Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0339 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2018-12-19 | ÃÑÆäÀÌÁö | 22 |
ÇѱÛÇ¥Áظí | ³×Æ®¿öÅ© Æ÷·»½ÄÀ» À§ÇÑ ÆÐŶ ó¸® Áöħ | ||
¿µ¹®Ç¥Áظí | Guidelines of Packet Processing for Network Forensics | ||
Çѱ۳»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº ³×Æ®¿öÅ© Æ÷·»½Ä °úÁ¤¿¡¼ ÆÐŶÀ» ó¸®ÇÏ´Â ÀýÂ÷¸¦ ±ÔÁ¤ÇÑ´Ù. ÆÐŶÀº ³×Æ®¿öÅ©¿¡¼ »ç¿ëÀÚ ÇàÀ§¸¦ ºÐ¼®Çϴµ¥ Áß¿äÇÑ ÀÚ·á·Î È°¿ëÇÒ ¼ö ÀÖ´Ù. ±×·¯³ª ó¸® °úÁ¤ÀÇ ½Ç¼ö·Î ÀÎÇØ µ¥ÀÌÅÍ°¡ ÈѼյÊÀ¸·Î½á Áõ°Å·Î »ç¿ëÇÏÁö ¸øÇÒ ¼ö ÀÖÀ¸¸ç, °³ÀÎÁ¤º¸¿Í °°Àº ¹Î°¨ÇÑ Á¤º¸¸¦ Æ÷ÇÔÇÏ°í Àֱ⠶§¹®¿¡ À¯Ãâ·Î ÀÎÇÑ »ç»ýÈ° ħÇØ°¡ ¹ß»ýÇÒ ¼ö ÀÖ´Ù. µû¶ó¼ ³×Æ®¿öÅ© Æ÷·»½Ä¿¡¼ ÇÙ½É Áõ°ÅÀÎ ÆÐŶÀ» ¼öÁýÇÏ¿© ó¸®ÇÒ ¶§¿¡´Â Åõ¸íÇÏ°í ½Å·ÚÇÒ ¼ö ÀÖ´Â ÀýÂ÷°¡ Á¦½ÃµÇ¾î¾ß ÇÑ´Ù. º» Ç¥ÁØÀº ³×Æ®¿öÅ© Æ÷·»½Ä °úÁ¤À» ÅëÇØ Á¦½ÃµÈ ÆÐŶÀÌ µðÁöÅÐ Áõ°Å·Î¼ Áõ°Å´É·ÂÀ» °®±â À§ÇØ ÆÐŶÀÇ ¼öÁý, º¸Á¸, Àü´Þ °úÁ¤¿¡¼ ÁöÄÑ¾ß ÇÒ ¿øÄ¢À» Á¦½ÃÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The standard establishes the necessary model and procedure while processing the packet for network forensics. Even though the packet is an important data to analyze user behavior through the network, reliable procedure should be suggested since it is easy be damaged due to careless handling, sensitive contents such as personal information is included, and can be modified intentionally. Therefore the standard defines the principles to be followed in packet collection, preservation, and delivery in order to have legal validity as the digital evidence through network forensic process. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0339.pdf |