³×Æ®¿öÅ© »óÀÇ È帣´Â ¸ðµç ÆÐŶÀ» °Ë»çÇÏ¿© °ø°Ý ¹× ħÀÔ ¿©ºÎ¸¦ ÆÇ´ÜÇÏ¿© ±× Áï½Ã ÅëÁ¦ÇÏ´Â ICS´Â ħÀÔ Å½Áö¿¡¸¸ Àü³äÇÏ´Â NIDS¿Í´Â ºÐ¸íÈ÷ ±¸º°µÇ´Â Â÷¼¼´ë º¸¾È ½Ã½ºÅÛÀÌ´Ù.
¶ÇÇÑ ÃÖÃÊ µµÀÔºñ¿ë¿¡¼µµ ±âÁ¸ NIDS´Â Passive ¹æ½ÄÀ̶ó °í°¡ÀÇ ÆÐŶ ¹Ì·¯¸µ Àåºñ°¡ º°µµ·Î ÇÊ¿äÇÒ »Ó¸¸ ¾Æ´Ï¶ó °í°¡ÀÇ Ä§ÀÔÂ÷´Ü½Ã½ºÅÛ(Firewall)°ú ¿¬µ¿ÇÏ´õ¶óµµ È¿°úÀûÀ¸·Î ¹æ¾îÇÒ ¼ö ¾ø´Âµ¥ ¹ÝÇØ ICS´Â µµÀÔ ºñ¿ëµµ ¸Å¿ì Àú·ÅÇϸ鼵µ ħÀÔ °ø°Ý¿¡ ´ëÇØ ¸Å¿ì ´Éµ¿ÀûÀ¸·Î ¹æ¾îÇÒ ¼ö ÀÖ´Ù.
¢º ħÀÔÅëÁ¦½Ã½ºÅÛ(ICS)ÀÇ ÁÖ¿ä ±â¼ú
- Ä¿³Î±â¹ÝÀÇ Å½Áö¿£Áø°ú ÅëÁ¦¿£ÁøÀÇ ÅëÇÕ ±¸Á¶
- ½Ç½Ã°£ ÆÐŶ »óźм®(Stateful Inspection)
- ³×Æ®¿öÅ© ´ë¿ªÆø °èȹ Á¶Á¤(Traffic Shaping)
- ½Ç½Ã°£ ħÀÔ °ø°Ý ŽÁö ÈÄ Áï°¢ÀûÀÎ ÅëÁ¦(Self Detection and Self Control)
- Á¤ÇüÈµÈ Å½Áö±ÔÄ¢(Well-formed RIVA-signature)
- ±ÔÄ¢±â¹ÝÀÇ Å½Áö ¹× ÅëÁ¦ Á¤Ã¥(Rule-based detection and control policy)
¢º ħÀÔÅëÁ¦½Ã½ºÅÛ(ICS)ÀÇ ºÎ°¡ ±â´É
- »ó¼¼ÇÑ °¨»ç±â·Ï ¹× Åë°è µ¥ÀÌÅÍ
- ³×Æ®¿öÅ© ÁÖ¼Òº¯È¯(NAPT) - 1:1, N:1, M:N
- ÆÄÀϽýºÅÛ ¹«°á¼º °ü¸®
- Contents ºÐ¼®¿¡ ÀÇÇÑ Worm/Virus ÅëÁ¦ °¡´É
- °·ÂÇÑ »ç¿ëÀÚ ÀÎÁõ : One Time Password Á¦°ø
- »ç¿ëÀÚ ÀÎÁõ ½ÇÆÐ °ü¸® ¹× ÀÎÁõ µ¥ÀÌÅÍ Àç»ç¿ë ¹æÁö
- ½Ç½Ã°£ ½Ã½ºÅÛ ºÎÇÏ·®, ÅëÁ¦ Á¤º¸, ¼¼¼Ç Á¤º¸ Á¦°ø
- ¹é¾÷ ¹× º¹±¸
- ±â°üÃßÀû(Whois) ¹× °æ·ÎÃßÀû(Trace Route) µµ±¸ Á¦°ø
- ŽÁö±ÔÄ¢ µ¿±âÈ(Live Signature Update), Ç¥Áؽ𣠵¿±âÈ
- ÀÚü ¹æ¾î ´É·Â º¸À¯ : Stealth ±â´É žÀç
- »ç¿ëÀÚ Á¤ÀÇ Å½Áö±ÔÄ¢ ¼³Á¤ Áö¿ø
- °ü¸®ÀÚ Email, SMS °æº¸ Áö¿ø
- SSLÀ» ÀÌ¿ëÇÑ ¾ÈÀüÇÑ ¿ø°Ý°ü¸®(Web-browser »ç¿ë) - Pure JAVA ±â¹Ý
|