You cannot see this page without javascript.

진주성 블로그 방문하기

기술문서 DDos 공격대응 가이드

2017.08.25 17:57

gupy1004 조회 수:105

DDos 공격대응 가이드

 

TR-2012-002 DDoS guide.pdf

 

1. DDoS 공격대응 개요 ·································4
2. DDoS 공격대응 절차 ·································5
(1단계) 공격의 인지 ··············································5
(2단계) 공격유형 파악 ············································7
(3단계) 차단정책 정의 및 대응 ···································13
(4단계) 공격대응 및 사후조치 ····································16
(추가사항) DNS 공격대응 방안 ···································17
[별첨1] DDoS 공격대응 매뉴얼 ·························19
[별첨2] DDoS 공격차단을 위한 장비 및 현황 ············21
[별첨3] DDoS 공격유형 분류 및 설명 ···················23
1. DDoS 공격유형 분류 ··········································23
2. UDP/ICMP Traffic Flooding 공격 ·······························24
3. TCP Traffic Flooding 공격 ·····································25
4. IP Flooding 공격 ··············································27
5. HTTP Traffic Flooding 공격 ····································28
6. HTTP Header/Option Spoofing Flooding 공격 ···················31
7. 기타 서비스 마비공격 ·········································37
[별첨4] 주요 DDoS 공격유형별 대응방안 ················43
1. UDP/ICMP Traffic Flooding 공격방어 ···························43
2. SYN Flooding 공격방어 ·······································44
3. GET Flooding 공격방어 ·······································45
4. GET with Cache-Control 공격방어 ······························47
5. HTTP Continuation Data Flooding 공격방어 ·····················48
6. TCP Session 공격방어 ········································49
7. URL Redirect 우회 공격방어 ···································50
8. Slow HTTP POST 공격방어 ···································50

9. DNS 공격방어 ················································52
10. Hash DoS 공격방어 ··········································53
11. Hulk DoS 공격방어 ··········································54
[별첨5] 주요 DDoS 공격도구 분석결과 ··················56
- R.U.D.Y 기반의 Slow POST 공격분석 ···························56
- HTTP DoS Tool 기반의 Slow POST 공격분석 ···················63
- DRDoS (Distributed Reflection DoS) 공격분석 ····················71
- Anonymous WebLoic 공격도구분석 ······························73
- Hash DoS 공격유형 및 도구분석 ································76
- Hulk DoS 공격유형 및 도구분석 ································81

 

번호 제목 날짜 조회 수
65 http protocol 기본적인 이해 2018.04.27 217
64 ISAC (정보공유분석센터) 2018.02.03 216
63 OSI 7 Layer 2017.11.01 214
62 top을 통해 살펴보는 프로세스 정보들 2020.03.05 210
61 정보보안 국가기술자격검정 최종합격자 현황 [1] 2019.03.27 199
60 ThreadDump 분석 2020.01.02 197
59 WLAN, VLAN 2017.11.01 189
58 윈도우 보안 2017.11.01 186
57 전자서명의 원리 file 2017.10.30 183
56 안전한 패스워드 가이드 file 2017.08.24 175
55 ISMS - 정보보호관리체계 2017.11.01 169
54 웹 서버 구축 보안점검 가이드 file 2017.08.25 168
53 웹로직 forceshutdown 시키는 스크립트 file 2017.09.13 166
52 블록체인 file 2017.10.31 161
51 Linux shell script file 2017.08.23 156
진주성 블로그 방문하기
CLOSE