Ȩ > Ç¥ÁØÈ Âü¿© > TTA°£Ç๰ > ICT Standard Weekly
[Á¤º¸º¸È£] ±Û·Î¹ú »çÀ̹öº¸¾È Á¤º¸±³·ù ±¹Á¦Ç¥ÁØÈ µ¿Çâ
Áö³ 7¿ù 7ÀÏ Çѱ¹°ú ¹Ì±¹ÀÇ ÁÖ¿ä »çÀÌÆ®°¡ DDoS(Distributed Denial of Service: ºÐ»ê¼ºñ½º°ÅºÎ) °ø°ÝÀ» ¹Þ¾Æ ¼ºñ½º°¡ ¸¶ºñµÇ´Â »óȲÀÌ ¹ß»ýÇß´Ù. 7․7 DDoS ´ë¶õÀ̶ó ºÒ¸®´Â À̹ø »ç°Ç»Ó¸¸ ¾Æ´Ï¶ó ¼¼°è °÷°÷¿¡¼´Â ¹üÁËÀû ¾ç»óÀ» ¶ì´Â ´Ù¾çÇÑ »çÀ̹ö ¹üÁË ¹ß»ýÀÌ Áõ°¡Çϰí ÀÖ´Ù.
ÀÌ¿Í °ü·ÃÇÏ¿© ¹Ì(Ú¸) Á¤ºÎ´Â Áö³ 5¿ù 30ÀÏ '»çÀ̹ö½ºÆäÀ̽º Á¤Ã¥ ¸®ºä(Cyberspace Policy Review)'¸¦ ¹ßÇ¥ÇØ »çÀ̹öº¸¾ÈÀÇ Ã¥ÀÓ °øÀ¯, »çÀ̹öº¸¾È »ç°í ¹ß»ý ½Ã ±ä¹ÐÇÑ ´ëÀÀÀ» À§ÇÑ À¯°ü±â°ü °£ÀÇ Á¤º¸ °øÀ¯ ¹× »ç°í ´ëÀÀÀ» À§ÇÑ Ã¼°è ±¸Ãà µîÀÇ Àü·«À» ³»¼¼¿î ¹Ù ÀÖ´Ù. ÀÌ·¯ÇÑ Àü·«ÀÇ ¿¬Àå¼±À¸·Î ¿¹»óµÇ´Â »çÀ̹öº¸¾È¿¡ ´ëÇÑ ±¹Á¦Ç¥ÁØÈ Ȱµ¿ÀÌ ITU-T SG17 Q.4(»çÀ̹öº¸¾È ¿¬±¸°úÁ¦)¿¡¼ ÁøÇàµÇ°í ÀÖ¾î º» °í¿¡¼´Â Áö³ 9¿ù ½ºÀ§½º Á¦³×¹Ù¿¡¼ °³ÃÖµÈ Q.4/17 ȸÀÇ¿¡¼ ³íÀÇµÈ »çÀ̹öº¸¾È Á¤º¸±³·ù Ç¥ÁØÈ¸¦ À§ÇÑ ÁÖ¿ä ³»¿ëÀ» ±â¼úÇÑ´Ù.
9¿ù ȸÀÇ ÀïÁ¡ »çÇ×À» ¾ð±ÞÇϱ⿡ ¾Õ¼, ¹Ì±¹´ëÇ¥ÀÌÀÚ Q.4/17ÀÇ ¶óÆ÷óÀÎ Anthony M. RutkowskiÀº 6¿ù ÀÎÅ͸² ȸÀǸ¦ ÅëÇØ '»çÀ̹öº¸¾È Á¤º¸ ±³È¯ ÇÁ·¹ÀÓ¿öÅ©'¸¦ ¼Ò°³ÇÏ°í »çÀ̹öº¸¾È Á¤º¸ ±³È¯ ÇÁ·¹ÀÓ¿öÅ©¸¦ ¸¸Á·½Ã۱â À§ÇÑ ÁÖ¿ä ¿ä±¸»çÇ×À» Á¤ÀÇÇÏ¿´´Ù. <±×¸² 1>Àº Anthony M. Rutkowski¿¡ ÀÇÇÏ¿© Á¦¾ÈµÈ »çÀ̹öº¸¾È Á¤º¸ ±³È¯ ÇÁ·¹ÀÓ¿öÅ©ÀÇ °³³äÀ» ³ªÅ¸³½´Ù. ´Ü, Á¦¾È ÇÁ·¹ÀÓ¿öÅ©´Â Á¤º¸ ±³È¯ Âü¿©ÀÚ °£¿¡ ±³È¯µÇ´Â Á¤º¸ ÀÚü¿Í ±³È¯¿¡ ´ëÇØ¼¸¸ ´Ù·ç°í, °¢ Á¤º¸ ±³È¯ Âü¿©ÀÚÀÇ »çÀ̹öº¸¾È Á¤º¸ ¼öÁý ¹æ½Ä ¹× ±³È¯µÈ Á¤º¸ÀÇ È°¿ë¿¡ ´ëÇÑ ºÎºÐÀº °¢ Á¤º¸ ±³È¯ Âü¿©ÀÚ¿¡°Ô ¸Ã±â°í ÀÖ¾î, º» Ç¥ÁØÈ ¾ÆÀÌÅÛÀÇ ¿¬±¸¹üÀ§¿¡¼´Â ´Ù·çÁö ¾Ê´Â´Ù.
