \uc2dc\uc2a4\ud15c\uc744 \ub9e4\ub825\uc801\uc778 \uacf5\uaca9 \ubaa9\ud45c\ub85c \ub9cc\ub4e4\uace0 \uc788\ub2e4.<\/p><p>\ud074\ub77c\uc774\uc5b8\ud2b8\ub85c \uc0ac\uc6a9\ub418\ub294 \uc708\ub3c4\uc6b0 \uc2dc\uc2a4\ud15c\uc744 \uacf5\uaca9\ud558\uc5ec \uac00\uc7a5 \ud6a8\uc728\uc801\uc73c\ub85c \uc774\uc6a9\ud558\uae30 \uc704\ud55c \uc218\ub2e8\uc740 \uc5d0\uc774\uc804\ud2b8 \ud615\ud0dc\uc758 \ud504\ub85c\uadf8\ub7a8\uc774\ub2e4. \uc5d0\uc774\uc804\ud2b8\ub294 \uacf5\uaca9\uc790\uc758 \uba85\ub839\uc744 \ubc1b\uc544 \uacf5\uaca9\uc790 \ub300\uc2e0\uc5d0 \uacf5\uaca9\uc784\ubb34\ub97c \uc218\ud589\ud574 \uc8fc\uace0 \uadf8 \uacb0\uacfc\ub97c \ub2e4\uc591\ud55c \ubc29\ubc95\uc73c\ub85c \uc804\ub2ec\ud574 \uc904 \uc218 \uc788\ub2e4. \uc774\ub294 \uacf5\uaca9\uc790\ub85c \ud558\uc5ec\uae08 \uc2dc\uc2a4\ud15c\uc5d0 \ub85c\uadf8\uc778\ud558\uc9c0 \uc54a\uace0\ub3c4 \uc2dc\uc2a4\ud15c\uc744 \uc870\uc791\ud558\uac8c \ud568\uc73c\ub85c\uc11c \uacf5\uaca9\uc790\uc758 \ub178\ucd9c \uc704\ud5d8\uc744 \uc904\uc5ec\uc900\ub2e4. \uc774\ub7ec\ud55c \uc787\uc810 \ub54c\ubb38\uc5d0 \ud604\uc7ac \uc720\ub2c9\uc2a4 \uc2dc\uc2a4\ud15c\uc5d0\uc11c \uc0ac\uc6a9\ub418\ub294 \ubc31\ub3c4\uc5b4\ub098 \uacf5\uaca9\ub3c4\uad6c\ub4e4\ub3c4 \uc774\ub7ec\ud55c \uc5d0\uc774\uc804\ud2b8 \ud615\ud0dc\ub85c \ub098\ud0c0\ub098\uace0 \uc788\ub2e4.<\/p><p>\uc545\uc131 \uc5d0\uc774\uc804\ud2b8\ub294 \ubc14\uc774\ub7ec\uc2a4\uc758 \ud655\uc0b0\uae30\ub2a5, \uc2a4\ud30c\uc774 \uae30\ub2a5, \uc6d0\uaca9\uc81c\uc5b4 \uae30\ub2a5, \uc2dc\uc2a4\ud15c \uce68\uc785\uae30\ub2a5 \ub4f1 \ub2e4\uc591\ud55c \uae30\ub2a5\uc744 \uac00\uc9c0\uace0 \uc788\uc73c\uba70, \ubaa8\ub4e0 \ud2b9\uc131\uc744 \uac00\uc9c4 \uc545\uc131 \uc5d0\uc774\uc804\ud2b8\ub3c4 \uc874\uc7ac\ud55c\ub2e4. \uc774\ubbf8 \ubc31\uc624\ub7ec\ud53c\uc2a4\uc640 \uc720\uc0ac\ud55c \uc885\ub958\uc758 \uacf5\uaca9\ub3c4\uad6c\ub294 \uadf8 \uc218\uac00 \uc218\ubc31\uac00\uc9c0\uc5d0 \uc774\ub974\uba70, E-mail\uc744 \uc804\ud30c \ub9e4\uccb4\ub85c \uc0ac\uc6a9\ud558\ub294 \uc778\ud130\ub137 \uc6dc \ubc14\uc774\ub7ec\uc2a4\ub294 \uc774\ub7ec\ud55c \uacf5\uaca9\ub3c4\uad6c\ub97c \ub110\ub9ac \uc720\ud3ec\uc2dc\ud0ac \uc218 \uc788\ub294 \uc218\ub2e8\uc774 \ub420 \uc218 \uc788\ub2e4. \ub610\ud55c E-mail\ubfd0\ub9cc \uc544\ub2c8\ub77c \ube0c\ub77c\uc6b0\uc800 \ub4f1\uc758 \ubc84\uadf8\ub97c \uc774\uc6a9\ud558\uc5ec \uc77c\ubc18\uc801\uc778 \uc6f9\uc744 \ud1b5\ud558\uc5ec \uc720\ud3ec\ub420 \uc218\ub3c4 \uc788\uc5b4 \ub354\uc6b1 \uc704\ud5d8\ud55c \uacf5\uaca9\ubc29\ubc95\uc774 \ub41c\ub2e4.<\/p><p><font color=\"#336699\">2.6 \uc0ac\ud68c\uacf5\ud559\uae30\ubc95(Social Engineering)<b>[35]<\/b><\/font><\/p><p>\ubcf4\uc548\uc2dc\uc2a4\ud15c\uc774 \uc798 \uac16\ucd94\uc5b4\uc9c4 \uc0ac\uc774\ud2b8\ub97c \uacf5\uaca9\ud558\ub294 \uacbd\uc6b0\ub098, \uc870\uc9c1\ud654\ub41c \uacf5\uaca9 \ub610\ub294 \ub300\uaddc\ubaa8\uc758 \uacf5\uaca9\uc5d0 \uc788\uc5b4 \uc0ac\ud68c\uacf5\ud559\uae30\ubc95\uc740 \ud544\uc218\uc801\uc778 \uc694\uc18c\uc774\ub2e4. \uc0ac\uc2e4 \uc0ac\ud68c\uacf5\ud559\uae30\ubc95\uc740 \ub124\ud2b8\uc6cc\ud06c \uacf5\uaca9\uc5d0\uc11c \uc77c\ubc18\uc778\uc774 \ub9ce\uc774 \uac04\uacfc\ud558\ub294 \ubd80\ubd84\uc774\uba70, \ub530\ub77c\uc11c \ucd5c\uadfc\uc5d0 \uc774\ub7ec\ud55c \ucde8\uc57d\uc810\uc744 \uc774\uc6a9\ud55c \uacf5\uaca9\uc774 \uc99d\uac00\ud558\uace0 \uc788\ub2e4.<\/p><p>\uc0ac\ud68c\uacf5\ud559\uae30\ubc95\uc744 \uc774\uc6a9\ud55c \uac00\uc7a5 \ub300\ud45c\uc801\uc778 \uacf5\uaca9\uc740 \ubc14\ub85c \uba5c\ub9ac\uc0ac \ubc14\uc774\ub7ec\uc2a4\uc774\ub2e4. \uba5c\ub9ac\uc0ac \ubc14\uc774\ub7ec\uc2a4\ub294 \ud30c\uc774\uc5b4\uc6d4\uc5d0\uc11c \ud1b5\uc81c\ud558\uc9c0 \uc54a\ub294 E-mail\uc744 \uadf8 \uc804\ud30c \ub9e4\uccb4\ub85c \uc0ac\uc6a9\ud558\uace0 \uc788\ub294\ub370, \uc5ec\uae30\uc11c \uc8fc\ubaa9\ud560 \uac83\uc740 \uac10\uc5fc\ub41c \uc0ac\uc6a9\uc790\uc758 \uba54\uc77c \uc8fc\uc18c\ub85d\uc744 \ud1b5\ud574\uc11c \uc804\ud30c\ub41c\ub2e4\ub294 \uc810\uc774\ub2e4. \uc774\ub294 E-mail\uc0ac\uc6a9\uc790\ub4e4\uac04\uc758 \uc2e0\ub8b0\uad00\uacc4\ub97c \uc774\uc6a9\ud55c \uac83\uc73c\ub85c, \uadf8 \ud6a8\uacfc\ub294 \ud53c\ud574\uaddc\ubaa8\uac00 \ub9d0\ud574 \uc8fc\uace0 \uc788\ub2e4.<\/p><p>\ub610\ud55c \ucd5c\uadfc\uc5d0 \uacf5\uac1c\ub418\ub294 \uacf5\uaca9\ucf54\ub4dc\ub294 1524, 2222 \ub4f1 \ud2b9\uc815\ud3ec\ud2b8\ub97c \uac1c\ubc29\ud558\ub3c4\ub85d \ud558\ub294 \ubc31\ub3c4\uc5b4\ub97c \uc124\uce58\ud55c\ub2e4. \uadf8\ub9ac\uace0 \uc774\ub7ec\ud55c \ud504\ub85c\uadf8\ub7a8\uc740 \ub9e4\uc6b0 \uc27d\uac8c \ucef4\ud30c\uc77c\ub418\uace0 \uc2e4\uc81c \uacf5\uaca9\uc5d0\uc11c\ub3c4 \uc798 \uc2e4\ud589\ub41c\ub2e4. \uc774\ub294 \uc2a4\ud06c\ub9bd\ud2b8\ud0a4\ub514 \ub610\ub294 \uc6cc\ub108\ube44\ub4e4\uc774 \uc774\ub7ec\ud55c \uacf5\uac1c\ub41c \ucf54\ub4dc\ub97c \uac00\uc9c0\uace0 \ub9ce\uc740 \uc2dc\uc2a4\ud15c\uc744 \uacf5\uaca9\ud558\uac8c \ud558\uc5ec, \uc778\ud130\ub137\uc758 \ub9ce\uc740 \uc2dc\uc2a4\ud15c\uc744 \uc190\uc27d\uac8c \uacf5\uaca9\ud558\uace0\uc790 \ud558\ub294 \uc758\ub3c4\uac00 \uc788\uc744 \uc218 \uc788\ub2e4. \uc0ac\uc2e4, \uacf5\uaca9\ucf54\ub4dc\ub294 \uc77c\ubd80\ub7ec \ud2c0\ub9ac\uac8c \uc791\uc131\ud558\uc5ec \uacf5\uac1c\ud568\uc73c\ub85c\uc11c, \uc77c\ubc18\uc778 \ub610\ub294 \uc2a4\ud06c\ub9bd\ud2b8\ud0a4\ub514\ub4e4\uc774 \"\uc808\ub300 \uacf5\uc9dc\ub85c \uc27d\uac8c \uc815\ubcf4\ub97c \uc5bb\ub294 \uc77c\uc774 \uc5c6\ub3c4\ub85d \ud558\ub294\uac8c\" \uc77c\ubc18\uc801\uc778 \ud574\ucee4\uc758 \uc2b5\uc131\uc774\ub2e4.