TTA °£Ç๰ - ICT Standard Weekly

Ȩ > Ç¥ÁØÈ­ Âü¿© > TTA°£Ç๰ > ICT Standard Weekly

±â¼úÇ¥ÁØÀ̽´

´Ù¿î·Îµå (2009-46È£)
Æ®À§ÅÍ ÆäÀ̽ººÏ ¹ÌÅõµ¥ÀÌ

[Á¤º¸º¸È£] ±Û·Î¹ú »çÀ̹öº¸¾È Á¤º¸±³·ù ±¹Á¦Ç¥ÁØÈ­ µ¿Çâ

Áö³­ 7¿ù 7ÀÏ Çѱ¹°ú ¹Ì±¹ÀÇ ÁÖ¿ä »çÀÌÆ®°¡ DDoS(Distributed Denial of Service: ºÐ»ê¼­ºñ½º°ÅºÎ) °ø°ÝÀ» ¹Þ¾Æ ¼­ºñ½º°¡ ¸¶ºñµÇ´Â »óȲÀÌ ¹ß»ýÇß´Ù. 77 DDoS ´ë¶õÀ̶ó ºÒ¸®´Â À̹ø »ç°Ç»Ó¸¸ ¾Æ´Ï¶ó ¼¼°è °÷°÷¿¡¼­´Â ¹üÁËÀû ¾ç»óÀ» ¶ì´Â ´Ù¾çÇÑ »çÀ̹ö ¹üÁË ¹ß»ýÀÌ Áõ°¡Çϰí ÀÖ´Ù.

ÀÌ¿Í °ü·ÃÇÏ¿© ¹Ì(Ú¸) Á¤ºÎ´Â Áö³­ 5¿ù 30ÀÏ '»çÀ̹ö½ºÆäÀ̽º Á¤Ã¥ ¸®ºä(Cyberspace Policy Review)'¸¦ ¹ßÇ¥ÇØ »çÀ̹öº¸¾ÈÀÇ Ã¥ÀÓ °øÀ¯, »çÀ̹öº¸¾È »ç°í ¹ß»ý ½Ã ±ä¹ÐÇÑ ´ëÀÀÀ» À§ÇÑ À¯°ü±â°ü °£ÀÇ Á¤º¸ °øÀ¯ ¹× »ç°í ´ëÀÀÀ» À§ÇÑ Ã¼°è ±¸Ãà µîÀÇ Àü·«À» ³»¼¼¿î ¹Ù ÀÖ´Ù. ÀÌ·¯ÇÑ Àü·«ÀÇ ¿¬Àå¼±À¸·Î ¿¹»óµÇ´Â »çÀ̹öº¸¾È¿¡ ´ëÇÑ ±¹Á¦Ç¥ÁØÈ­ Ȱµ¿ÀÌ ITU-T SG17 Q.4(»çÀ̹öº¸¾È ¿¬±¸°úÁ¦)¿¡¼­ ÁøÇàµÇ°í ÀÖ¾î º» °í¿¡¼­´Â Áö³­ 9¿ù ½ºÀ§½º Á¦³×¹Ù¿¡¼­ °³ÃÖµÈ Q.4/17 ȸÀÇ¿¡¼­ ³íÀÇµÈ »çÀ̹öº¸¾È Á¤º¸±³·ù Ç¥ÁØÈ­¸¦ À§ÇÑ ÁÖ¿ä ³»¿ëÀ» ±â¼úÇÑ´Ù.

 

