You cannot see this page without javascript.

진주성 블로그 방문하기

첨부 : DDoS 공격대응 가이드.pdf

 

1. DDoS 공격대응 개요 ·································4
2. DDoS 공격대응 절차 ·································5
(1단계) 공격의 인지 ··············································5
(2단계) 공격유형 파악 ············································7
(3단계) 차단정책 정의 및 대응 ···································13
(4단계) 공격대응 및 사후조치 ····································16
(추가사항) DNS 공격대응 방안 ···································17
[별첨1] DDoS 공격대응 매뉴얼 ·························19
[별첨2] DDoS 공격차단을 위한 장비 및 현황 ············21
[별첨3] DDoS 공격유형 분류 및 설명 ···················23
1. DDoS 공격유형 분류 ··········································23
2. UDP/ICMP Traffic Flooding 공격 ·······························24
3. TCP Traffic Flooding 공격 ·····································25
4. IP Flooding 공격 ··············································27
5. HTTP Traffic Flooding 공격 ····································28
6. HTTP Header/Option Spoofing Flooding 공격 ···················31
7. 기타 서비스 마비공격 ·········································37
[별첨4] 주요 DDoS 공격유형별 대응방안 ················43
1. UDP/ICMP Traffic Flooding 공격방어 ···························43
2. SYN Flooding 공격방어 ·······································44
3. GET Flooding 공격방어 ·······································45
4. GET with Cache-Control 공격방어 ······························47
5. HTTP Continuation Data Flooding 공격방어 ·····················48
6. TCP Session 공격방어 ········································49
7. URL Redirect 우회 공격방어 ···································50
8. Slow HTTP POST 공격방어 ···································50

9. DNS 공격방어 ················································52
10. Hash DoS 공격방어 ··········································53
11. Hulk DoS 공격방어 ··········································54
[별첨5] 주요 DDoS 공격도구 분석결과 ··················56
- R.U.D.Y 기반의 Slow POST 공격분석 ···························56
- HTTP DoS Tool 기반의 Slow POST 공격분석 ···················63
- DRDoS (Distributed Reflection DoS) 공격분석 ····················71
- Anonymous WebLoic 공격도구분석 ······························73
- Hash DoS 공격유형 및 도구분석 ································76
- Hulk DoS 공격유형 및 도구분석 ································81

번호 제목 날짜 조회 수
110 GeoIP 를 이용한 Apache 설정 - 국가별 접속 차단 2018.06.13 656
109 HP-UX 볼륨 추가 방법 2017.09.07 653
108 TCP 상태전이 2017.11.01 614
107 포렌식 복사 도구 – forecopy_handy 2017.11.11 592
106 route access-list file 2017.10.30 590
105 BCP 2017.11.01 589
104 HTTP Status Code HTTP 상태 코드 2018.05.03 573
103 개발보안 file 2017.11.01 563
102 Process Explorer - 윈도우용 프로세서, 메모리, TCP 모니터링용 file 2017.09.09 548
101 SUN 솔라리스 보안취약점 조치 방안 2018.03.05 546
100 ftp 보안 취약점및 대책 2017.11.05 538
99 [python] MySQL 사용법 예제 2018.10.24 523
98 uptime 갑인가? file 2017.09.13 510
97 HPUX 보안설정 가이드 file 2017.08.25 503
96 Oracle asm file 2017.08.24 494
진주성 블로그 방문하기
CLOSE