<\/p><p>\uc0ac\ud68c\uacf5\ud559\uae30\ubc95\uc744 \uc774\uc6a9\ud55c \uacf5\uaca9\uc740 \ubb34\uad81\ubb34\uc9c4\ud558\uba70, \ud0d0\uc9c0\ud558\uae30\uac00 \ub9e4\uc6b0 \uc5b4\ub835\ub2e4. \ub124\ud2b8\uc6cc\ud06c \uacf5\uaca9\uc740 \uae30\uc220\uc801\uc73c\ub85c\ub9cc \uc774\ub8e8\uc5b4\uc9c0\ub294 \uac83\uc774 \uc544\ub2c8\ub77c\ub294 \uac83\uc744 \uba85\uc2ec\ud558\uc5ec\uc57c \ud55c\ub2e4.<\/p><p><font color=\"#336699\">2.7 \uc0c8\ub85c\uc6b4 \uacf5\uaca9\uae30\ubc95\uc758 \ud2b9\uc9d5<\/font><\/p><p>\uc55e\uc11c \uc124\uba85\ud55c \ucd5c\uadfc \ubc1c\uacac\ub418\ub294 \uacf5\uaca9\ub3c4\uad6c\ub4e4\uc740 \uacf5\uaca9\uae30\ubc95\uc758 \uc0c8\ub85c\uc6b4 \ud328\ub7ec\ub2e4\uc784\uc778 \uc5d0\uc774\uc804\ud2b8\ud654, \ubd84\uc0b0\ud654, \uc790\ub3d9\ud654, \uc740\ub2c9\ud654\uc758 \ud2b9\uc9d5\uc744 \ubcf4\uc5ec\uc900\ub2e4. \uac01\uac01\uc758 \ud2b9\uc9d5\uc740 \ub3c5\ub9bd\uc801\uc778 \uae30\ub2a5\uc774\ub77c\uae30 \ubcf4\ub2e4 \"\ubcf4\ub2e4 \ud6a8\uc728\uc801\uc778 \uacf5\uaca9\"\uc774\ub77c\ub294 \ubaa9\ud45c\ub97c \ud5a5\ud558\uc5ec \uc0c1\ud638\uc758\uc874\uc801\uc73c\ub85c \ubc1c\uc804\ud558\uace0 \uc788\ub2e4. \uadf8\ub9ac\uace0 \uc774\ub7ec\ud55c \ubcc0\ud654\ub294 \uc774\ubbf8 \uc5b8\ub354\uadf8\ub77c\uc6b4\ub4dc\uc5d0\uc11c \uc2dc\uc791\ub418\uc5c8\uc73c\uba70, Yahoo, amazon \ub4f1 \uc720\uba85 \uc804\uc790\uc0c1\uac70\ub798 \uc0ac\uc774\ud2b8\uc5d0 \ub300\ud55c \ubd84\uc0b0 \uc11c\ube44\uc2a4\uac70\ubd80\uacf5\uaca9(DDOS, Distributed Denial Of Service)<b>[36]<\/b>\uc5d0\uc11c \ud45c\uba74\ud654\ub418\uc5c8\ub2e4.<\/p><p><font color=\"#336699\">2.7.1 \uc5d0\uc774\uc804\ud2b8\ud654<\/font><\/p><p>\uc804\ud1b5\uc801\uc778 \uacf5\uaca9\uae30\ubc95\uc5d0\uc11c\ub294 \uacf5\uaca9\uc790\uac00 \uce68\uc785\ud55c \uc2dc\uc2a4\ud15c\uc5d0 \ub2e4\uc2dc \ub85c\uadf8\uc778\ud558\uac70\ub098 \ub610\ub294 \ubc31\ub3c4\uc5b4\ub97c \ud1b5\ud558\uc5ec \uc7ac\uce68\uc785\ud558\uace0 \ub2e4\ub978 \uc2dc\uc2a4\ud15c\uc744 \uacf5\uaca9\ud558\ub294 \uacf5\uaca9\uc804\uc774 \ub2e8\uacc4\ub97c \uac70\uce58\ub294 \uac83\uc774 \uc77c\ubc18\uc801\uc774\uc5c8\uc73c\ub098 \ucd5c\uadfc\uc758 \uacf5\uaca9\uae30\ubc95\uc5d0\uc11c\ub294 \uc6d0\uaca9\uc73c\ub85c \uc870\uc815 \uac00\ub2a5\ud55c agent\ud615\uc758 \ubc31\ub3c4\uc5b4\ub97c \uc124\uce58\ud558\uace0 \uc774\ub97c \uc774\uc6a9\ud558\uc5ec \ub2e4\ub978 \uc2dc\uc2a4\ud15c\uc744 \uacf5\uaca9\ud558\ub294 \ubc29\ubc95\uc744 \uc0ac\uc6a9\ud55c\ub2e4. \uc774\ub294 \uacf5\uaca9\uc790\uac00 \ub9e4\ubc88 \ub85c\uadf8\ud30c\uc77c\uc5d0\uc11c \uc790\uc2e0\uc758 \ud754\uc801\uc744 \uc9c0\uc6cc\uc57c\ub9cc \ud558\ub294 \ubc88\uac70\ub85c\uc6c0\uc744 \uc5c6\uc560\uc8fc\uba70, \ub9ce\uc740 \uc2dc\uc2a4\ud15c\uc744 \uc774\uc6a9\ud558\uc5ec \ubd84\uc0b0 \uacf5\uaca9\uc744 \uc218\ud589\ud560 \ub54c \ub9e4\uc6b0 \ud6a8\uacfc\uc801\uc778 \ubc29\ubc95\uc774\ub2e4.<\/p><p><font color=\"#336699\">2.7.2 \ubd84\uc0b0\ud654<\/font><\/p><p>\uc804\ud1b5\uc801\uc778 \uacf5\uaca9\uae30\ubc95\uc5d0\uc11c\ub294 \ud558\ub098\uc758 \uc2dc\uc2a4\ud15c\uc5d0\uc11c \ub2e8\uc77c\uc758 \uacf5\uaca9\ub300\uc0c1 \uc2dc\uc2a4\ud15c\uc774\ub098 \ub300\uaddc\ubaa8\uc758 \uad11\ubc94\uc704\ud55c \ub124\ud2b8\uc6cc\ud06c\ub97c \ub300\uc0c1\uc73c\ub85c \uacf5\uaca9\uc744 \uc2dc\ub3c4\ud558\ub294 \ubc18\uba74, \uc0c8\ub85c\uc6b4 \uacf5\uaca9\uae30\ubc95\uc5d0\uc11c\ub294 \uce68\uc785\ud0d0\uc9c0\uc2dc\uc2a4\ud15c \ub4f1\uc758 \ubcf4\uc548 \uc2dc\uc2a4\ud15c\uc744 \uc6b0\ud68c\ud558\uae30 \uc704\ud558\uc5ec \ub9ce\uc740 \uc218\uc758 \uc2dc\uc2a4\ud15c\uc5d0\uc11c \ub2e8\uc77c\uc758 \uc2dc\uc2a4\ud15c \ub610\ub294 \ub2e4\uc218\uc758 \uc2dc\uc2a4\ud15c\uc744 \uacf5\uaca9\ud558\ub294 \ubc29\ubc95\uc744 \uc0ac\uc6a9\ud55c\ub2e4.&nbsp;<br \/><\/p><p>\ubd84\uc0b0 \uacf5\uaca9\uc740 \uc6d0\uaca9 \uba85\ub839\uc73c\ub85c \uacf5\uaca9\uc744 \uc218\ud589\ud558\uac70\ub098 \ub610\ub294 \ud328\ud0b7\uc744 \ub9b4\ub808\uc774 \ud574\uc8fc\ub294 \uc5d0\uc774\uc804\ud2b8\ud654 \ub41c \uacf5\uaca9\ub3c4\uad6c\ub97c \uc774\uc6a9\ud568\uc73c\ub85c\uc11c \uacf5\uaca9\uc790\uc758 \uc704\uce58\ub97c \uac10\ucd9c \uc218 \uc788\uc73c\uba70, \ubcf4\ub2e4 \ube60\ub974\uac8c \uacf5\uaca9\ub300\uc0c1 \uc2dc\uc2a4\ud15c\uc5d0 \ub300\ud55c \uc815\ubcf4\ub97c \uc218\uc9d1\ud560 \uc218 \uc788\ub2e4.<\/p><p><font color=\"#336699\">2.7.3 \uc790\ub3d9\ud654<\/font><\/p><p>\uc778\ud130\ub137 \uc6dc \ubc0f \uc708\ub3c4\uc6b0\uc6a9 \uacf5\uaca9\ub3c4\uad6c, \uadf8\ub9ac\uace0 \ucd5c\uadfc \uce68\ud574\uc0ac\uace0\uc5d0\uc11c \ubc1c\uacac\ub418\ub294 \uc790\ub3d9 \uacf5\uaca9 \uc2a4\ud06c\ub9bd\ud2b8\uc758 \uc99d\uac00\ub294 \uacf5\uaca9\ub3c4\uad6c\ub4e4\uc774 \uc790\ub3d9\ud654\ub418\uace0 \uc788\uc74c\uc744 \uc758\ubbf8\ud55c\ub2e4. \uadf8\ub9ac\uace0 \uc774\ub7ec\ud55c \uc790\ub3d9\ud654\ub294 \ubd84\uc0b0 \ub124\ud2b8\uc6cc\ud06c \uacf5\uaca9\uc744 \uac00\ub2a5\ud558\uac8c \ud55c\ub2e4.<\/p><p><font color=\"#336699\">2.7.4 \uc740\ub2c9\uc131<\/font><\/p><p>\uc5d0\uc774\uc804\ud2b8\ub97c \uc774\uc6a9\ud55c \ubd84\uc0b0 \uacf5\uaca9\uae30\ubc95\uc740 \uce68\uc785\ud0d0\uc9c0\uc2dc\uc2a4\ud15c\uc744 \ubb34\ub825\ud654\uc2dc\ud0a4\ub294 \uac00\uc7a5 \ud6a8\uacfc\uc801\uc778 \uacf5\uaca9\uae30\ubc95\uc73c\ub85c \uacf5\uaca9\uc790\uc758 \uc704\uce58\ub97c \uc740\ub2c9\uc2dc\ud0ac \uc218 \uc788\ub294 \uacf5\uaca9\uae30\ubc95\uc774\ub2e4. \uc774\ub7ec\ud55c \uc5d0\uc774\uc804\ud2b8\uc640 \uacf5\uaca9\uc790\uac04\uc758 \ud1b5\uc2e0\uc740 \uc554\ud638\ud654 \ubc0f tunneling \uae30\ubc95\uc744 \uc0ac\uc6a9\ud558\uc5ec \ud0d0\uc9c0\ud558\uae30 \uc5b4\ub835\ub3c4\ub85d \ud55c\ub2e4.