You cannot see this page without javascript.

진주성 블로그 방문하기

첨부 : DDoS 공격대응 가이드.pdf

 

1. DDoS 공격대응 개요 ·································4
2. DDoS 공격대응 절차 ·································5
(1단계) 공격의 인지 ··············································5
(2단계) 공격유형 파악 ············································7
(3단계) 차단정책 정의 및 대응 ···································13
(4단계) 공격대응 및 사후조치 ····································16
(추가사항) DNS 공격대응 방안 ···································17
[별첨1] DDoS 공격대응 매뉴얼 ·························19
[별첨2] DDoS 공격차단을 위한 장비 및 현황 ············21
[별첨3] DDoS 공격유형 분류 및 설명 ···················23
1. DDoS 공격유형 분류 ··········································23
2. UDP/ICMP Traffic Flooding 공격 ·······························24
3. TCP Traffic Flooding 공격 ·····································25
4. IP Flooding 공격 ··············································27
5. HTTP Traffic Flooding 공격 ····································28
6. HTTP Header/Option Spoofing Flooding 공격 ···················31
7. 기타 서비스 마비공격 ·········································37
[별첨4] 주요 DDoS 공격유형별 대응방안 ················43
1. UDP/ICMP Traffic Flooding 공격방어 ···························43
2. SYN Flooding 공격방어 ·······································44
3. GET Flooding 공격방어 ·······································45
4. GET with Cache-Control 공격방어 ······························47
5. HTTP Continuation Data Flooding 공격방어 ·····················48
6. TCP Session 공격방어 ········································49
7. URL Redirect 우회 공격방어 ···································50
8. Slow HTTP POST 공격방어 ···································50

9. DNS 공격방어 ················································52
10. Hash DoS 공격방어 ··········································53
11. Hulk DoS 공격방어 ··········································54
[별첨5] 주요 DDoS 공격도구 분석결과 ··················56
- R.U.D.Y 기반의 Slow POST 공격분석 ···························56
- HTTP DoS Tool 기반의 Slow POST 공격분석 ···················63
- DRDoS (Distributed Reflection DoS) 공격분석 ····················71
- Anonymous WebLoic 공격도구분석 ······························73
- Hash DoS 공격유형 및 도구분석 ································76
- Hulk DoS 공격유형 및 도구분석 ································81

번호 제목 날짜 조회 수
95 Oracle asm file 2017.08.24 494
94 Vtl quick start guide file 2017.08.23 461
93 보안점검 툴 file 2017.08.25 458
92 tcp 상태 전이도 file 2017.08.24 449
91 BroadCast 주소 2018.04.03 445
90 AIX 내부적인 Memory 관리 방법 2020.04.15 392
89 악성코드의 종류 2017.11.07 383
88 hpux 소프트웨어 설치및 제거 2018.02.27 374
87 CSQL 인터프리터 사용방법 2019.11.04 359
86 hpux cron job 실행 에러 처리 방안 2018.07.06 355
85 [리눅스] 다른 서버에 있는 파일 가져오기(SCP 이용) 2018.01.25 348
84 Linux Cache Memory Clear 2020.01.20 336
83 스니핑용 promisc 모드 file 2017.10.29 320
82 부팅(Booting) 과정 2017.11.01 317
81 가우스 장애관련 file 2017.08.25 303
진주성 블로그 방문하기
CLOSE