Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0362 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2020-12-10 | ÃÑÆäÀÌÁö | 15 |
ÇѱÛÇ¥Áظí | ´Éµ¿Àû ³×Æ®¿öÅ© ¹æ¾î ¼ºñ½º¸¦ À§ÇÑ ¼¹ö Àº´Ð¿ë ¹Ì³¢ ³ëµå ¿î¿µ ÀýÂ÷ | ||
¿µ¹®Ç¥Áظí | Decoy Node Operating Procedures for Server Concealment in Network Moving Target Defense Service | ||
Çѱ۳»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº ³×Æ®¿öÅ© ´Éµ¿Àû ³×Æ®¿öÅ© ¹æ¾î ¼ºñ½º Áß¿¡¼ ÅäÆú·ÎÁö ÁÖ¼Ò º¯ÀÌ ¼ºñ½º¸¦ Àû¿ëÇϱâ À§ÇÑ ¹Ì³¢ ³ëµå ¿î¿µ ÀýÂ÷¸¦ Á¤ÀÇÇÑ´Ù. ÁÖ¿ä ³»¿ëÀº, ÅäÆú·ÎÁö º¯ÀÌ ¼ºñ½ºÀÇ ±¸¼º ¿ä¼Ò Á¤ÀÇ, º¸È£´ë»ó ¼¹öÀÇ °ø°Ý Á¢Á¡ È®Àå ¹æ¹ý, ¹Ì³¢ ³ëµå ¿î¿µÀ» À§ÇÑ »ç¼³ ³×Æ®¿öÅ© ±¸¼º ¹× ÆÐŶ Á¦¾î ±×¸®°í ¹Ì³¢ ³ëµå ºñ½Äº°È ¹æ¹ýÀ¸·Î ±¸¼ºµÈ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | This standard defines decoy node operating procedures for implementing topology addres mutation service of network moving target defense service. The main content of this standard consists of defining components of topology mutation service, how to extend atack surface on the protected server, configuring private networks and controling packets for decoy node operations, and decoy node de-identifcation procedure. | ||
±¹Á¦Ç¥ÁØ | - | ||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0362.pdf |