<\/p><p><b>3. \uc0c8\ub85c\uc6b4 \ub124\ud2b8\uc6cc\ud06c \uacf5\uaca9\uc758 \ubc1c\uc804\ubc29\ud5a5<\/b>&nbsp;<br \/><\/p><p>\uc55e\uc11c \uc124\uba85\ud55c \ubc14\uc640 \uac19\uc774 \uc0c8\ub85c\uc6b4 \uacf5\uaca9\uae30\ubc95\uc740 \uc5d0\uc774\uc804\ud2b8\ud654, \ubd84\uc0b0\ud654, \uc790\ub3d9\ud654, \uc740\ub2c9\ud654\ub97c \ucd94\uad6c\ud558\uace0 \uc788\uc73c\uba70, \uacf5\uaca9 \uc6a9\ub3c4\uc5d0 \ub530\ub77c \ud2b9\uc815 \uae30\ub2a5\ub9cc\uc744 \uc774\uc6a9\ud558\uac70\ub098 \ub610\ub294 \uc774\ub7ec\ud55c \ubaa8\ub4e0 \uae30\ub2a5\uc744 \uac00\uc9c4 \uc545\uc131 \uc5d0\uc774\uc804\ud2b8 \ub610\ub294 \uacf5\uaca9\ub3c4\uad6c\uac00 \ub098\ud0c0\ub0a0 \uac83\uc774\ub2e4. \ub610\ud55c WAP, PDA \ub4f1\uc758 \"<b><i>\uc778\ud130\ub137 \uc5b4\ud50c\ub9ac\ucf00\uc774\uc158\uc774 \ub9ce\uc544\uc9c8\uc218\ub85d \uadf8\uc5d0 \ube44\ub840\ud558\uc5ec \uacf5\uaca9\ubc29\ubc95\ub3c4 \ub2e4\uc591\ud574 \uc9c8 \uac83\uc774\uba70, \uc774\ub7ec\ud55c \uacf5\uaca9\uc744 \ud0d0\uc9c0\ud558\uace0, \ub300\uc751\ud558\uae30 \uc704\ud574\uc11c\ub294 \ub354\uc6b1 \ub9ce\uc740 \ub178\ub825\uacfc \ube44\uc6a9\uc774 \uc694\uad6c\ub420 \uac83\uc774\ub2e4<\/i><\/b><i>.\"<\/i><\/p><p>\ub124\ud2b8\uc6cc\ud06c \uacf5\uaca9\uc740 \uc11c\ubc84\ub97c \ub300\uc0c1\uc73c\ub85c \ud558\ub294 \uacf5\uaca9\ubcf4\ub2e4 \uc0c1\ub300\uc801\uc73c\ub85c \ubcf4\uc548\uc778\uc2dd\uc774 \uc5c6\ub294 \uc77c\ubc18\uc0ac\uc6a9\uc790\ub97c \ub300\uc0c1\uc73c\ub85c \ud558\ub294 \uacf5\uaca9\uc774 \uc99d\uac00\ud558\uace0 \uc788\uc73c\uba70, \uc55e\uc73c\ub85c\ub3c4 \uc9c0\uc18d\uc801\uc73c\ub85c \ubc1c\uc804\/\uc99d\uac00\ud560 \uac83\uc774\ub2e4. \uc65c\ub0d0\ud558\uba74, \uc544\uc9c1 \uac1c\uc778 \uc0ac\uc6a9\uc790\uc5d0 \ub300\ud55c \ubcf4\uc548\uc778\uc2dd \ubc0f \ubcf4\uc548\ub300\ucc45\uc774 \ubbf8\ube44\ud558\uae30 \ub54c\ubb38\uc774\ub2e4. \ub124\ud2b8\uc6cc\ud06c \uacf5\uaca9 \ub610\ud55c \uc2e4\uc138\uacc4\uc5d0\uc11c\uc758 \uacf5\uaca9\uacfc \ub9c8\ucc2c\uac00\uc9c0\ub85c \uac00\uc7a5 \ucde8\uc57d\ud55c \ubd80\ubd84\uc744 \ucc3e\uc544 \uacf5\uaca9\ud558\uae30 \ub9c8\ub828\uc774\ub2e4.&nbsp;<br \/><\/p><p>\uc778\ud130\ub137\uc758 \ubc1c\uc804 \uc18d\ub3c4\uc640 \ube44\ub840\ud558\uc5ec \ub124\ud2b8\uc6cc\ud06c \uacf5\uaca9\uae30\ubc95\ub3c4 \uc99d\uac00\ud55c\ub2e4. \uc778\ud130\ub137\uacfc \uad00\ub828\ub41c \uc218\ub9ce\uc740 \uc5b4\ud50c\ub9ac\ucf00\uc774\uc158\uc758 \ubc1c\uc804\uacfc \ub354\ubd88\uc5d0 \uadf8\uc5d0 \ub530\ub974\ub294 \ucde8\uc57d\uc810 \ubc0f \uacf5\uaca9\uae30\ubc95\uc774 \ub2e4\uc591\ud654\ub418\uace0 \uc788\ub2e4. \uc0c8\ub85c\uc6b4 \uc778\ud130\ub137 \ub9e4\uccb4\ub294 \uc545\uc131 \uc5d0\uc774\uc804\ud2b8\uc758 \uc720\ud3ec\uc5d0 \uc0ac\uc6a9\ub420 \uc218 \uc788\uc73c\uba70, \ub9e4\uc77c \uc0c8\ub86d\uac8c \ub4f1\uc7a5\ud558\ub294 \uc778\ud130\ub137 \uc5b4\ud50c\ub9ac\ucf00\uc774\uc158\ub4e4\uc740 \uc7a0\uc7ac\uc801\uc778 \ucde8\uc57d\uc131 \ub610\ub294 \ubc84\uadf8\ub97c \ud3ec\ud568\ud55c\ub2e4. \uadf8\ub9ac\uace0 OS, \uc2dc\uc2a4\ud15c \ub610\ub294 \ub124\ud2b8\uc6cc\ud06c \ud504\ub85c\ud1a0\ucf5c\uacfc \uad00\ub828\ub41c \ubc84\uadf8\ubcf4\ub2e4\ub294 \uc5b4\ud50c\ub9ac\ucf00\uc774\uc158 \uacc4\uce35\uc5d0\uc11c\uc758 \ucde8\uc57d\uc810\uc774 \uc9c0\uc18d\uc801\uc73c\ub85c \ub9ce\uc774 \ubc1c\uacac\ub418\uace0 \uacf5\uaca9\uc5d0 \uc0ac\uc6a9\ub420 \uac83\uc774\ub2e4.&nbsp;<br \/><\/p><p>\uc778\ud130\ub137 \uacf5\uaca9\uc774 \uacbd\uc81c\uc801 \ubaa9\uc801\ubfd0\ub9cc\uc774 \uc544\ub2c8\ub77c \uc815\uce58\uc801 \ubaa9\uc801\uc73c\ub85c \uc0ac\uc6a9\ub420 \uac00\ub2a5\uc131\uc774 \ub192\uc544\uc9c0\uace0 \uc788\ub2e4. \uacbd\uc81c\uc801 \ubaa9\uc801\ubfd0\ub9cc\uc774 \uc544\ub2c8\ub77c \uc815\uce58\uc801\uc73c\ub85c \uc774\uc6a9\ud558\uae30 \uc704\ud574\uc11c DDOS\uc640 \uac19\uc740 \uacf5\uaca9\uc744 \uc218\ud589\ud560 \uc218\ub3c4 \uc788\uc744 \uac83\uc774\ub2e4. \uc774\ub294 \uc608\uc804\uc758 \ud648\ud398\uc774\uc9c0 \ubcc0\uc870, \uc790\ub8cc\uc720\ucd9c \ub4f1\uc758 \ud53c\ud574 \ucc28\uc6d0\uc758 \uacf5\uaca9\uc774\uae30 \ubcf4\ub2e4\ub294 \uc5ec\ub860 \ubc0f \uc778\ud130\ub137 \ucee4\ubba4\ub108\ud2f0\ub97c \uc6c0\uc9c1\uc774\uae30 \uc704\ud55c \ubcf4\ub2e4 \uc870\uc9c1\uc801\uc774\uace0 \uad50\ubb18\ud55c \uacf5\uaca9\uc774 \ub420 \uc218\ub3c4 \uc788\ub2e4\ub294 \uac83\uc774\ub2e4. \uadf8\ub9ac\uace0 \uc774\ub7ec\ud55c \uc758\ub3c4\uc801\uc778 \uacf5\uaca9\uc740 \uadf8 \ubaa8\ud2f0\ube0c\ub97c \ucc3e\uae30\uac00 \ubd88\uac00\ub2a5\ud560 \uac83\uc774\ub2e4. \uc774\uc5d0 \ub300\ud574\uc11c\ub294 \uadf8 \uac00\ub2a5\uc131\ub9cc\uc774 \uc788\uc744\ubfd0 \uc774\ub97c \uc785\uc99d\ud560 \ub9cc\ud55c \uc790\ub8cc\ub294 \ucc3e\uc544\ubcf4\uae30 \ud798\ub4e4\ub2e4(2000\ub144 2\uc6d4 DDOS \uc0ac\uac74\uacfc \ucd5c\uadfc MS \ud574\ud0b9\uc0ac\uace0 \ub4f1\uc5d0\uc11c \uba87\uba87 \uc228\uaca8\uc9c4 \uc758\ub3c4\uc5d0 \ub300\ud55c \uc758\ubb38\uc774 \uc81c\uae30\ub418\uae30\ub3c4 \ud588\uc5c8\ub2e4). \ud558\uc9c0\ub9cc \uc774\ubbf8 \uc778\ud130\ub137\uc740 \uc138\uacc4 \uacbd\uc81c\uc758 \uc911\uc2ec\uc5d0 \uc11c\uc788\ub2e4\ub294 \uc0ac\uc2e4\uc5d0 \uc8fc\ubaa9\ud558\uc5ec\uc57c \ud55c\ub2e4.