<±×¸² 1> »çÀ̹öÁ¤º¸ ±³È¯ ÇÁ·¹ÀÓ¿öÅ©
(Ãâó: ITU-T Q.4/17 Proposed initial draft text for Rec. ITU-T X.cybex, Cybersecurity information exchange framework (TD503))
ÀÌ Á¦¾ÈÀº Áö³ 6¿ù Á¦³×¹Ù ÀÎÅ͸² ¿¬±¸°úÁ¦ 4 ȸÀÇ¿¡¼ Á¦±âµÈ ÀÌ·¡, Á¦¾ÈµÈ Ç¥ÁØÈ ¿öÅ© ¾ÆÀÌÅÛÀº 9¿ù SG17 Á¤±â ȸÀǸ¦ ÅëÇØ °ø½ÄȵǾú°í, ÀÌ¿Í °ü·ÃÇÏ¿© »çÀ̹öº¸¾È Á¤º¸ ±³È¯ ÇÁ·¹ÀÓ¿öÅ© ±¸ÇöÀ» À§ÇÑ ÁÖ¿ä ¿ä¼Ò Ç¥ÁØ ¾ÆÀÌÅÛÀ¸·Î ¹Ì±¹ÀÇ Á¤º¸º¸È£ °ü·Ã ¿¬±¸ °³¹ß ±â°üÀÎ MitreÀÇ ´Ù¾çÇÑ Á¤º¸º¸È£ °ü·Ã ½Ã½ºÅÛ ¹× ±â¼úµé°ú NISTÀÇ Á¤º¸º¸È£ Ç¥ÁصéÀ» ºñ·ÔÇÑ ´ÙÀ½ÀÇ ¾ÆÀÌÅÛµéÀ» ITU-T ½Å±Ô Ç¥ÁØÈ ¾ÆÀÌÅÛÀ¸·Î äÅÃÇß´Ù.
• X.cwe, Common Weakness Enumeration
• X.cwss, Common Weakness Scoring System
• X.oval, Open Vulnerability and Assessment Language
• X.scap, Security Content Automation Protocol
• X.xccdf, eXensible Configuration Checklist Description Format
• X.cpe, Common Platform Enumeration
• X.cce, Common Configuration Enumeration
• X.crf, Common Result Format
• X.cee, Common Event Expression
• X.iodef, Incident Object Description Exchange Format
• X.capec, Common Attack Pattern Enumeration and Classification
• X.dpi, Deep Packet Inspection Exchange Format
• X.pfoc, Phishing, Fraud, and Other Crimeware Exchange Format
• X.gridf, SmartGrid Incident Exchange Format
• X.chirp, Cybersecurity Heuristics and Information Request Protocol
ÀÌ¿Í ÇÔ²² »çÀ̹öº¸¾È Á¤º¸ ±³È¯ ÇÁ·¹ÀÓ¿öÅ©¿Í °ü·ÃÇÏ¿© ´ÙÀ½ÀÇ ¾ÆÀÌÅÛµéÀÌ °¢ ±¹ÀÇ ´ëÇ¥´ÜÀ¸·ÎºÎÅÍ ¹ßÇ¥µÇ¾î Ãß°¡ÀûÀÎ ½Å±Ô Ç¥ÁØÈ ¾ÆÀÌÅÛÀ¸·Î äÅõǾú´Ù.
