Post

[Security] Basic Concepts of Cybersecurity(4) - Passive&Active Attack

[Security] Basic Concepts of Cybersecurity(4) - Passive&Active Attack

๐Ÿ”’ ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ๊ธฐ์ดˆ ์ˆ˜์—… ์ •๋ฆฌ

Passive Attack

๐Ÿ“šPassive Attack: ๊ณต๊ฒฉ์ž๊ฐ€ ๋„คํŠธ์›Œํฌ ํŠธ๋ž˜ํ”ฝ์„ ์—ฟ๋“ฃ๋Š”(eavesdropping) ๊ณต๊ฒฉ ๋ฐฉ์‹

โœ…ํŠน์ง•:

  • ๋ฐ์ดํ„ฐ๋ฅผ ๋ณ€๊ฒฝํ•˜์ง€ ์•Š์Œ - ์˜ค์ง โ€œ๊ด€์ฐฐโ€
  • ์‹œ์Šคํ…œ์— ํ”์ ์„ ๋‚จ๊ธฐ์ง€ ์•Š์•„์„œ ํƒ์ง€๊ฐ€ ์–ด๋ ค์›€
  • ๋ชฉํ‘œ: ๋น„๋ฐ€๋ฒˆํ˜ธ, ์‹ ์šฉ์นด๋“œ ์ •๋ณด ๋“ฑ ๋ฏผ๊ฐํ•œ ๋ฐ์ดํ„ฐ ์ˆ˜์ง‘

Passive Attack 3๊ฐ€์ง€ ์œ ํ˜•

  1. Eavesdropping(๋„์ฒญ): ํ†ต์‹ ์„ ๊ฐ€๋กœ์ฑ„์„œ ๋ฌด๋‹จ์œผ๋กœ ์ •๋ณด์— ์ ‘๊ทผ
    • ex: ๊ณต๊ณต WiFi์—์„œ ์•”ํ˜ธํ™”๋˜์ง€ ์•Š์€ ํ†ต์‹  ๊ฐ€๋กœ์ฑ„๊ธฐ
  2. Monitoring(๋ชจ๋‹ˆํ„ฐ๋ง): ๋„คํŠธ์›Œํฌ ํ™œ๋™์„ ๊ด€์ฐฐํ•˜์—ฌ ์ทจ์•ฝ์ ์„ ์ฐพ์Œ
    • ex: ์–ด๋–ค ์„œ๋ฒ„์™€ ์ž์ฃผ ํ†ต์‹ ํ•˜๋Š”์ง€ ํŒจํ„ด ๋ถ„์„
  3. Data Theft(๋ฐ์ดํ„ฐ ํƒˆ์ทจ): ์ž๊ฒฉ์ฆ๋ช…(credentials) ๊ฐ™์€ ๋ฏผ๊ฐํ•œ ์ •๋ณด๋ฅผ ์ˆ˜์ง‘
    • ex: ์•”ํ˜ธํ™”๋˜์ง€ ์•Š์€ ๋กœ๊ทธ์ธ ์ •๋ณด ์บก์ฒ˜

Passive Attack ์˜ˆ์‹œ

  1. Traffic Analysis(ํŠธ๋ž˜ํ”ฝ ๋ถ„์„): ๋„คํŠธ์›Œํฌ ํŠธ๋ž˜ํ”ฝ ํŒจํ„ด์„ ๋ถ„์„
    • ๋ˆ„๊ฐ€ ๋ˆ„๊ตฌ์™€ ํ†ต์‹ ํ•˜๋Š”์ง€, ํ†ต์‹  ๋นˆ๋„, ๋ฐ์ดํ„ฐ ํฌ๊ธฐ ๋“ฑ์„ ์•Œ์•„๋ƒ„
    • ์˜ˆ์‹œ: ํšŒ์‚ฌ ์ง์›์ด ๊ฒฝ์Ÿ์‚ฌ ์›น์‚ฌ์ดํŠธ์™€ ์ž์ฃผ ํ†ต์‹ ํ•œ๋‹ค๋ฉด, ๊ณต๊ฒฉ์ž๋Š” โ€œ๊ธฐ๋ฐ€ ์ •๋ณด ์œ ์ถœโ€์„ ์ถ”๋ก ํ•  ์ˆ˜ ์žˆ๋‹ค.
  2. Keylogging(ํ‚ค๋กœ๊น…): ์‚ฌ์šฉ์ž์˜ ํ‚ค๋ณด๋“œ ์ž…๋ ฅ์„ ๋ชฐ๋ž˜ ๊ธฐ๋ก
    • ์•„์ด๋””/๋น„๋ฐ€๋ฒˆํ˜ธ, ์‹ ์šฉ์นด๋“œ ๋ฒˆํ˜ธ, ๊ฐœ์ธ ๋ฉ”์„ธ์ง€ ๋“ฑ์ด ์บก์ณ๋จ