<\/p><p><\/p><p><\/p><hr noshade=\"\" size=\"1\"><\/font><span style=\"color: rgb(0, 0, 0); font-family: Gulim; font-size:12pt; line-height: normal;\"><\/span><p align=\"right\" style=\"color: rgb(0, 0, 0); font-family: Gulim; font-size:12pt; line-height: normal;\"><font size=\"2\" face=\"\ub3cb\uc6c0\"><a href=\"http:\/\/www.superuser.co.kr\/security\/certcc\/attack-shift-part1v1.0.htm#top\">Top<\/a><\/font><\/p><font size=\"2\" face=\"\ub3cb\uc6c0\" style=\"color: rgb(0, 0, 0); line-height: normal;\"><p><\/p><p><b>[ Reference]<\/b>&nbsp;<br \/><\/p><p><\/p><p>[1] know Your Enemy : I, II, III, Lance Spitzner, 2000. 7<\/p><p><a href=\"http:\/\/www.enteract.com\/~lspitz\/enemy.html\">http:\/\/www.enteract.com\/~lspitz\/enemy.html<\/a><\/p><p>-&nbsp;<b>Know Your Enemy<\/b>&nbsp;\uc2dc\ub9ac\uc988 \ud648\ud398\uc774\uc9c0\ub85c \ube14\ub799\ud587(Black Hat) \ucee4\ubba4\ub108\ud2f0\uc5d0 \ub300\ud558\uc5ec \uc5f0\uad6c\ud558\ub294 \uc0ac\uc774\ud2b8\uc774\ub2e4. \ub610\ud55c \ubcf8 \uc0ac\uc774\ud2b8\ub97c\uc911\uc2ec\uc73c\ub85c HoneyPot \ud504\ub85c\uc81d\ud2b8\ub97c \uc218\ud589\ud558\uace0 \uc788\ub294\ub370 \ub300\ubd80\ubd84\uc758 \ucc38\uac00\uc790\ub4e4\uc774 \uc218\uc900\uc788\ub294 \ubcf4\uc548 \uc804\ubb38\uac00\ub4e4\uc774\ub2e4.&nbsp;<br \/><\/p><p><\/p><p>[2] Network Scanning Techniques, Sys-Security Group, Ofir Arkin, 1999.9<\/p><p><a href=\"http:\/\/www.sys-security.com\/html\/papers.html\">http:\/\/www.sys-security.com\/html\/papers.html<\/a><\/p><p>- \ub124\ud2b8\uc6cc\ud06c \uc815\ubcf4\uc218\uc9d1\uc744 Foot printing, Scanning, Enumeration\ub85c \ub098\ub204\uc5b4 \uc124\uba85\ud558\uace0 \uac01 \ub2e8\uacc4\uc5d0\uc11c \uc0ac\uc6a9\ud558\ub294 \uae30\uc220\uc744 \uc804\ubc18\uc801\uc73c\ub85c \uac04\ub7b5\ud788 \uc124\uba85\ud55c\ub2e4. \uc124\uba85\uc758 \uae4a\uc774\ub294 \ub0ae\uc9c0\ub9cc \uc0c1\ub2f9\ud788 \ub9ce\uc740 \ubd80\ubd80\uc744 \ucee4\ubc84\ud55c\ub2e4.&nbsp;<br \/><\/p><p><\/p><p>[3] The Art of Port Scanning, Phrack Magazine Volume 7, Issue 51 September 01, 1997, article 11 of 17 Fyodor &lt;fyodor@dhp.com&gt;<\/p><p><a href=\"http:\/\/packetstorm.securify.com\/mag\/phrack\/phrack51\/P51-11\">http:\/\/packetstorm.securify.com\/mag\/phrack\/phrack51\/P51-11<\/a><\/p><p>- vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN\/FIN scanning using IP fragments (bypasses packet filters), UDP recvfrom() scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), reverse-ident scanning \uae30\uc220\uc744 \uc124\uba85\ud55c\ub2e4.&nbsp;<br \/><\/p><p>Sscan \ubd84\uc11d \ubcf4\uace0\uc11c, CERTCC-KR, \uc815\ud604\ucca0, 1999.2<\/p><p><a href=\"http:\/\/www.certcc.or.kr\/paper\/tr1999\/1999003\/Docs\/tr1999003.html\">http:\/\/www.certcc.or.kr\/paper\/tr1999\/1999003\/Docs\/tr1999003.html<\/a>&nbsp;<br \/><\/p><p>Mscan \ubd84\uc11d \ubcf4\uace0\uc11c, CERTCC-KR, \uae40\uc0c1\uc815, 1998.8<\/p><p><a href=\"http:\/\/www.certcc.or.kr\/paper\/tr1998007.html\">http:\/\/www.certcc.or.kr\/paper\/tr1998007.html<\/a>&nbsp;<br \/><\/p><p><\/p><p>[4] Remote OS detection via TCP\/IP Stack FingerPrinting, Fyodor, 1998.10.18<\/p><p><a href=\"http:\/\/www.nmap.org\/nmap\/nmap-fingerprinting-article.html\">http:\/\/www.nmap.org\/nmap\/nmap-fingerprinting-article.html<\/a><\/p><p>- FIN probe, BOGUS Flag probe, TCP ISN Sampling, Don't fragment bit, TCP initial Window, ICMP error message quenching, type of service, Fragmentation handling \ub4f1\uc758 \ubc29\ubc95\uc744 \uc774\uc6a9\ud558\uc5ec \uc6d0\uaca9\uc9c0 \uc2dc\uc2a4\ud15c\uc758 OS \ubc84\uc804\uc744 \uc2a4\uce94\ud55c\ub2e4.&nbsp;<br \/><\/p><p><\/p><p>[5] QueSO<\/p><p><a href=\"http:\/\/www.apostols.org\/projectz\/queso\">http:\/\/www.apostols.org\/projectz\/queso<\/a><\/p><p>- \uc6d0\uaca9 \uc2dc\uc2a4\ud15c\uc758 OS\ub97c \ud0d0\uc9c0\ud558\uae30 \uc704\ud55c \ub3c4\uad6c\ub85c SYN+ACK, FIN, FIN+ACK, SYN+FIN, PSH, SYN+XXX+YY(XXX &amp; YYY : unused TCP flags) \ub4f1\uc758 \ud328\ud0b7\uc744 \ubcf4\ub0b4 \uadf8 \uc751\ub2f5\uc744 \ubd84\uc11d\ud558\uc5ec OS \uc885\ub958 \ubc0f \ubc84\uc804\uc744 \uc54c\uc544\ub0b8\ub2e4.&nbsp;<br \/><\/p><p><\/p><p>[6] Firewalk\ubd84\uc11d\ubcf4\uace0\uc11c, CERTCC-KR, \uc774\ud604\uc6b0, 1998.12<\/p><p><a href=\"http:\/\/www.certcc.or.kr\/paper\/tr1998019.html\">http:\/\/www.certcc.or.kr\/paper\/tr1998019.html<\/a><\/p><p><a href=\"http:\/\/www.packetfactory.net\/Projects\/Firewalk\/\">http:\/\/www.packetfactory.net\/Projects\/Firewalk\/<\/a><\/p><p>- \uac8c\uc774\ud2b8\uc6e8\uc774\uc758 \uc811\uadfc\uc81c\uc5b4\ub9ac\uc2a4\ud2b8 \ud544\ud130\ub9c1\uc744 \uc2a4\uce94\ud558\uac70\ub098 \ub124\ud2b8\uc6cc\ud06c \ud1a0\ud3f4\ub7ec\uc9c0\ub97c \uc2a4\uce94\ud558\uae30 \uc704\ud55c \uae30\uc220\ub85c \ubcc0\ud615\ub41c traceroute\ub97c \uc774\uc6a9, \uac8c\uc774\ud2b8\uc6e8\uc774\uc758 \uc5f4\ub9b0 \ud3ec\ud2b8\ub97c \uc54c\uc544\ub0bc \uc218\ub3c4 \uc788\uc73c\uba70, \ub610\ud55c \ud328\ud0b7 \ud544\ud130\ub9c1 \uc7a5\uce58\ub85c \ubcf4\ud638\ub418\ub294 \ub0b4\ubd80\uc758 \ub77c\uc6b0\ud130\ub97c \uc54c\uc544\ub0bc \uc218\ub3c4 \uc788\ub2e4.&nbsp;<br \/><\/p><p><\/p><p>[7] hping2<\/p><p><a href=\"http:\/\/www.kyuzz.org\/antirez\/hping\/\">http:\/\/www.kyuzz.org\/antirez\/hping\/<\/a><\/p><p>- \uc784\uc758\uc758 ICMP\/UDP\/TCP \ud328\ud0b7\uc744 \ub9cc\ub4e4\uc5b4 \ubcf4\ub0b4\uace0 \uadf8 \uc751\ub2f5\uc744 \ubcfc \uc218 \uc788\ub3c4\ub85d \ub9cc\ub4e0 \ud504\ub85c\uadf8\ub7a8\uc73c\ub85c firewal rules \ud14c\uc2a4\ud2b8, [spoofed] port scanning, \uc131\ub2a5 \ud14c\uc2a4\ud2b8, Path MTU discovery, Files trasfer, \ub2e4\uc591\ud55c \ud504\ub85c\ud1a0\ucf5c\uc744 \uc774\uc6a9\ud55c traceroute, Remote OS fingerprin, TCP\/IP stack auditing \ub4f1\uc758 \uc791\uc5c5\uc744 \ud560 \uc218 \uc788\ub2e4.