Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0362 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2020-12-10 ÃÑÆäÀÌÁö 15
ÇѱÛÇ¥ÁØ¸í ´Éµ¿Àû ³×Æ®¿öÅ© ¹æ¾î ¼­ºñ½º¸¦ À§ÇÑ ¼­¹ö Àº´Ð¿ë ¹Ì³¢ ³ëµå ¿î¿µ ÀýÂ÷
¿µ¹®Ç¥Áظí Decoy Node Operating Procedures for Server Concealment in Network Moving Target Defense Service
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº ³×Æ®¿öÅ© ´Éµ¿Àû ³×Æ®¿öÅ© ¹æ¾î ¼­ºñ½º Áß¿¡¼­ ÅäÆú·ÎÁö ÁÖ¼Ò º¯ÀÌ ¼­ºñ½º¸¦ Àû¿ëÇϱâ À§ÇÑ ¹Ì³¢ ³ëµå ¿î¿µ ÀýÂ÷¸¦ Á¤ÀÇÇÑ´Ù. ÁÖ¿ä ³»¿ëÀº, ÅäÆú·ÎÁö º¯ÀÌ ¼­ºñ½ºÀÇ ±¸¼º ¿ä¼Ò Á¤ÀÇ, º¸È£´ë»ó ¼­¹öÀÇ °ø°Ý Á¢Á¡ È®Àå ¹æ¹ý, ¹Ì³¢ ³ëµå ¿î¿µÀ» À§ÇÑ »ç¼³ ³×Æ®¿öÅ© ±¸¼º ¹× ÆÐŶ Á¦¾î ±×¸®°í ¹Ì³¢ ³ëµå ºñ½Äº°È­ ¹æ¹ýÀ¸·Î ±¸¼ºµÈ´Ù.
¿µ¹®³»¿ë¿ä¾à This standard defines decoy node operating procedures for implementing topology addres mutation service of network moving target defense service. The main content of this standard consists of defining components of topology mutation service, how to extend atack surface on the protected server, configuring private networks and controling packets for decoy node operations, and decoy node de-identifcation procedure.
±¹Á¦Ç¥ÁØ -
°ü·ÃÆÄÀÏ TTAK.KO-12.0362.pdf TTAK.KO-12.0362.pdf            

ÀÌÀü
´Éµ¿Àû ³×Æ®¿öÅ© ¹æ¾î ¼­ºñ½º¸¦ À§ÇÑ ¼­¹ö IP ÁÖ¼Ò ¹× ¼­ºñ½º Port ¹øÈ£ º¯ÀÌ ÀýÂ÷
´ÙÀ½
Â÷·®¿ë ÀÌ´õ³Ý º¸¾È¿ä±¸»çÇ×