Passive Attack์˜ ์˜ํ–ฅ

alt text


Passive Attack ๋ฐฉ์–ด ์ „๋žต

alt text

  1. Encryption (์•”ํ˜ธํ™”): ์ „์†ก ์ค‘(in transit)๊ณผ ์ €์žฅ ์ค‘(at rest) ๋ฐ์ดํ„ฐ๋ฅผ ์•”ํ˜ธํ™”ํ•˜์—ฌ, ๊ฐ€๋กœ์ฑ„๋”๋ผ๋„ ์ฝ์„ ์ˆ˜ ์—†๊ฒŒ ๋งŒ๋“ฆ - ๊ฐ€์žฅ ํšจ๊ณผ์ 

์˜ˆ์‹œ:

  • HTTPS (์›น์‚ฌ์ดํŠธ ํ†ต์‹  ์•”ํ˜ธํ™”)
  • VPN (๊ฐ€์ƒ ์‚ฌ์„ค๋ง)
  1. Strong Passwords & Access Controls (๊ฐ•๋ ฅํ•œ ๋น„๋ฐ€๋ฒˆํ˜ธ์™€ ์ ‘๊ทผ ์ œ์–ด)
    • ๋ณต์žกํ•œ ๋น„๋ฐ€๋ฒˆํ˜ธ ์‚ฌ์šฉ (๋Œ€์†Œ๋ฌธ์ž, ์ˆซ์ž, ํŠน์ˆ˜๋ฌธ์ž)
    • ๋‹ค๋‹จ๊ณ„ ์ธ์ฆ (MFA)
    • ์—ญํ•  ๊ธฐ๋ฐ˜ ์ ‘๊ทผ ์ œ์–ด (RBAC)
    • ์ตœ์†Œ ๊ถŒํ•œ ์›์น™
  2. Network Monitoring Tools (๋„คํŠธ์›Œํฌ ๋ชจ๋‹ˆํ„ฐ๋ง ๋„๊ตฌ): ๋น„์ •์ƒ์ ์ธ ํŒจํ„ด์ด๋‚˜ ์ด์ƒ ์ง•ํ›„๋ฅผ ํƒ์ง€ํ•˜๋Š” ๋„๊ตฌ ์‚ฌ์šฉ

๋„๊ตฌ ์˜ˆ์‹œ:

  • IDS (Intrusion Detection System)
  • SIEM (Security Information and Event Management)
  • Network Analyzer

โŒํ•œ๊ณ„: Passive Attack์€ ์ •์ƒ ํŠธ๋ž˜ํ”ฝ์ฒ˜๋Ÿผ ๋ณด์ด๋ฏ€๋กœ ์ง์ ‘ ํƒ์ง€๊ฐ€ ์–ด๋ ต๋‹ค.


Active Attack

๐Ÿ“šActive Attack: ๊ณต๊ฒฉ์ž๊ฐ€ ์‹œ์Šคํ…œ์ด๋‚˜ ๋ฐ์ดํ„ฐ๋ฅผ ์ง์ ‘ ๋ณ€๊ฒฝ/๋ฐฉํ•ดํ•˜๋Š” ๊ณต๊ฒฉ ๋ฐฉ์‹

โœ…ํŠน์ง•:

  • ๋ฐ์ดํ„ฐ ๋ณ€์กฐ: ๋‹จ์ˆœํžˆ ๊ด€์ฐฐ๋งŒ ํ•˜์ง€ ์•Š๊ณ  ์‹ค์ œ๋กœ ์ˆ˜์ •, ์‚ญ์ œ, ์‚ฝ์ž…ํ•จ
  • ์‹œ์Šคํ…œ๊ณผ ์ƒํ˜ธ์ž‘์šฉ: ๋„คํŠธ์›Œํฌ์— ๋Šฅ๋™์ ์œผ๋กœ ๊ฐœ์ž…
  • ํ”ผํ•ด ์œ ๋ฐœ ๋ชฉ์ : ์‹œ์Šคํ…œ์„ ์†์ƒ์‹œํ‚ค๊ฑฐ๋‚˜ ๋ฌด๋‹จ ์ ‘๊ทผ
  • ํƒ์ง€ ๊ฐ€๋Šฅ: ์‹œ์Šคํ…œ์— ์˜ํ–ฅ์„ ์ฃผ๋ฏ€๋กœ Passive Attack๋ณด๋‹ค ๋ฐœ๊ฒฌ์ด ์‰ฝ๋‹ค

Active Attack 3๊ฐ€์ง€ ์œ ํ˜•

  1. Modification (๋ณ€์กฐ): ๋ฐ์ดํ„ฐ๋‚˜ ์‹œ์Šคํ…œ ์„ค์ •์„ ๋ณ€๊ฒฝํ•˜์—ฌ ํ”ผํ•ด๋ฅผ ์ž…ํž˜
    • ์˜ˆ์‹œ: ์ด๋ฉ”์ผ ๋‚ด์šฉ ๋ณ€์กฐ ํ›„ ์ „๋‹ฌ
  2. Disruption (๋ฐฉํ•ด): ์„œ๋น„์Šค ์ค‘๋‹จ์„ ์ผ์œผ์ผœ ์ •์ƒ ์‚ฌ์šฉ์ž์˜ ์ ‘๊ทผ์„ ๋ง‰์Œ
    • ์˜ˆ์‹œ: DDoS๋กœ ์„œ๋ฒ„ ๋‹ค์šด, ๋žœ์„ฌ์›จ์–ด๋กœ ํŒŒ์ผ ์•”ํ˜ธํ™”
  3. Unauthorized Access (๋ฌด๋‹จ ์ ‘๊ทผ): ์ทจ์•ฝ์ ์„ ์•…์šฉํ•˜์—ฌ ๋ฏผ๊ฐํ•œ ์ •๋ณด๋‚˜ ์‹œ์Šคํ…œ์— ๋Œ€ํ•œ ํ†ต์ œ๊ถŒ์„ ํš๋“
    • ์˜ˆ์‹œ: SQL Injection์œผ๋กœ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค ์ ‘๊ทผ