&nbsp;<br \/><\/p><p><\/p><p>[8] network map(nmap)<\/p><p><a href=\"http:\/\/www.nmap.org\/\">http:\/\/www.nmap.org\/<\/a><\/p><p>- \ubc94\uc6a9 \ub124\ud2b8\uc6cc\ud06c \uc2a4\uce94\ub3c4\uad6c\ub85c \uc2a4\uce94\uacfc \uad00\ub828\ub41c \ub300\ubd80\ubd84\uc758 \uae30\ub2a5\uc774 \uad6c\ud604\ub418\uc5b4 \uc788\ub2e4.&nbsp;<br \/><\/p><p><\/p><p>[9] Smashing The Stack For Fun And Profit, Aleph One, Phrack magezine Volume Seven Issue Forty-Nine File 14 of 16<\/p><p><a href=\"http:\/\/www.phrack.com\/\">http:\/\/www.phrack.com\/<\/a>&nbsp;<br \/><\/p><p><\/p><p>[10] Computer Vulnerabilities, Security Paradigm Eric Knight<\/p><p><a href=\"http:\/\/www.securityparadigm.com\/compvuln_draft.pdf\">http:\/\/www.securityparadigm.com\/compvuln_draft.pdf<\/a><\/p><p>- \uc2dc\uc2a4\ud15c \ucde8\uc57d\uc810\uc5d0 \ub300\ud558\uc5ec \ubd84\ub958 \ubc0f \uc815\ub9ac&nbsp;<br \/><\/p><p><a href=\"http:\/\/cve.mitre.org\/\">http:\/\/cve.mitre.org\/<\/a><\/p><p><a href=\"http:\/\/www.securityfocus.com\/\">http:\/\/www.securityfocus.com\/<\/a><\/p><p><a href=\"http:\/\/xforce.iss.net\/index.php\/\">http:\/\/xforce.iss.net\/index.php\/<\/a><\/p><p>- \ucd5c\uadfc\uc5d0 \ubc1c\uacac\ub418\ub294 \ub124\ud2b8\uc6cc\ud06c \ubc0f \uc2dc\uc2a4\ud15c \ucde8\uc57d\uc810 \uc815\ubcf4\ub97c \uc81c\uacf5\ud558\ub294 \ub300\ud45c\uc801\uc778 \uc0ac\uc774\ud2b8\ub85c \uacf5\uaca9\ucf54\ub4dc\uae4c\uc9c0\ub3c4 \uacf5\uac1c\ub41c\ub2e4. CVE(Commen Vulnerability Exposure)\uc758 \uacbd\uc6b0 \ub3d9\uc77c\ud55c \ucde8\uc57d\uc810\uc774 \uc5ec\ub7ec \ub2e4\ub978 \uc774\ub984\uc73c\ub85c \ubd88\ub9ac\ub294 \uac83\uc744 \ubc29\uc9c0\ud558\uace0 \ucde8\uc57d\uc810\uc5d0 \ub300\ud55c \uc2e0\ub8b0\uc131 \uc788\ub294 \uc815\ubcf4\ub97c \uc81c\uacf5\ud558\uae30 \uc704\ud574 \ub9cc\ub4e4\uc5b4\uc9c4 \uae30\uad00\uc774\ub2e4. securityfocus\uc758 \uacbd\uc6b0 bugtraq\uc774\ub77c\ub294 \uba54\uc77c\ub9c1\ub9ac\uc2a4\ud2b8\ub97c \ud1b5\ud558\uc5ec \ucd5c\uadfc\uc758 \ubc84\uadf8\uc5d0 \ub300\ud558\uc5ec \ud1a0\ub860\ud558\uace0 \uc774\ub97c \uc815\ub9ac\ud558\uc5ec \uc62c\ub824\ub193\uace0 \uc788\ub2e4.&nbsp;<br \/><\/p><p><\/p><p>[11] \ud2b8\ub85c\uc774 \ubaa9\ub9c8\uc640 \ubc31\ub3c4\uc5b4 \ubd84\uc11d \ubcf4\uace0\uc11c, CERTCC-KR, \uc815\ud604\ucca0,<\/p><p><a href=\"http:\/\/www.certcc.or.kr\/paper\/tr1999\/1999006\/Docs\/tr1999006.html\">http:\/\/www.certcc.or.kr\/paper\/tr1999\/1999006\/Docs\/tr1999006.html<\/a><\/p><p><a href=\"http:\/\/www.securitymap.net\/tools\/backdoor\">http:\/\/www.securitymap.net\/tools\/backdoor<\/a>&nbsp;<br \/><\/p><p><\/p><p>[12] Sniffer FAQ<\/p><p><a href=\"http:\/\/www.robertgraham.com\/pubs\/sniffing-faq.html\">http:\/\/www.robertgraham.com\/pubs\/sniffing-faq.html<\/a>&nbsp;<br \/><\/p><p>\ub124\ud2b8\uc6cc\ud06c \uc2a4\ub2c8\ud551 \uae30\uc220 \ubc0f \ubc29\uc9c0\ub300\ucc45, CERTCC-KR, \ubc15\ud604\ubbf8\/\uc2e0\uc740\uacbd\/\uc774\ud604\uc6b0<\/p><p><a href=\"http:\/\/www.certcc.or.kr\/paper\/tr2000\/2000-07\/tr2000-07.htm\">http:\/\/www.certcc.or.kr\/paper\/tr2000\/2000-07\/tr2000-07.htm<\/a>&nbsp;<br \/><\/p><p><\/p><p>[13] CERTCC-KR \uce68\ud574\uc0ac\uace0 \ud604\ud669<\/p><p><a href=\"http:\/\/www.certcc.or.kr\/statistics\/hack\/hack.htm\">http:\/\/www.certcc.or.kr\/statistics\/hack\/hack.htm<\/a><\/p><p>- CERTCC-KR\uc758 \ud1b5\uacc4\uc790\ub8cc\ub97c \ubcf4\uba74 \ud574\ud0b9\uc0ac\uace0\uc758 \ub9ce\uc740 \ubd80\ubd84\uc774 \uacbd\uc720\uc9c0\ub85c \uc0ac\uc6a9\ub41c \uacbd\uc6b0\uc784\uc744 \uc54c\uc218 \uc788\ub2e4.&nbsp;<br \/><\/p><p><\/p><p>[14] FIRST Team Info<\/p><p><a href=\"http:\/\/www.first.org\/team-info\/\">http:\/\/www.first.org\/team-info\/<\/a><\/p><p>- \uce68\ud574\uc0ac\uace0 \ub300\uc751\uc744 \uc704\ud55c CERT\ud300\uac04\uc758 \uacf5\uc870\ub97c \uc704\ud55c \uae30\uad6c\ub85c \ud604\uc7ac \uc218 \ub9ce\uc740 \uad6d\uac00\uc758 CERT\ud300\ub4e4\uc774 \uac00\uc785\ud574 \uc788\ub2e4. \uc774\ub4e4 CERT\uac04\uc758 \ud611\ub825\uc740 \uacf5\uaca9\uc790\uc758 \ud65c\ub3d9\ubc94\uc704\ub97c \ub9ce\uc774 \ucd95\uc18c\uc2dc\ud0a4\uace0\ub294 \uc788\uc73c\ub098, \ub300\ubd80\ubd84 ORG \uc131\uaca9\uc744 \uac00\uc9c0\uace0 \uc788\uc5b4 \uc801\uadf9\uc801\uc778 \uacf5\uaca9\ub300\uc751\uc744 \ud558\uc9c0 \ubabb\ud558\uace0, \ub2e4\ub9cc \uc608\ubc29 \ubc0f \uce68\ud574\uc0ac\uace0\uc758 \ud655\uc0b0 \ubc29\uc9c0\uc5d0\ub9cc \ub178\ub825\ud558\uace0 \uc788\ub2e4.&nbsp;<br \/><\/p><p><\/p><p>[15] Project Loki, daemon9\/alhambra, Phrack magezine Volume Seven Issue Forty-Nine File 06 of 16, 1996.<\/p><p><a href=\"http:\/\/www.phrack.com\/\">http:\/\/www.phrack.com<\/a><\/p><p>- Covert channel\uc5d0 \ub300\ud55c \uac1c\ub150\uc744 \ucc98\uc74c\uc73c\ub85c(?) \uc18c\uac1c\ud55c \ubb38\uc11c\ub85c \uc544\uc8fc \uc815\uc0c1\uc801\uc73c\ub85c \ubcf4\uc774\ub294 Ping traffic\uc744 \uc774\uc6a9\ud558\uc5ec \ub370\uc774\ud130\ub97c \uc8fc\uace0\ubc1b\uc744 \uc218 \uc788\ub294 \ucc44\ub110\uc744 \ud615\uc131\ud558\ub294 \ubc29\ubc95\uc744 \ubcf4\uc5ec\uc900\ub2e4. \ucd5c\uadfc\uc758 \uc545\uc131 \uc5d0\uc774\uc804\ud2b8\uc5d0\uc11c\ub294 \uc774\ub7ec\ud55c Ping \ud328\ud0b7\uc5d0 \uacf5\uaca9\uba85\ub839 \uc815\ubcf4\ub97c \uc554\ud638\ud654 \ud558\uc5ec \ubcf4\ub0b4\ub294 \ubc29\ubc95\uc744 \uc0ac\uc6a9\ud558\uae30\ub3c4 \ud55c\ub2e4.&nbsp;<br \/><\/p><p><\/p><p>[16] libpcap, Packet Capture Library<\/p><p>- \ub124\ud2b8\uc6cc\ud06c\uc0c1\uc758 \ud328\ud0b7\uc744 \uc77d\uc5b4 BPF \ubc29\uc2dd\uc73c\ub85c \ud544\ud130\ub9c1\uc744 \uc81c\uacf5\ud574 \uc8fc\ub294 \ub77c\uc774\ube0c\ub7ec\ub9ac\ub85c, \uce68\uc785\ud0d0\uc9c0\uc2dc\uc2a4\ud15c, \uc2a4\ub2c8\ud37c \ub4f1 \uc218\ub9ce\uc740 \ubcf4\uc548 \ub610\ub294 \uacf5\uaca9\uc6a9 \ud504\ub85c\uadf8\ub7a8\uc5d0\uc11c \uc0ac\uc6a9\ud55c\ub2e4.