9¿ù ȸÀÇ ÀïÁ¡ »çÇ×À» ¾ð±ÞÇϱ⿡ ¾Õ¼­, ¹Ì±¹´ëÇ¥ÀÌÀÚ Q.4/17ÀÇ ¶óÆ÷óÀÎ Anthony M. RutkowskiÀº 6¿ù ÀÎÅ͸² ȸÀǸ¦ ÅëÇØ '»çÀ̹öº¸¾È Á¤º¸ ±³È¯ ÇÁ·¹ÀÓ¿öÅ©'¸¦ ¼Ò°³ÇÏ°í »çÀ̹öº¸¾È Á¤º¸ ±³È¯ ÇÁ·¹ÀÓ¿öÅ©¸¦ ¸¸Á·½Ã۱â À§ÇÑ ÁÖ¿ä ¿ä±¸»çÇ×À» Á¤ÀÇÇÏ¿´´Ù. <±×¸² 1>Àº Anthony M. Rutkowski¿¡ ÀÇÇÏ¿© Á¦¾ÈµÈ »çÀ̹öº¸¾È Á¤º¸ ±³È¯ ÇÁ·¹ÀÓ¿öÅ©ÀÇ °³³äÀ» ³ªÅ¸³½´Ù. ´Ü, Á¦¾È ÇÁ·¹ÀÓ¿öÅ©´Â Á¤º¸ ±³È¯ Âü¿©ÀÚ °£¿¡ ±³È¯µÇ´Â Á¤º¸ ÀÚü¿Í ±³È¯¿¡ ´ëÇØ¼­¸¸ ´Ù·ç°í, °¢ Á¤º¸ ±³È¯ Âü¿©ÀÚÀÇ »çÀ̹öº¸¾È Á¤º¸ ¼öÁý ¹æ½Ä ¹× ±³È¯µÈ Á¤º¸ÀÇ È°¿ë¿¡ ´ëÇÑ ºÎºÐÀº °¢ Á¤º¸ ±³È¯ Âü¿©ÀÚ¿¡°Ô ¸Ã±â°í ÀÖ¾î, º» Ç¥ÁØÈ­ ¾ÆÀÌÅÛÀÇ ¿¬±¸¹üÀ§¿¡¼­´Â ´Ù·çÁö ¾Ê´Â´Ù.

 

<±×¸² 1> »çÀ̹öÁ¤º¸ ±³È¯ ÇÁ·¹ÀÓ¿öÅ©

(Ãâó: ITU-T Q.4/17 Proposed initial draft text for Rec. ITU-T X.cybex, Cybersecurity information exchange framework (TD503))

 

ÀÌ Á¦¾ÈÀº Áö³­ 6¿ù Á¦³×¹Ù ÀÎÅ͸² ¿¬±¸°úÁ¦ 4 ȸÀÇ¿¡¼­ Á¦±âµÈ ÀÌ·¡, Á¦¾ÈµÈ Ç¥ÁØÈ­ ¿öÅ© ¾ÆÀÌÅÛÀº 9¿ù SG17 Á¤±â ȸÀǸ¦ ÅëÇØ °ø½ÄÈ­µÇ¾ú°í, ÀÌ¿Í °ü·ÃÇÏ¿© »çÀ̹öº¸¾È Á¤º¸ ±³È¯ ÇÁ·¹ÀÓ¿öÅ© ±¸ÇöÀ» À§ÇÑ ÁÖ¿ä ¿ä¼Ò Ç¥ÁØ ¾ÆÀÌÅÛÀ¸·Î ¹Ì±¹ÀÇ Á¤º¸º¸È£ °ü·Ã ¿¬±¸ °³¹ß ±â°üÀÎ MitreÀÇ ´Ù¾çÇÑ Á¤º¸º¸È£ °ü·Ã ½Ã½ºÅÛ ¹× ±â¼úµé°ú NISTÀÇ Á¤º¸º¸È£ Ç¥ÁصéÀ» ºñ·ÔÇÑ ´ÙÀ½ÀÇ ¾ÆÀÌÅÛµéÀ» ITU-T ½Å±Ô Ç¥ÁØÈ­ ¾ÆÀÌÅÛÀ¸·Î äÅÃÇß´Ù.

 

X.cwe, Common Weakness Enumeration

X.cwss, Common Weakness Scoring System

X.oval, Open Vulnerability and Assessment Language

X.scap, Security Content Automation Protocol

X.xccdf, eXensible Configuration Checklist Description Format

X.cpe, Common Platform Enumeration

X.cce, Common Configuration Enumeration

X.crf, Common Result Format

X.cee, Common Event Expression

X.iodef, Incident Object Description Exchange Format

X.capec, Common Attack Pattern Enumeration and Classification

X.dpi, Deep Packet Inspection Exchange Format

X.pfoc, Phishing, Fraud, and Other Crimeware Exchange Format

X.gridf, SmartGrid Incident Exchange Format

X.chirp, Cybersecurity Heuristics and Information Request Protocol

 

ÀÌ¿Í ÇÔ²² »çÀ̹öº¸¾È Á¤º¸ ±³È¯ ÇÁ·¹ÀÓ¿öÅ©¿Í °ü·ÃÇÏ¿© ´ÙÀ½ÀÇ ¾ÆÀÌÅÛµéÀÌ °¢ ±¹ÀÇ ´ëÇ¥´ÜÀ¸·ÎºÎÅÍ ¹ßÇ¥µÇ¾î Ãß°¡ÀûÀÎ ½Å±Ô Ç¥ÁØÈ­ ¾ÆÀÌÅÛÀ¸·Î äÅõǾú´Ù.