Active Attack ์˜ˆ์‹œ

  1. Malware (์•…์„ฑ ์†Œํ”„ํŠธ์›จ์–ด): Virus, Worm, Trojan ๋“ฑ์„ ํฌํ•จ

  2. DDoS (Distributed Denial of Service): ์‹œ์Šคํ…œ์— ๊ณผ๋„ํ•œ ํŠธ๋ž˜ํ”ฝ์„ ์ค˜์„œ ๊ณผ๋ถ€ํ™”๋ฅผ ๋ฐœ์ƒ์‹œํ‚ด

  3. Spoofing (์Šคํ‘ธํ•‘): ์ •๋‹นํ•œ ์‚ฌ์šฉ์ž๋‚˜ ์‹œ์Šคํ…œ์„ ๊ฐ€์žฅํ•˜๋Š” ๊ณต๊ฒฉ


์ฃผ์š” Active Attack

  1. ๐Ÿ”„Replay Attack: ๋„คํŠธ์›Œํฌ ํŠธ๋ž˜ํ”ฝ์„ ์บก์ฒ˜ํ•œ ํ›„ ๋‚˜์ค‘์— ์žฌ์ „์†กํ•˜์—ฌ ๋ณด์•ˆ์„ ์šฐํšŒ
    • ๊ณต๊ฒฉ ํ”„๋กœ์„ธ์Šค:
  2. ๊ณต๊ฒฉ์ž๊ฐ€ ์ •๋‹นํ•œ ๋„คํŠธ์›Œํฌ ํŠธ๋ž˜ํ”ฝ ์บก์ฒ˜ (์˜ˆ: ๋กœ๊ทธ์ธ ํŒจํ‚ท)
  3. ๋‚˜์ค‘์— ๋™์ผํ•œ ํŒจํ‚ท์„ ์žฌ์ „์†ก
  4. ๋ณด์•ˆ ์กฐ์น˜๋ฅผ ์šฐํšŒํ•˜๊ณ  ๋ฌด๋‹จ ์ ‘๊ทผ ํš๋“
    • ์˜ˆ์‹œ: ์ธ์ฆ ํ† ํฐ์„ ์žฌ์‚ฌ์šฉํ•˜์—ฌ ๋กœ๊ทธ์ธ
  5. ๐Ÿ•ต๏ธMan-in-the-Middle (MITM, ์ค‘๊ฐ„์ž ๊ณต๊ฒฉ): ๊ณต๊ฒฉ์ž๊ฐ€ ์‚ฌ์šฉ์ž์™€ ์„œ๋ฒ„ ์‚ฌ์ด์— ๋ผ์–ด๋“ค์–ด ๋ชจ๋“  ํ†ต์‹ ์„ ๊ฐ€๋กœ์ฑ„๊ณ  ์ˆ˜์ •
    • ๊ณต๊ฒฉ ํ”„๋กœ์„ธ์Šค:
  6. ๊ณต๊ฒฉ์ž๊ฐ€ ๋‘ ํ†ต์‹  ๋‹น์‚ฌ์ž ์‚ฌ์ด์— ์œ„์น˜
  7. ์–‘์ธก์˜ ๋ฉ”์‹œ์ง€๋ฅผ ๊ฐ€๋กœ์ฑ„์„œ ์ฝ์Œ (Eavesdropping)
  8. ๋ฉ”์‹œ์ง€๋ฅผ ์ˆ˜์ •ํ•œ ํ›„ ์ „๋‹ฌ (Modification)
  9. ์–‘์ธก์€ ์ง์ ‘ ํ†ต์‹ ํ•œ๋‹ค๊ณ  ๋ฏฟ์Œ

  10. ๐Ÿ’‰SQL Injection: ์•…์„ฑ SQL ์ฝ”๋“œ๋ฅผ ์ฃผ์ž…ํ•˜์—ฌ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค๋ฅผ ๋ฌด๋‹จ์œผ๋กœ ์กฐ์ž‘ํ•˜๊ณ  ์ •๋ณด๋ฅผ ํƒˆ์ทจ

  11. ๐Ÿ“œCross-Site Scripting (XSS): ์•…์„ฑ ์Šคํฌ๋ฆฝํŠธ๋ฅผ ์›น์‚ฌ์ดํŠธ์— ์‚ฝ์ž…ํ•˜์—ฌ ์‚ฌ์šฉ์ž ์„ธ์…˜์„ ํƒˆ์ทจํ•˜๊ฑฐ๋‚˜ ํ”ผ์‹ฑ
    • ์˜ˆ์‹œ: ๋Œ“๊ธ€๋ž€์— <script>์•…์„ฑ์ฝ”๋“œ</script> ์‚ฝ์ž…

