• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

Çмú´ëȸ ÇÁ·Î½Ãµù

Ȩ Ȩ > ¿¬±¸¹®Çå > Çмú´ëȸ ÇÁ·Î½Ãµù > Çѱ¹Á¤º¸Åë½ÅÇÐȸ Çмú´ëȸ > 2010³â Ãá°èÇмú´ëȸ

2010³â Ãá°èÇмú´ëȸ

Current Result Document : 9 / 23 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) ÇØÄ¿ÀÇ °ø°Ý¿¡ ´ëÇÑ ½Ç½Ã°£ º¸¾È°øÁ¶½Ã½ºÅÛ ¿¬±¸
¿µ¹®Á¦¸ñ(English Title) A Study of Real Time Security Cooperation System Regarding Hacker's Attack
ÀúÀÚ(Author) ¹Ú´ë¿ì   Dea-Woo Park  
¿ø¹®¼ö·Ïó(Citation) VOL 14 NO. 01 PP. 0285 ~ 0288 (2010. 05)
Çѱ۳»¿ë
(Korean Abstract)
Áß±¹ÀÇ ÇØÄ¿°¡ Á¦3±¹À¸·Î Çѱ¹IP¸¦ ¿ìȸ Á¢¼ÓÇÏ¿© ÀüÀÚ»ó°Å·¡»çÀÌÆ®¸¦ ÇØÅ·ÇÏ¿©, ´ëÆ÷°èÁ·Π±ÝÀ¶ÇÇÇظ¦ ÀÔÈ÷´Â ÇÑ Ä§ÇØ»ç°í°¡ ³µ¾ú´Ù. 7.7 DDoS°ø°ÝÀº ±¹°¡ÀÇ ÁÖ¿ä»çÀÌÆ®¸¦ ¸¶ºñ½ÃŲ ÇØÄ¿ÀÇ °ø°Ý »ç°ÇÀ̾ú´Ù. º» ³í¹®¿¡¼­´Â ÇØÄ¿ÀÇ Ä§ÇØ»ç°í¿Í DDoS°ø°Ý¿¡ Ãë¾àÁ¡ ºÐ¼®À» ÇÑ´Ù. ÇØÄ¿ÀÇ °ø°Ý¿¡ ´ëÇÑ ÀüÁ¶ Áõ»ó ¹× °ø°Ý ¿¬°ü¼º ºÐ¼®À» ÅëÇÏ¿© ½Ç½Ã°£À¸·Î Red, Orange, Yellow, Green¿¡ ¼ÓÇÏ´Â À§Çèµî±ÞÀ» ³ª´«´Ù. ÇØÄ¿¿¡ ´ëÇÑ ºí·¢¸®½ºÆ®¸¦ ÀÛ¼ºÇÏ¿© ½Ç½Ã°£À¸·Î °ø°ÝÀ» Â÷´Ü¡¤¹æ¾îÇÏ´Â º¸¾È°øÁ¶½Ã½ºÅÛÀ» ¿¬±¸ÇÑ´Ù. ħÇØ»ç°í ÈÄ ÆÐŶ¿¡ ´ëÇÑ ¿ªÃßÀû°ú ŽÁö¸¦ ÅëÇØ Æ÷·»½Ä ÀڷḦ »ý¼ºÇÏ°í ¹ýÁ¤¿¡¼­ Ã¥ÀÓ¼ÒÀçÀÇ Áõ°Å·Î È®Á¤ÇÏ´Â ¿¬±¸¸¦ ÇÏ¿© ±¹°¡ ħÇØ»ç°í ´ëÀÀ°ú Æ÷·»½Ä ±â¼ú ¹ßÀü¿¡ ±â¿©ÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
Chinese hackers hack the e-commerce site by bypass South Korea IP to connect to the third country, finance damaging a violation incident that fake account. 7.7.DDoS attack was the case of a hacker attack that paralyzed the country's main site. In this paper, the analysis is about vulnerabilities that breaches by hackers and DDoS attacks. Hacker's attacks and attacks on the sign of correlation analysis is share the risk rating for in real time, Red, Orange, Yellow, Green. Create a blacklist of hackers and real-time attack will be studied security and air conditioning systems that attacks and defend. By studying generate forensic data and confirmed in court as evidence of accountability through IP traceback and detection about packet after Incident, contribute to the national incident response and development of forensic techniques.
Å°¿öµå(Keyword) Hacking   Vulnerability   DDoS   Blacklist   Forensic  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå