ÇѱÛÁ¦¸ñ(Korean Title) |
Layerº° ScanningÀ» »ç¿ëÇÑ Ãë¾à¼º ºÐ¼® ¹æ¹ý |
¿µ¹®Á¦¸ñ(English Title) |
Method of Vulnerability Analysis from Layer Scanning |
ÀúÀÚ(Author) |
õ¿ì¼º
¹Ú´ë¿ì
Woo-Sung Chun
Dea-Woo Park
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 14 NO. 01 PP. 0277 ~ 0280 (2010. 05) |
Çѱ۳»¿ë (Korean Abstract) |
³×Æ®¿öÅ©¿¡¼ OSI 7 Layer¸¦ ±â¹ÝÀ¸·Î Åë½Å ÇÁ·ÎÅäÄÝÀÌ ±¸ÇöµÇ°í ÀÖ°í, ÀÎÅͳÝÀº TCP/IP Layer¸¦ Áß½ÉÀ¸·Î Ãë¾à¼ºÀÌ ¹ß°ßµÇ°í °ø°ÝÀ» ´çÇÏ°í ÀÖ´Ù. º» ³í¹®Àº Scanning ÇÁ·Î±×·¥µéÀ» »ç¿ëÇÏ¿© ³×Æ®¿öÅ©¿¡ Layerº°·Î ScanningÀ» ½Ç½ÃÇÏ°í ±×¿¡ µû¸¥ Ãë¾à¼ºÀ» °¢ Layerº°·Î ºÐ¼®ÇÑ´Ù. °¢ Layerº° Ãë¾àÁ¡°ú Scanning ÇÁ·Î±×·¥¿¡¼ ºÐ¼® °á°úµé¿¡ ´ëÇÑ Â÷ÀÌÁ¡À» ºÐ¼® ¿¬±¸ÇÑ´Ù. ºÐ¼®µÈ °á°úµé¿¡ ´ëÇÑ Scanning ÇÁ·Î±×·¥¿¡ ´ëÇÑ Æ¯¼ºÀ» ¹Ý¿µÇÑ Scanning¹æ¹ý¿¡ ´ëÇÑ Æ¯ÀåÁ¡À» ¿¬±¸ÇÏ°í, °¢ Layerº°·Î º¸¾È ´ëÀÀ ¹æ¾ÈÀ» Á¦½ÃÇÑ´Ù. º» ¿¬±¸ÀÇ °á°ú´Â ÇØÄ¿ÀÇ °ø°Ý¿¡ ´ëÇÑ Ãë¾à¼ºÀ» ºÐ¼®°ú ¹æ¾î¸¦ À§ÇÑ º¸¾ÈÁ¤Ã¥ ¼ö¸³¿¡ ´ëÇÑ ÀÚ·á·Î È°¿ëµÇ¾î ³×Æ®¿öÅ©ÀÇ º¸¾ÈÀ» °ÈÇϴµ¥ ±â¿© ÇÒ °ÍÀÌ´Ù.
|
¿µ¹®³»¿ë (English Abstract) |
Network based on the OSI 7 Layer communication protocol is implemented, and the Internet TCP / IP Layer Based on the vulnerability is discovered and attacked. In this paper, using the programs on the network Layer Scanning conducted by the Layer-by each subsequent vulnerability analysis. Layer by Scanning each vulnerability analysis program to analyze the differences will be studied. Scanning for the studies in the program reflects the characteristics of the Scanning Features of way, and security countermeasures by each Layer is presented. The results of this study was to analyze its vulnerability to hackers and security for defense policy as the data is utilized to enhance the security of the network will contribute.
|
Å°¿öµå(Keyword) |
OSI 7 Layer
vulnerability
scanning
scanning tool analysis
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|