ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0362 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2020-12-10 ÃÑ ÆäÀÌÁö 15
ÇÑ±Û Ç¥ÁØ¸í ´Éµ¿Àû ³×Æ®¿öÅ© ¹æ¾î ¼­ºñ½º¸¦ À§ÇÑ ¼­¹ö Àº´Ð¿ë ¹Ì³¢ ³ëµå ¿î¿µ ÀýÂ÷
¿µ¹® Ç¥Áظí Decoy Node Operating Procedures for Server Concealment in Network Moving Target Defense Service
ÇÑ±Û ³»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº ³×Æ®¿öÅ© ´Éµ¿Àû ³×Æ®¿öÅ© ¹æ¾î ¼­ºñ½º Áß¿¡¼­ ÅäÆú·ÎÁö ÁÖ¼Ò º¯ÀÌ ¼­ºñ½º¸¦ Àû¿ëÇϱâ À§ÇÑ ¹Ì³¢ ³ëµå ¿î¿µ ÀýÂ÷¸¦ Á¤ÀÇÇÑ´Ù. ÁÖ¿ä ³»¿ëÀº, ÅäÆú·ÎÁö º¯ÀÌ ¼­ºñ½ºÀÇ ±¸¼º ¿ä¼Ò Á¤ÀÇ, º¸È£´ë»ó ¼­¹öÀÇ °ø°Ý Á¢Á¡ È®Àå ¹æ¹ý, ¹Ì³¢ ³ëµå ¿î¿µÀ» À§ÇÑ »ç¼³ ³×Æ®¿öÅ© ±¸¼º ¹× ÆÐŶ Á¦¾î ±×¸®°í ¹Ì³¢ ³ëµå ºñ½Äº°È­ ¹æ¹ýÀ¸·Î ±¸¼ºµÈ´Ù.
¿µ¹® ³»¿ë¿ä¾à This standard defines decoy node operating procedures for implementing topology addres mutation service of network moving target defense service. The main content of this standard consists of defining components of topology mutation service, how to extend atack surface on the protected server, configuring private networks and controling packets for decoy node operations, and decoy node de-identifcation procedure.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0362.pdf TTAK.KO-12.0362.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
´Éµ¿Àû ³×Æ®¿öÅ© ¹æ¾î ¼­ºñ½º¸¦ À§ÇÑ ¼­¹ö Àº´Ð¿ë ¹Ì³¢ ³ëµå ¿î¿µ ÀýÂ÷ TTAK.KO-12.0362 2020-12-10 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0362.pdf