• X.cybex.1, An OID arc for cybersecurity information
• X.cve, Common Vulnerabilities and Exposures
• X.cvss, Common vulnerability scoring system
• X.cybex-disc, Discovery mechanisms in the exchange of cybersecurity information
• X.cybex-tp, Transport protocols supporting cybersecurity information exchange
• X.cybex.2: Use of XML Namespace in the Cybersecurity Information Exchange Framework
• X.cybex-beep: Definition of BEEP Profile for Cybersecurity Information Exchange
• X.teef, Cyber attack tracing event exchange format
<±×¸² 2>´Â »çÀ̹öº¸¾È Á¤º¸ ±³È¯ ÇÁ·¹ÀÓ¿öÅ©ÀÇ ÇÑ ºÎºÐÀ¸·Î ±³È¯ Á¤º¸ÀÇ Ã¼°èȸ¦ À§ÇÑ ¿ä¼Ò ¹× ¿ä¼Ò °£ °ü°è¸¦ ³ªÅ¸³½´Ù.
<±×¸² 2> ±³È¯ Á¤º¸ ü°èȸ¦ À§ÇÑ ¿ä¼Ò ¹× ¿ä¼Ò °£ °ü°è
(Ãâó: ITU-T Q.4/17 Proposed initial draft text for Rec. ITU-T X.cybex, Cybersecurity information exchange framework (TD503))
»çÀ̹öº¸¾È Á¤º¸ ±³È¯ ÇÁ·¹ÀÓ¿öÅ©¿Í ÇÁ·¹ÀÓ¿öÅ©¸¦ Áß½ÉÀ¸·Î ¸¸µé¾îÁø Ç¥ÁØÈ ¾ÆÀÌÅÛµéÀº 2010³â 4¿ù¿¡ ÀÖÀ» Á¤±â ȸÀǸ¦ ¾ÕµÎ°í 2¹øÀÇ ÀÎÅ͸² ȸÀǸ¦ °èȹÇÔÀ¸·Î½á, ÀÎÅ͸² ȸÀÇ¿¡¼ ¹®¼ °³¹ß¿¡ ¹ÚÂ÷¸¦ °¡ÇÏ¿© 2010³â 4¿ù ¿¬±¸¹Ý 17 Á¤±â ȸÀÇ¿¡¼ »çÀ̹öº¸¾È Á¤º¸ ±³È¯ ÇÁ·¹ÀÓ¿öÅ©¿Í °ü·ÃµÈ 3°³ÀÇ ¾ÆÀÌÅÛ(X.cybex, X.cve, X.cvss)µé¿¡ ´ëÇÑ determination ÃßÁøÀ» °èȹÇϰí ÀÖ´Â µî ¹Ì±¹ÀÇ ÁÖµµÇÏ¿¡ Ç¥ÁØÈ°¡ ºü¸¥ ¼Óµµ·Î ÁøÇàµÇ°í ÀÖ´Ù. ¶ÇÇÑ ÀϺ» µî°ú °°Àº ÁÖ¿ä±¹ÀÇ Àû±ØÀûÀÎ Âü¿© ¹× °¢±¹ÀÇ °ü½É, ±×¸®°í »çÀ̹öº¸¾È Á¤º¸ ±³È¯ ÇÁ·¹ÀÓ¿öÅ© °³¹ß¿¡ µû¸¥ ÆÄ±ÞÈ¿°ú·Î ÀÎÇØ ÇØ´ç ¾ÆÀÌÅÛÀÇ Ç¥ÁØ °³¹ßÀÇ ±ÍÃß°¡ ÁÖ¸ñµÇ°í ÀÖ´Ù. ¿ì¸®³ª¶óµµ »çÀ̹öº¸¾È Á¤º¸ ±³È¯ ÇÁ·¹ÀÓ¿öÅ©ÀÇ Ç¥ÁØ °³¹ß ÃßÀ̸¦ »ìÇÇ´Â µî Áö¼ÓÀûÀÎ °ü½É ¹× ÇÊ¿ä ½Ã Âü¿©°¡ ÇÊ¿äÇÒ °ÍÀ¸·Î ÆÇ´ÜµÈ´Ù.