&nbsp;<br \/><\/p><p><\/p><p>[17] Libnet, Packet Assembly System<\/p><p><a href=\"http:\/\/www.packetfactory.net\/Projects\/Libnet\/\">http:\/\/www.packetfactory.net\/Projects\/Libnet\/<\/a><\/p><p>- \ub124\ud2b8\uc6cc\ud06c \ud328\ud0b7\uc744 \ub9cc\ub4e4 \uc218 \uc788\ub3c4\ub85d \ub3c4\uc640\uc8fc\ub294 \ub77c\uc774\ube0c\ub7ec\ub9ac\ub85c \ub85c\ub808\ubca8\uc5d0\uc11c\uc758 \ud328\ud0b7 \uc0dd\uc131 \ubc0f \uc870\uc791\uc744 \uac00\ub2a5\ud558\uac8c \ud55c\ub2e4. Hijacking \ud504\ub85c\uadf8\ub7a8 \ub610\ub294 \ub124\ud2b8\uc6cc\ud06c \uc5f0\uacb0\uc744 \uad00\ub9ac\ud574 \uc8fc\ub294 \ud504\ub85c\uadf8\ub7a8 \ub4f1\uc5d0\uc11c \uc0ac\uc6a9\ud55c\ub2e4.&nbsp;<br \/><\/p><p><\/p><p>[18] Back Orifice \ubd84\uc11d \ubcf4\uace0\uc11c, CERTCC-KR, \uc2e0\ud6c8, 1998. 8<\/p><p><a href=\"http:\/\/www.certcc.or.kr\/paper\/tr1998005.html\">http:\/\/www.certcc.or.kr\/paper\/tr1998005.html<\/a>&nbsp;<br \/><\/p><p><\/p><p>[19] Hacker Society, Gilbert Alaverdian,<\/p><p><a href=\"http:\/\/www.neo.net.au\/papers\/\">http:\/\/www.neo.net.au\/papers\/<\/a>[neo]hacker_society.html<\/p><p>- \uc5b8\ub354\uadf8\ub77c\uc6b4\ub4dc \ud574\ucee4\uc758 \uc0ac\ud68c \uaddc\ubc94, \ucf54\ub4dc, \uaddc\uc815 \ub4f1\uc5d0 \ub300\ud558\uc5ec \uc124\uba85\ud558\uace0, \ud574\ucee4\uc758 \ubd84\ub958\uc5d0 \ub300\ud55c \uc790\ub8cc\uc774\ub2e4.&nbsp;<br \/><\/p><p><\/p><p>[20] Win\/Trin00<\/p><p><a href=\"http:\/\/packetstorm.securify.com\/distributed\/razor.wintrinoo.txt\">http:\/\/packetstorm.securify.com\/distributed\/razor.wintrinoo.txt<\/a><\/p><p>- \uc720\ub2c9\uc2a4\uc758 Trin00\uc5d0 \ud574\ub2f9\ud558\ub294 \uc708\ub3c4\uc6b0\uc6a9 \uacf5\uaca9 \uc5d0\uc774\uc804\ud2b8\uc5d0 \ub300\ud55c \uc124\uba85&nbsp;<br \/><\/p><p><\/p><p>[21] phpDistributedPortScanner , A Distributed Port Scanner<\/p><p><a href=\"http:\/\/www.digitaloffense.net:8000\/index.html?section=PROJECTS\">http:\/\/www.digitaloffense.net:8000\/index.html?section=PROJECTS<\/a><\/p><p>- \ubd84\uc0b0 \ub124\ud2b8\uc6cc\ud06c \uc2a4\uce90\ub108\uc758 \ud55c \uc885\ub958\uc5d0 \ubd88\uacfc\ud558\uba70, \uae30\ud0c0 \ub2e4\uc591\ud55c \ub3c4\uad6c\ub4e4\uc774 \uc874\uc7ac\ud55c\ub2e4.&nbsp;<br \/><\/p><p><\/p><p>[22] ADM Internet Worm<\/p><p><a href=\"http:\/\/www.whitehats.com\/library\/worms\/adm\/index.html\">http:\/\/www.whitehats.com\/library\/worms\/adm\/index.html<\/a><\/p><p>- \uc6d0\uaca9 BIND \ucde8\uc57d\uc810\uc744 \uc790\ub3d9\uc73c\ub85c \uacf5\uaca9\ud558\uc5ec \uc811\uadfc\uad8c\ud55c\uc744 \ud68c\ub4dd\ud558\uace0, \ud53c\ud574 \uc2dc\uc2a4\ud15c\uc5d0\uc11c \ub610 \ub2e4\uc2dc \ub2e4\ub978 \ud638\uc2a4\ud2b8\ub97c \uacf5\uaca9\ud558\ub294 \ud504\ub85c\uadf8\ub7a8\uc774\ub2e4. \ud53c\ud574 \uc2dc\uc2a4\ud15c\uc740 \"w0rm\"\uc774\ub77c\ub294 \ubc31\ub3c4\uc5b4 \uacc4\uc815\uc774 \uc0dd\uc131\ub418\uba70, \ud53c\ud574 \uc2dc\uc2a4\ud15c\uc758 IP\uc8fc\uc18c\uac00 \uacf5\uaca9\uc790\uc5d0\uac8c \uba54\uc77c\ub85c \uc804\ub2ec\ub41c\ub2e4.&nbsp;<br \/><\/p><p><\/p><p>[23] Millennium Internet Worm \ubd84\uc11d \ubcf4\uace0\uc11c, CERTCC-KR, \uc774\uc0c1\uc5fd\/\uc774\ud604\uc6b0, 1999. 9.<\/p><p><a href=\"http:\/\/www.certcc.or.kr\/paper\/tr1999\/1999009\/tr1999009.html\">http:\/\/www.certcc.or.kr\/paper\/tr1999\/1999009\/tr1999009.html<\/a><\/p><p><a href=\"http:\/\/www.whitehats.com\/library\/worms\/mworm\/index.html\">http:\/\/www.whitehats.com\/library\/worms\/mworm\/index.html<\/a><\/p><p>- imap4 v10.x, Qualcomm popper, bind with iquery, \uadf8\ub9ac\uace0 rpc.mountd services \ub4f1 \ucd5c\uadfc\uc758 \uc6d0\uaca9 \ubc84\ud37c\uc624\ubc84\ud50c\ub85c\uc6b0 \ucde8\uc57d\uc810\uc5d0 \ub300\ud558\uc5ec \uc790\ub3d9\uc73c\ub85c \uc2a4\uce94\ud558\uc5ec \uce68\uc785\ud558\ub294 \ud504\ub85c\uadf8\ub7a8\uc774\uba70, \uc790\uc2e0\uc774 \uacf5\uaca9\ud55c \uc2dc\uc2a4\ud15c\uc5d0 \ub300\ud574\uc11c\ub294 \ud328\uce58\ub97c \ud558\uc5ec \ub2e4\ub978 \uacf5\uaca9\uc790\uac00 \uce68\uc785\ud558\uc9c0 \ubabb\ud558\ub3c4\ub85d \ud55c\ub2e4.&nbsp;<br \/><\/p><p><\/p><p>[24] \ubd84\uc0b0\ud658\uacbd\uc5d0\uc11c\uc758 \uc11c\ube44\uc2a4\uac70\ubd80\uacf5\uaca9 \ubd84\uc11d\ubcf4\uace0\uc11c, CERTCC-KR, \uc774\ud604\uc6b0\/\uc815\ud604\ucca0, 1999. 12.<\/p><p><a href=\"http:\/\/www.certcc.or.kr\/paper\/tr1999\/1999010\/tr1999010.html\">http:\/\/www.certcc.or.kr\/paper\/tr1999\/1999010\/tr1999010.html<\/a><\/p><p>- 1999\ub144 7, 8\uc6d4 \uacbd\uc5d0, \uad6d\ub0b4 \ubaa8\ub300\ud559\uc758 60\uc5ec Solaris \uc11c\ubc84\uac00 \ubc18\uc790\ub3d9\ud654\ub41c \uacf5\uaca9\uc73c\ub85c\ubd80\ud130 \uce68\uc785\uc744 \ub2f9\ud558\uc5ec Trin00 \uc5d0\uc774\uc804\ud2b8\uac00 \uc124\uce58\ub418\uace0, DDOS \uacf5\uaca9\uc5d0 \uc774\uc6a9\ub2f9\ud55c \uc0ac\uace0 \uc788\uc5c8\ub2e4. \uc774 \uc0ac\uace0\uc640 \uad00\ub828\ub41c \ubbf8\uad6d\uc758 \uba87 \uba87 \ub300\ud559\uad50 \uc5ed\uc2dc 250\uc5ec\ub300 \ub610\ub294 100\uc5ec\ub300\uc758 Solaris \uc11c\ubc84\uac00 \ub611\uac19\uc740 \ubc29\ubc95\uc73c\ub85c \ud574\ud0b9\uc744 \ub2f9\ud558\uc600\uc73c\uba70 \uacf5\uaca9\uc774 \uc774\uc6a9\ub418\uc5c8\ub2e4.