 

X.cybex.1, An OID arc for cybersecurity information

X.cve, Common Vulnerabilities and Exposures

X.cvss, Common vulnerability scoring system

X.cybex-disc, Discovery mechanisms in the exchange of cybersecurity information

X.cybex-tp, Transport protocols supporting cybersecurity information exchange

X.cybex.2: Use of XML Namespace in the Cybersecurity Information Exchange Framework

X.cybex-beep: Definition of BEEP Profile for Cybersecurity Information Exchange

X.teef, Cyber attack tracing event exchange format

 

<±×¸² 2>´Â »çÀ̹öº¸¾È Á¤º¸ ±³È¯ ÇÁ·¹ÀÓ¿öÅ©ÀÇ ÇÑ ºÎºÐÀ¸·Î ±³È¯ Á¤º¸ÀÇ Ã¼°èÈ­¸¦ À§ÇÑ ¿ä¼Ò ¹× ¿ä¼Ò °£ °ü°è¸¦ ³ªÅ¸³½´Ù.

 

<±×¸² 2> ±³È¯ Á¤º¸ ü°èÈ­¸¦ À§ÇÑ ¿ä¼Ò ¹× ¿ä¼Ò °£ °ü°è

(Ãâó: ITU-T Q.4/17 Proposed initial draft text for Rec. ITU-T X.cybex, Cybersecurity information exchange framework (TD503))

 

»çÀ̹öº¸¾È Á¤º¸ ±³È¯ ÇÁ·¹ÀÓ¿öÅ©¿Í ÇÁ·¹ÀÓ¿öÅ©¸¦ Áß½ÉÀ¸·Î ¸¸µé¾îÁø Ç¥ÁØÈ­ ¾ÆÀÌÅÛµéÀº 2010³â 4¿ù¿¡ ÀÖÀ» Á¤±â ȸÀǸ¦ ¾ÕµÎ°í 2¹øÀÇ ÀÎÅ͸² ȸÀǸ¦ °èȹÇÔÀ¸·Î½á, ÀÎÅ͸² ȸÀÇ¿¡¼­ ¹®¼­ °³¹ß¿¡ ¹ÚÂ÷¸¦ °¡ÇÏ¿© 2010³â 4¿ù ¿¬±¸¹Ý 17 Á¤±â ȸÀÇ¿¡¼­ »çÀ̹öº¸¾È Á¤º¸ ±³È¯ ÇÁ·¹ÀÓ¿öÅ©¿Í °ü·ÃµÈ 3°³ÀÇ ¾ÆÀÌÅÛ(X.cybex, X.cve, X.cvss)µé¿¡ ´ëÇÑ determination ÃßÁøÀ» °èȹÇϰí ÀÖ´Â µî ¹Ì±¹ÀÇ ÁÖµµÇÏ¿¡ Ç¥ÁØÈ­°¡ ºü¸¥ ¼Óµµ·Î ÁøÇàµÇ°í ÀÖ´Ù. ¶ÇÇÑ ÀϺ» µî°ú °°Àº ÁÖ¿ä±¹ÀÇ Àû±ØÀûÀÎ Âü¿© ¹× °¢±¹ÀÇ °ü½É, ±×¸®°í »çÀ̹öº¸¾È Á¤º¸ ±³È¯ ÇÁ·¹ÀÓ¿öÅ© °³¹ß¿¡ µû¸¥ ÆÄ±ÞÈ¿°ú·Î ÀÎÇØ ÇØ´ç ¾ÆÀÌÅÛÀÇ Ç¥ÁØ °³¹ßÀÇ ±ÍÃß°¡ ÁÖ¸ñµÇ°í ÀÖ´Ù. ¿ì¸®³ª¶óµµ »çÀ̹öº¸¾È Á¤º¸ ±³È¯ ÇÁ·¹ÀÓ¿öÅ©ÀÇ Ç¥ÁØ °³¹ß ÃßÀ̸¦ »ìÇÇ´Â µî Áö¼ÓÀûÀÎ °ü½É ¹× ÇÊ¿ä ½Ã Âü¿©°¡ ÇÊ¿äÇÒ °ÍÀ¸·Î ÆÇ´ÜµÈ´Ù.

±è¹ÌÁÖ (Çѱ¹ÀÎÅͳÝÁøÈï¿ø Á¤º¸º¸È£º»ºÎ º¸È£±â¼úÆÀ ¿¬±¸¿ø, mijoo.kim@kisa.or.kr)

* º» ±ÛÀº ÀúÀÚÀÇ ÀǰßÀÏ »Ó TTA ±â°üÀÇ ÀÔÀå°ú´Â ¹«°üÇÕ´Ï´Ù.