ICSÀÇ Å½Áö±¸Á¶¸¦ ´Ü°èÈ(´Ü¼øºÐ¼®+º¹Çպм®)ÇÏ¿©
False Positive¸¦ ÃÖ¼ÒÈ ÇÏ¿´°í, ħÀÔ °ø°Ý À¯Çüº°·Î ºÐ·ùµÇ¾ú°í CVE(Common Vulnerabilities
and Exposures)¸¦ Áö¿øÇÑ´Ù.
¢º Ä¿³Î±â¹ÝÀÇ Å½Áö¿£Áø
ICSÀÇ Å½Áö¿£ÁøÀº Ä¿³Î°èÃþ¿¡¼ µ¿ÀÛÇϱ⠶§¹®¿¡
ÆÐŶÀ» ó¸®Çϴµ¥ ¼Ò¿äµÇ´Â ½Ã°£À» ÃÖ¼ÒÈÇÏ¿© ´ë¿ë·® ³×Æ®¿öÅ©¿¡¼µµ ¼º´ÉÀúÇϰ¡ ¹ß»ýÇÏÁö ¾Ê´Â´Ù.
Passive ¹æ½ÄÀÇ Ä§ÀÔŽÁö½Ã½ºÅÛ(NIDS)Àº "ÆÐŶ¼öÁý(Capture) --> µ¥ÀÌÅÍÃà¾à
--> ºÐ¼® --> ÆÇÁ¤"ÀÇ
󸮰úÁ¤À» °ÅÄ¡°Ô µÇÁö¸¸, ICS´Â "ÆÐŶ¼öÁý", "µ¥ÀÌÅÍÃà¾à" 󸮰úÁ¤ÀÌ
´ëÆø »ý·«µÇ¾ú±â ¶§¹®¿¡ ´ë¿ë·® Æ®·¡ÇÈ ºÐ¼®ÀÌ °¡´ÉÇÏ´Ù.
¶ÇÇÑ ÆÐŶÀÇ »óźм®(Stateful Inspection)±â¹ýÀ» »ç¿ëÇÏ¿© Áߺ¹ ºÐ¼® ¹× False Positive¸¦ ÃÖ¼ÒÈ
ÇÏ¿´´Ù.
¢º Active-active High Availability
º°µµÀÇ Load-balancer(L4 Switch)¿¡
ÀÇÇÑ Active-active ¹æ½ÄÀÇ °í°¡¿ë¼ºÀ» Áö¿øÇÏ¿©
Single point of failure¿¡ ´ëÀÀÇÒ ¼ö ÀÖ´Ù.
(Â÷±â ¹öÀü¿¡¼ ÀÚü Active-active °í°¡¿ë¼ºÀ» Áö¿øÇÒ °èȹÀÓ)
¢º ³×Æ®¿öÅ© ´ë¿ªÆø °èȹ Á¶Á¤(Traffic Shaping)
ICSÀÇ ÅëÁ¦¿£ÁøÀº Çã¿ëµÈ ±ÔÄ¢¿¡ ´ëÇØ Traffic
ShapingÀÌ °¡´ÉÇÏ¿© DoS(DDoS) °ø°Ý¿¡ ÀÇÇÑ ³×Æ®¿öÅ© ÀÚ¿ø ¼Ò¸ð¸¦ ¿øÃµÀûÀ¸·Î ÅëÁ¦ÇÒ ¼ö ÀÖÀ» »Ó ¾Æ´Ï¶ó Áß¿äÇÑ
¼ºñ½º¿¡ ´ëÇØ ÀÏÁ¤ÇÑ ³×Æ®¿öÅ© ´ë¿ªÆø(Bandwidth)À» ÇÒ´çÇÏ¿© ¾ÈÁ¤ÀûÀÎ ¼ºñ½º°¡ °¡´ÉÇÏ´Ù.
¢ºTraffic Shaping ¿¹Á¦

|