&nbsp;<br \/><\/p><p><\/p><p>[25] PROJECT AREA52, Volume 0xa Issue 0x38, Jitsu-Disk\/Simple Nomad\/Irib, 05.01.2000<\/p><p><a href=\"http:\/\/packetstorm.securify.com\/mag\/phrack\/phrack56\/p56-0x06\">http:\/\/packetstorm.securify.com\/mag\/phrack\/phrack56\/p56-0x06<\/a><\/p><p>- \uc2e4\uc81c \uacf5\uaca9\uacfc\ub294 \ubcc4\uac1c\ub85c, \ubcf4\ud3b8\uc801\uc778 \uacf5\uaca9\uae30\ubc95 \ubd84\ub958\uc5d0 \ub530\ub978 \uc790\ub3d9\uacf5\uaca9\uc5d4\uc9c4(Automated attack engine) \uad6c\ud604\uc744 \uc2dc\ub3c4\ud55c\ub2e4. \ub300\ubd80\ubd84 Phrack\uc5d0\uc11c \ub098\uc628 \uac1c\ub150\ub4e4\uc740 \ud604\uc2e4\uc131\uc774 \uc788\ub294 \uac1c\ub150\uc774\uba70 \ub9ce\uc740 \ubd80\ubd84\uc774 \uad6c\ud604\ub418\uc5b4 \uc654\ub2e4.&nbsp;<br \/><\/p><p><\/p><p>[26] Covert Channels in the TCP\/IP Protocol Suite, Craig H. Rowland, 1996. 11.<\/p><p><a href=\"http:\/\/www.securitymap.net\/docs\/attack\/covert_tcp.txt\">http:\/\/www.securitymap.net\/docs\/attack\/covert_tcp.txt<\/a><\/p><p>- TCP \ud5e4\ub354\uc758 \ub2e4\uc591\ud55c \ud544\ub4dc(IP Identification Field, Initial Sequence Number Field, The TCP Acknowledge Sequence Number Field(\"Bounce\"))\ub97c \uc774\uc6a9\ud558\uc5ec Covert channel\uc744 \ud615\uc131\ud560 \uc218 \uc788\ub294 \ubc29\ubc95\uc5d0 \ub300\ud558\uc5ec \uc124\uba85\ud55c\ub2e4. \uc774\ub7ec\ud55c Covert channel\uc740 \ud30c\uc774\uc5b4\uc6d4 \ubc0f IDS\ub97c \uc6b0\ud68c\ud558\uae30\uc704\ud55c \uae30\uc220\uc774\ub2e4.&nbsp;<br \/><\/p><p>Placing Backdoors Through Firewalls, van Hauser\/THC,<\/p><p>http:\/\/thc.pimmel.com\/files\/thc\/fw-backd.htm<\/p><p>- \ud30c\uc774\uc5b4\uc6d4 \ub610\ub294 IDS\ub97c \uc6b0\ud68c\ud558\uae30 \uc704\ud55c \ubc31\ub3c4\uc5b4\ub4e4\uc5d0 \ub300\ud558\uc5ec \uc124\uba85\ud55c\ub2e4. \uc8fc\ub85c \uc5b4\ud50c\ub9ac\ucf00\uc774\uc158 \ub808\ubca8\uc758 \ubc31\ub3c4\uc5b4\ub97c \ub2e4\ub8ec\ub2e4.&nbsp;<br \/><\/p><p><\/p><p>[27] HTTP tunnel, Lars Brinkhof<\/p><p><a href=\"http:\/\/www.nocrew.org\/software\/httptunnel.html\">http:\/\/www.nocrew.org\/software\/httptunnel.html<\/a><\/p><p>- HTTP request\ub97c \uc774\uc6a9\ud558\uc5ec \uc591\ubc29\ud5a5(bidirectional)\uc758 \ub370\uc774\ud130 \ucc44\ub110\uc744 \uc0dd\uc131\ud558\ub294 \ubc29\ubc95\uc5d0 \ub300\ud558\uc5ec \uc124\uba85\ud55c\ub2e4. WWW \uc11c\ube44\uc2a4\uac00 \uc81c\uacf5\ub418\ub294 \uacbd\uc6b0, \uc774\ub7ec\ud55c \ucc44\ub110\uc740 \ud30c\uc774\uc5b4\uc6d4\uc744 \ud1b5\uacfc\ud558\uc5ec \uc0dd\uc131\ub420 \uc218 \uc788\ub2e4.&nbsp;<br \/><\/p><p><\/p><p>[28] MailTunnel<\/p><p><a href=\"http:\/\/www.detached.net\/mailtunnel.html\">http:\/\/www.detached.net\/mailtunnel.html<\/a><\/p><p>- E-Mail \uba54\uc2dc\uc9c0\ub97c \ud1b5\ud558\uc5ec \uc591\ubc29\ud5a5\uc758 \uac00\uc0c1 \ub370\uc774\ud130 \ucc44\ub110\uc744 \uc0dd\uc131\ud558\ub294 \ubc29\ubc95\uc744 \uc124\uba85\ud55c\ub2e4. \ud30c\uc774\uc5b4\uc6d4\uc5d0\uc11c \uba54\uc77c\uc11c\ube44\uc2a4\ub97c \uc81c\uacf5\ud560 \uacbd\uc6b0, TCP\/IP\uc0c1\uc758 \uc5b4\ub5a0\ud55c \uc138\uc158\ub3c4 \ub9cc\ub4e4 \uc218 \uc788\ub2e4.&nbsp;<br \/><\/p><p><\/p><p>[29] DNS Tunnel<\/p><p><a href=\"http:\/\/www.icon.co.za\/~wosp\/wosp.dns-tunnel.tar.gz\">http:\/\/www.icon.co.za\/~wosp\/wosp.dns-tunnel.tar.gz<\/a><\/p><p>- Covert channel\uc744 \uc704\ud574 DNS query\/response\ub97c \uc0ac\uc6a9\ud55c\ub2e4.&nbsp;<br \/><\/p><p><\/p><p>[30] attacking solaris with loadable kernel modules, Plasmoid\/THC, 1999<\/p><p><a href=\"http:\/\/www.pimmel.com\/articles\/slkm-1.0.html\">http:\/\/www.pimmel.com\/articles\/slkm-1.0.html<\/a>&nbsp;<br \/><\/p><p>attacking freebsd with kernel modules, pragmatic\/THC, 1999. 6.<\/p><p><a href=\"http:\/\/www.pimmel.com\/articles\/bsdkern.html\">http:\/\/www.pimmel.com\/articles\/bsdkern.html<\/a>&nbsp;<br \/><\/p><p>lkm - loadable linux kernel modules pragmatic\/THC, 1999. 3.<\/p><p><a href=\"http:\/\/www.pimmel.com\/articles\/lkm-hacking.html\">http:\/\/www.pimmel.com\/articles\/lkm-hacking.html<\/a>&nbsp;<br \/><\/p><p>Anonymizing UNIX Systems, van Hauser \/ THC<\/p><p><a href=\"http:\/\/www.pimmel.com\/articles\/anonymous-unix.html\">http:\/\/www.pimmel.com\/articles\/anonymous-unix.html<\/a><\/p><p><\/p><p>[31] RUNTIME KERNEL KMEM PATCHING, Silvio Cesare, 1998<\/p><p><a href=\"http:\/\/www.big.net.au\/~silvio\/runtime-kernel-kmem-patching.txt\">http:\/\/www.big.net.au\/~silvio\/runtime-kernel-kmem-patching.txt<\/a><\/p><p>- LKM\uc744 \uc774\uc6a9\ud558\uc9c0 \uc54a\uace0 \ucee4\ub110 \uba54\ubaa8\ub9ac(kmem)\uc5d0 \uc9c1\uc811 \uc811\uadfc\ud558\uc5ec Runtime \ucee4\ub110\uc744 \uc218\uc815\ud558\ub294 \ubc29\ubc95\uc5d0 \ub300\ud558\uc5ec \uc124\uba85\ud55c\ub2e4.<\/p><p><\/p><p>[32] Reverse Pimpage<\/p><p><a href=\"http:\/\/soomka.com\/\">http:\/\/soomka.com\/<\/a><\/p><p>- reverse telnet \ud504\ub85c\uadf8\ub7a8\uc73c\ub85c \ud30c\uc774\uc5b4\uc6d4\uc744 \ud1b5\uacfc\ud558\uae30 \uc704\ud558\uc5ec, \ub0b4\ubd80\uc758 telnet \ub370\ubaac\uc5d0\uc11c \uc678\ubd80\uc0ac\uc6a9\uc790\ub85c \uc811\uc18d\uc744 \uc2dc\ub3c4\ud55c\ub2e4.&nbsp;<br \/><\/p><p><\/p><p>[33] openssh.reverse.tgz, 2000. 10. 3<\/p><p><a href=\"http:\/\/teso.scene.at\/releases.php3\">http:\/\/teso.scene.at\/releases.php3<\/a><\/p><p>- OpenSSH\uc744 \uc218\uc815\ud55c \ud504\ub85c\uadf8\ub7a8\uc73c\ub85c \uc678\ubd80 \uc0ac\uc6a9\uc790\uac00 NAT \ud30c\uc774\uc5b4\uc6d4\ub0b4\uc758 \uc2dc\uc2a4\ud15c\uc73c\ub85c \uc811\uc18d\ud560 \uc218 \uc788\ub3c4\ub85d \ud574\uc900\ub2e4. sshd\uac00 \ud074\ub77c\uc774\uc5b8\ud2b8\ucc98\ub7fc \ub3d9\uc791\ud55c\ub2e4.