• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö

Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) STRIDE À§Çù ¸ðµ¨¸µ ±â¹Ý °¡»ó »ç¼³¸Á Ãë¾àÁ¡ ºÐ¼® ¹× º¸¾È ¿ä±¸»çÇ× µµÃâ
¿µ¹®Á¦¸ñ(English Title) Analyze Virtual Private Network Vulnerabilities and Derive Security Guidelines Based on STRIDE Threat Modeling
ÀúÀÚ(Author) ±è´ÙÇö   ¹ÎÁö¿µ   ¾ÈÁØÈ£   Da-hyeon Kim   Ji-young Min   Jun-ho Ahn  
¿ø¹®¼ö·Ïó(Citation) VOL 23 NO. 06 PP. 0027 ~ 0037 (2022. 12)
Çѱ۳»¿ë
(Korean Abstract)
µðÁöÅÐ Åë½Å ȯ°æ ±â¼úÀÌ ´Ù¾çÈ­µÇ°í ³×Æ®¿öÅ© ÀÌ¿ë Á¢±Ù¼ºÀÌ ³ô¾ÆÁö°í ÀÖÀ¸¸ç º¸¾ÈÀÌ Áß¿äÇÑ ¹æ»ê¾÷ü, ±¹¹æ °ü·Ã ±â°ü µî ±¹°¡ÀÇ ¾Èº¸¿¡ °ü·ÃµÈ ´Ù¾çÇÑ È¯°æ¿¡¼­ °¡»ó »ç¼³¸Á ¼­ºñ½º¸¦ »ç¿ëÇÑ´Ù. ÇÏÁö¸¸ ±â¼ú¿¡ ¹ßÀü¿¡ µû¶ó ¸Å³â °¡»ó »ç¼³¸ÁÀÇ Ãë¾àÁ¡À» ÅëÇÑ °ø°ÝÀÌ Áõ°¡ÇÏ°í ÀÖ´Ù. º» ³í¹®Àº °¡»ó »ç¼³¸Á¿¡¼­ ¹ß»ý °¡´ÉÇÑ ÀáÀçÀû Ãë¾àÁ¡ ¹× ½Å±Ô Ãë¾àÁ¡¿¡ ´ëÇØ ´ëºñÇϱâ À§ÇØ STRIDE À§Çù ¸ðµ¨¸µÀ» ÅëÇØ º¸¾È ¿ä±¸»çÇ×À» µµÃâÇÏ¿´´Ù. STRIDE À§Çù ¸ðµ¨¸µÀº À§ÇùÀ» ÃÑ 6°¡Áö ¹üÁÖ·Î ±×·ìÈ­ À§ÇùÀ» ü°èÀûÀ¸·Î ½Äº°ÇÑ´Ù. À̸¦ Àû¿ëÇϱâ À§ÇØ °¡»ó »ç¼³¸ÁÀÇ ±â´ÉÀ» ºÐ¼®ÇÏ°í °¡»ó »ç¼³¸Á ¼­ºñ½º°¡ ÀÌ·ç¾îÁö´Â µ¿¾ÈÀÇ ÀÚ·á È帧µµ¸¦ »ý¼ºÇÏ¿´´Ù. ±× ÈÄ, °¡»ó »ç¼³¸Á¿¡¼­ ¹ß»ý °¡´ÉÇÑ À§ÇùÀ» ¼öÁýÇÏ°í À̸¦ ±â¹ÝÀ¸·Î STRIDE À§Çù ¸ðµ¨¸µÀ» ºÐ¼®Çß´Ù. »ý¼ºÇÑ °¡»ó »ç¼³¸ÁÀÇ ÀÚ·á È帧µµ´Â ÃÑ 96°³ÀÇ STRIDE À§ÇùÀ¸·Î ºÐ·ùµÇ¸ç, ½ÇÁ¦ Ãë¾àÁ¡ ¸®½ºÆ®¿Í ºñ±³ ºÐ¼®ÇÏ¿© ºÐ·ù °á°ú¸¦ ±¸Ã¼È­Çß´Ù. ±× ÈÄ À§ÇùµéÀÇ °ø°Ý ·çÆ®¸¦ ÆľÇÇϱâ À§ÇØ À§Çù ½Ã³ª¸®¿À¸¦ ÀÛ¼ºÇß´Ù. º» ³í¹®Àº ÀÛ¼ºµÈ ½Ã³ª¸®¿À¸¦ ±â¹ÝÀ¸·Î °¡»ó »ç¼³¸ÁÀÇ ±¸¼º¿ä¼Ò¿¡ µû¸¥ ÃÑ 30°³ÀÇ º¸¾È ¿ä±¸»çÇ×À» µµÃâÇß´Ù. º» ³í¹®À» ÅëÇØ ±¹¹æºÎ¿Í °°ÀÌ º¸¾ÈÀÌ Áß¿äÇÑ ½Ã¼³¿¡¼­ »ç¿ëÇÏ´Â °¡»ó »ç¼³¸ÁÀÇ º¸¾È ¾ÈÁ¤¼ºÀ» ³ôÀÏ ¼ö ÀÖ´Â º¸¾È ¿ä±¸»çÇ×À» Á¦½ÃÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
Virtual private network (VPN) services are used in various environments related to national security, such as defense companies and defense-related institutions where digital communication environment technologies are diversified and access to network use is increasing. However, the number of cyber attacks that target vulnerable points of the VPN has annually increased through technological advancement. Thus, this study identified security requirements by performing STRIDE threat modeling to prevent potential and new vulnerable points that can occur in the VPN. STRIDE threat modeling classifies threats into six categories to systematically identify threats. To apply the proposed security requirements, this study analyzed functions of the VPN and formed a data flow diagram in the VPN service process. Then, it collected threats that can take place in the VPN and analyzed the STRIDE threat model based on data of the collected threats. The data flow diagram in the VPN service process, which was established by this study, included 96 STRIDE threats. This study formed a threat scenario to analyze attack routes of the classified threats and derived 30 security requirements for each element of the VPN based on the formed scenario. This study has significance in that it presented a security guideline for enhancing security stability of the VPN used in facilities that require high-level security, such as the Ministry of National Defense (MND).
Å°¿öµå(Keyword) °¡»ó »ç¼³¸Á   STRIDE À§Çù ¸ðµ¨¸µ   À§Çù ºÐ¼®      À§Çù ½Ã³ª¸®¿À   º¸¾È ¿ä±¸»çÇ×   Virtual Private Network   STRIDE threat modeling      Threat Analysis   Threat Scenario      Threat Scenario   Security Requirement  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå