Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAE.IT-X1161 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2009-12-22 ÃÑÆäÀÌÁö 33
ÇѱÛÇ¥ÁØ¸í ¾ÈÀüÇÑ P2P Åë½ÅÀ» À§ÇÑ ÇÁ·¹ÀÓ¿öÅ©
¿µ¹®Ç¥Áظí Framework for secure peer-to-peer communications
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº ¾ÈÀüÇÑ P2P Åë½ÅÀ» À§ÇÑ ÇÁ·¹ÀÓ¿öÅ© Á¤ÀÇÇÏ°í, P2PÅë½ÅÀÇ º¸¾È ¿ä±¸»çÇ×À» ¸¸Á·ÇÏ´Â º¸¾È ±â´ÉÀ» ±â¼úÇÑ´Ù. À̸¦ À§ÇØ ±âº»ÀûÀÎ P2P ¼­ºñ½º °³³ä°ú P2P¼­ºñ½ºÀÇ 2°¡Áö À¯ÇüÀÎ ºñ±¸Á¶Àû ¹× ±¸Á¶Àû P2P Åë½Å ¹æ½ÄÀ» ±â¼úÇϸç, Á¤º¸ °øÀ¯ ¹× ÄÜÅÙÃ÷ ºÐ¹è, Åë½Å Ç÷§Æû, Çùµ¿ÀÛ¾÷, ºÐ»ê ÄÄÇ»ÆÃÀÇ P2P Åë½Å ¼­ºñ½º ½Ã³ª¸®¿À¿Í 4°¡ÁöÀÇ P2P Åë½Å Ư¼ºÀ» ±â¼úÇÑ´Ù.
¶ÇÇÑ, P2PÅë½ÅÀÇ º¸¾È À§ÇùÀÎ µµÃ», DDoS °ø°ÝÀ» ÃÊ·¡ÇÏ´Â À§ÇùÀÎ Åë½Å ¹æÇØ(communication jamming), µ¥ÀÌÅÍÀÇ ÁÖÀÔ ¹× º¯Çü, ºñÀΰ¡ Á¢¼Ó, µ¥ÀÌŸ Àü¼Û¼ö½Å ºÎÀÎ(Reputation), MITM(Man-In-The-Middle Attack) µîÀ» Á¤ÀÇÇÑ´Ù. ÀÌ·¯ÇÑ º¸¾È À§ÇùÀ» ¹æÁöÇϱâ À§ÇØ P2P ³×Æ®¿öÅ©ÀÇ »ç¿ëÀÚ ±ÇÇÑ, ÀÍ¸í¼º, ÇÁ¶óÀ̹ö½Ã, µ¥ÀÌÅÍ ¹«°á¼º ¹× º¸¾È¼º, Á¢±ÙÁ¦¾î, ºÎÀιæÁö, »ç¿ë¼º ¹× °¡¿ë¼º, ÃßÀû¼º, Æ®·¡ÇÈ Á¦¾î µî º¸¾È ¿ä±¸»çÇ×À» Á¤ÀÇÇÏ°í, º¸¾È ¿ä±¸»çÇ×°ú º¸¾È À§ÇùÀÇ °ü°è¸¦ Á¤ÀÇÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à This standard defines the framework for the secure peer-to-peer(P2P) communications, in addition, it describes the security requirements of P2P communications.
Before telling the security threats and requirements for P2P communications, the concepts of P2P communications are explained and two kinds of P2P service concepts are introduced such as unstructured and structured P2P communications. The service scenario of P2P communications is expressed such as Information sharing and contents distribution, Communication platform, Collaboration, Distributed computing. The characteristics of P2P communications regarding security are described.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAE.IT-X1161.pdf TTAE.IT-X1161.pdf            

ÀÌÀü
e-³»ºñ°ÔÀÌ¼Ç À°»óÁö¿ø½Ã½ºÅÛ ±¸Á¶
´ÙÀ½
Á¤º¸Åë½Å¿ë ÀúÇ×±âÀÇ ÁÖ±âÀû Àü¾Ð ÆÞ½º¿¡ ÀÇÇÑ ÀúÇ×°ªÀÇ º¯È­·® Æò°¡ ¹æ¹ý