&nbsp;<br \/><\/p><p><\/p><p>[34] THE EVOLUTION OF MALICIOUS AGENTS<\/p><p><a href=\"http:\/\/www.securitymap.net\/sdm\/docs\/virus\/agents.txt\">http:\/\/www.securitymap.net\/sdm\/docs\/virus\/agents.txt<\/a><\/p><p>- \ubaa8\ub9ac\uc2a4\uc6dc\uc5d0\uc11c \uba5c\ub9ac\uc0ac \ubc14\uc774\ub7ec\uc2a4\uc5d0 \uc774\ub974\ub294 \ud2b8\ub85c\uc774\uc794, \ubc14\uc774\ub7ec\uc2a4, \uc778\ud130\ub137 \uc6dc\uc5d0 \ub300\ud558\uc5ec \ub2e4\ub8e8\uace0 \uc788\ub2e4. \ucd08\uadfc\uc758 \uc6dc\ud615 \uacf5\uaca9\ud504\ub85c\uadf8\ub7a8\uc5d0 \ub300\ud558\uc5ec \"\uc545\uc131 \uc5d0\uc774\uc804\ud2b8\"\ub77c\ub294 \uc0c8\ub85c\uc6b4 \uc6a9\uc5b4\ub97c \uc0ac\uc6a9\ud558\uc600\ub2e4. \ud655\uc0b0\ud615, \uc2a4\ud30c\uc774\ud615, \uacf5\uaca9\ud615, \uc6d0\uaca9 \ud1b5\uc81c\ud615 \ub4f1\uc73c\ub85c \uc545\uc131 \uc5d0\uc774\uc804\ud2b8\ub97c \ubd84\ub958\ud558\uace0 \uc788\uc73c\uba70, \uc774\ub7ec\ud55c \ubaa8\ub4e0 \uae30\ub2a5\uc744 \uac00\uc9c4 RingZero Trojan\uc758 \uae30\ub2a5\uc744 \ubd84\uc11d\ud558\uc600\ub2e4.&nbsp;<br \/><\/p><p><\/p><p>[35] Social Engineering FAQ<\/p><p><a href=\"http:\/\/www.securitymap.net\/sdm\/docs\/faq\/socialen.txt\">http:\/\/www.securitymap.net\/sdm\/docs\/faq\/socialen.txt<\/a>&nbsp;<br \/><\/p><p><\/p><p>[36] Distributed Denial of Service (DDoS) Attacks\/tools, David Dittrich<\/p><p><a href=\"http:\/\/staff.washington.edu\/dittrich\/misc\/ddos\/\">http:\/\/staff.washington.edu\/dittrich\/misc\/ddos\/<\/a><\/p>[*] SecurityMAP<p><a href=\"http:\/\/www.securitymap.net\/\">http:\/\/www.securitymap.net\/<\/a><\/p><p>- \ubcf8 \ubb38\uc11c\uc5d0 \ub098\uc628 \ubaa8\ub4e0 \ub808\ud37c\ub7f0\uc2a4 \ub0b4\uc6a9\uc744 \ud3ec\ud568\ud55c \uc0ac\uc774\ud2b8&nbsp;<br \/><\/p><p><\/p><p>[*] CERTCC-KR<\/p><p><a href=\"http:\/\/www.certcc.or.kr\/\">http:\/\/www.certcc.or.kr<\/a><\/p><p>[*] PacketStorm<\/p><p><a href=\"http:\/\/packetstorm.securify.com\/\">http:\/\/packetstorm.securify.com<\/a><\/p><p>[*] Distributed Metastasis, Andrew J. Stewart,<\/p><p><a href=\"http:\/\/www.packetfactory.net\/Papers\/\">http:\/\/www.packetfactory.net\/Papers\/<\/a><\/p><p>- \ubcf8 \ubb38\uc11c\ubcf4\ub2e4 8\uac1c\uc6d4 \uc815\ub3c4 \ube68\ub9ac \ub098\uc628 \ubb38\uc11c\ub85c \ubcf8 \ubb38\uc11c\uc640 \ube44\uc2b7\ud55c \ub0b4\uc6a9\uc744 \ub2f4\uace0 \uc788\ub2e4. \ud544\uc790\uc758 \uc0dd\uac01\uc744 \uc815\ub9ac\ud558\ub294\ub370 \ud070 \ub3c4\uc6c0\uc744 \uc8fc\uc5c8\uc73c\uba70, \ub9ce\uc740 \ub0b4\uc6a9\uc744 \ud568\ucd95\ud558\uace0 \uc788\ub2e4.&nbsp;<br \/><\/p><p><\/p><p>[*] Protecting against the unknown, Mixter, January 2000<\/p><p><a href=\"http:\/\/mixter.void.ru\/protecting.txt\">http:\/\/mixter.void.ru\/protecting.txt<\/a><\/p><p>- \"<b>A guide to improving network security to protect the Interne<\/b>t\", DDOS \uacf5\uaca9\uc774\ud6c4 Packetstorm \uc0ac\uc774\ud2b8\uc5d0\uc11c \uadf8\uc5d0 \ub300\ud55c \ub300\uc751\ubc29\uc548\uc5d0 \ub300\ud55c paper\ub97c \uacf5\ubaa8\ud558\uc5ec 1\ub4f1\uc5d0 \ubf51\ud78c paper \uc774\ub2e4. \uc2dc\uc2a4\ud15c, \ub124\ud2b8\uc6cc\ud06c, \ubc14\uc774\ub7ec\uc2a4, OS, \uc5b4\ud50c\ub9ac\ucf00\uc774\uc158, \uae30\uc900 \ub4f1\uc5d0 \ub300\ud558\uc5ec \ub17c\ud558\uace0 \uc788\uc73c\uba70, \ub2e8\uae30\uc801\/\uc7a5\uae30\uc801 \uad00\uc810\uc5d0\uc11c \uadf8 \ub300\uc751\ubc29\uc548\uc744 \uc598\uae30\ud55c\ub2e4. \uc9c0\uae08\uae4c\uc9c0\uc758 \ubcf4\uc548 \ubb38\uc11c\uc911 \uac00\uc7a5 \uc885\ud569\uc801\uc774\uba70, \ud604\uc2e4\uc801\uc778 \uba74\uc5d0 \ub300\ud558\uc5ec \uc9c0\uc801\ud558\uace0 \uc788\ub2e4.<\/p><\/font><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ub124\ud2b8\uc6cc\ud06c \uacf5\uaca9\uae30\ubc95\uc758 \ud328\ub7ec\ub2e4\uc784 \ubcc0\ud654\uc640 \ub300\uc751\ubc29\uc548 &#8211; Network Attack Paradigm Shift and Its Countermeasure &#8211; Part I : \ub124\ud2b8\uc6cc\ud06c \uacf5\uaca9\uae30\ubc95\uc758 \ud328\ub7ec\ub2e4\uc784 \ubcc0\ud654 v1.0 &nbsp; \uc774\ud604\uc6b0 \uc5f0\uad6c\uc6d0,&nbsp;lotus@certcc.or.krCERTCC-KR,&nbsp;cert@certcc.or.kr Document History&nbsp; 2000. 5. : Part I. \ub124\ud2b8\uc6cc\ud06c \uacf5\uaca9\uae30\ubc95\uc758 \ud328\ub7ec\ub2e4\uc784 \ubcc0\ud654 v0.12000. 11 : Part I. \ub124\ud2b8\uc6cc\ud06c \uacf5\uaca9\uae30\ubc95\uc758 \ud328\ub7ec\ub2e4\uc784 \ubcc0\ud654 v1.0Changes : Reference \ubc0f \ub0b4\uc6a9 \ucd94\uac00 I. \uc11c\ub860&nbsp; II. \ub124\ud2b8\uc6cc\ud06c\uacf5\uaca9\uae30\ubc95\uc758 [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_import_markdown_pro_load_document_selector":0,"_import_markdown_pro_submit_text_textarea":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[12],"tags":[],"class_list":["post-401","post","type-post","status-publish","format-standard","hentry","category-computing_security"],"_links":{"self":[{"href":"https:\/\/hasu0707.duckdns.org\/blog\/index.php?rest_route=\/wp\/v2\/posts\/401","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hasu0707.duckdns.org\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hasu0707.duckdns.org\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hasu0707.duckdns.org\/blog\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/hasu0707.duckdns.org\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=401"}],"version-history":[{"count":0,"href":"https:\/\/hasu0707.duckdns.org\/blog\/index.php?rest_route=\/wp\/v2\/posts\/401\/revisions"}],"wp:attachment":[{"href":"https:\/\/hasu0707.duckdns.org\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=401"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hasu0707.duckdns.org\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=401"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hasu0707.duckdns.org\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}