Active Attack์˜ ์˜ํ–ฅ

alt text

  1. Loss of Availability (๊ฐ€์šฉ์„ฑ ์†์‹ค)
    • DDoS ๊ณต๊ฒฉ: ์„œ๋น„์Šค ์™„์ „ ์ค‘๋‹จ
    • ์žฌ์ •์  ํ”ผํ•ด: ๋‹ค์šดํƒ€์ž„๋‹น ์ˆ˜๋ฐฑ๋งŒ ์› ์†์‹ค
    • ํ‰ํŒ ์†์ƒ: ๊ณ ๊ฐ ์‹ ๋ขฐ ์ƒ์‹ค
  2. Data Corruption/Loss (๋ฐ์ดํ„ฐ ์†์ƒ/์†์‹ค)
    • ๋ฌด๊ฒฐ์„ฑ ์นจํ•ด: ๋ฐ์ดํ„ฐ ๋ณ€์กฐ๋กœ ์‹ ๋ขฐ์„ฑ ์ƒ์‹ค
    • ๋น„์ฆˆ๋‹ˆ์Šค ์ค‘๋‹จ: ์ค‘์š” ๋ฐ์ดํ„ฐ ์†์‹ค๋กœ ์—…๋ฌด ๋งˆ๋น„
    • ๋ฒ•์  ๋ฌธ์ œ: ๊ฐœ์ธ์ •๋ณด ์œ ์ถœ ์‹œ ๊ณผ์ง•๊ธˆ
  3. System Compromise (์‹œ์Šคํ…œ ์นจํ•ด)
    • ์™„์ „ํ•œ ํ†ต์ œ: ๊ด€๋ฆฌ์ž ๊ถŒํ•œ ํƒˆ์ทจ
    • ์ถ”๊ฐ€ ๊ณต๊ฒฉ ๋ฐœํŒ: ๋‹ค๋ฅธ ์‹œ์Šคํ…œ ๊ณต๊ฒฉ์— ํ™œ์šฉ
    • ๋ฐ์ดํ„ฐ ์œ ์ถœ: ๋ชจ๋“  ๋ฏผ๊ฐ ์ •๋ณด ์ ‘๊ทผ ๊ฐ€๋Šฅ

Active Attack ๋ฐฉ์–ด ์ „๋žต

alt text

  1. Firewalls (๋ฐฉํ™”๋ฒฝ): ๋„คํŠธ์›Œํฌ ํŠธ๋ž˜ํ”ฝ ํ•„ํ„ฐ๋ง

์ž‘๋™ ๋ฐฉ์‹:

  • ์ธ๋ฐ”์šด๋“œ/์•„์›ƒ๋ฐ”์šด๋“œ ํŠธ๋ž˜ํ”ฝ ๊ฒ€์‚ฌ
  • ์ •์˜๋œ ๊ทœ์น™์— ๋”ฐ๋ผ ์ฐจ๋‹จ/ํ—ˆ์šฉ
  • ํฌํŠธ, IP ์ฃผ์†Œ, ํ”„๋กœํ† ์ฝœ ๊ธฐ๋ฐ˜ ํ•„ํ„ฐ๋ง
  1. IDS/IPS (์นจ์ž… ํƒ์ง€/๋ฐฉ์ง€ ์‹œ์Šคํ…œ)

IDS (Intrusion Detection System):

  • ์˜์‹ฌ์Šค๋Ÿฌ์šด ํ™œ๋™ ํƒ์ง€ ๋ฐ ๊ฒฝ๊ณ 
  • ๋กœ๊ทธ ๊ธฐ๋ก ๋ฐ ์•Œ๋ฆผ ์ „์†ก
  • ์ˆ˜๋™์  ๋ชจ๋‹ˆํ„ฐ๋ง

IPS (Intrusion Prevention System):

  • ์˜์‹ฌ์Šค๋Ÿฌ์šด ํ™œ๋™ ์ž๋™ ์ฐจ๋‹จ
  • ์‹ค์‹œ๊ฐ„ ์œ„ํ˜‘ ๋Œ€์‘
  • ๋Šฅ๋™์  ๋ฐฉ์–ด

IDS๋Š” โ€œ๊ฒฝ๋ณด๊ธฐโ€, IPS๋Š” โ€œ์ž๋™ ์†Œํ™”๊ธฐโ€

  1. Access Control Lists (ACLs): ๋ฆฌ์†Œ์Šค ์ ‘๊ทผ ๊ถŒํ•œ ๊ทœ์น™ ์ •์˜

Passive vs Active Attacks

alt text

This post is licensed under CC BY 4.0 by the author.