Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAE.IT-X1161 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2009-12-22 | ÃÑÆäÀÌÁö | 33 |
ÇѱÛÇ¥Áظí | ¾ÈÀüÇÑ P2P Åë½ÅÀ» À§ÇÑ ÇÁ·¹ÀÓ¿öÅ© | ||
¿µ¹®Ç¥Áظí | Framework for secure peer-to-peer communications | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØÀº ¾ÈÀüÇÑ P2P Åë½ÅÀ» À§ÇÑ ÇÁ·¹ÀÓ¿öÅ© Á¤ÀÇÇÏ°í, P2PÅë½ÅÀÇ º¸¾È ¿ä±¸»çÇ×À» ¸¸Á·ÇÏ´Â º¸¾È ±â´ÉÀ» ±â¼úÇÑ´Ù. À̸¦ À§ÇØ ±âº»ÀûÀÎ P2P ¼ºñ½º °³³ä°ú P2P¼ºñ½ºÀÇ 2°¡Áö À¯ÇüÀÎ ºñ±¸Á¶Àû ¹× ±¸Á¶Àû P2P Åë½Å ¹æ½ÄÀ» ±â¼úÇϸç, Á¤º¸ °øÀ¯ ¹× ÄÜÅÙÃ÷ ºÐ¹è, Åë½Å Ç÷§Æû, Çùµ¿ÀÛ¾÷, ºÐ»ê ÄÄÇ»ÆÃÀÇ P2P Åë½Å ¼ºñ½º ½Ã³ª¸®¿À¿Í 4°¡ÁöÀÇ P2P Åë½Å Ư¼ºÀ» ±â¼úÇÑ´Ù.
¶ÇÇÑ, P2PÅë½ÅÀÇ º¸¾È À§ÇùÀÎ µµÃ», DDoS °ø°ÝÀ» ÃÊ·¡ÇÏ´Â À§ÇùÀÎ Åë½Å ¹æÇØ(communication jamming), µ¥ÀÌÅÍÀÇ ÁÖÀÔ ¹× º¯Çü, ºñÀΰ¡ Á¢¼Ó, µ¥ÀÌŸ Àü¼Û¼ö½Å ºÎÀÎ(Reputation), MITM(Man-In-The-Middle Attack) µîÀ» Á¤ÀÇÇÑ´Ù. ÀÌ·¯ÇÑ º¸¾È À§ÇùÀ» ¹æÁöÇϱâ À§ÇØ P2P ³×Æ®¿öÅ©ÀÇ »ç¿ëÀÚ ±ÇÇÑ, ÀÍ¸í¼º, ÇÁ¶óÀ̹ö½Ã, µ¥ÀÌÅÍ ¹«°á¼º ¹× º¸¾È¼º, Á¢±ÙÁ¦¾î, ºÎÀιæÁö, »ç¿ë¼º ¹× °¡¿ë¼º, ÃßÀû¼º, Æ®·¡ÇÈ Á¦¾î µî º¸¾È ¿ä±¸»çÇ×À» Á¤ÀÇÇÏ°í, º¸¾È ¿ä±¸»çÇ×°ú º¸¾È À§ÇùÀÇ °ü°è¸¦ Á¤ÀÇÇÑ´Ù. |
||
¿µ¹®³»¿ë¿ä¾à | This standard defines the framework for the secure peer-to-peer(P2P) communications, in addition, it describes the security requirements of P2P communications.
Before telling the security threats and requirements for P2P communications, the concepts of P2P communications are explained and two kinds of P2P service concepts are introduced such as unstructured and structured P2P communications. The service scenario of P2P communications is expressed such as Information sharing and contents distribution, Communication platform, Collaboration, Distributed computing. The characteristics of P2P communications regarding security are described. |
||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAE.IT-X1161.pdf |