nternet i security - bigbook

130
2011 11 ์ œ2๊ถŒ์ œ2ํ˜ธ I nternet & I nformation S ecurity ISSN 2093-9612 โ— Click ๊ธฐ๋ฐ˜์˜ ๊ธฐ๋ณธ MOFI ํ…Œ์ŠคํŠธ๋ฒ ๋“œ ๊ตฌ์ถ• ์ •ํšŒ์ง„, ์ด์žฌ์šฉ, ๊น€๋ณ‘์ฒ  โ— ํ”„๋กœ๊ทธ๋žจํ™” ๋ฐ ๊ฐ€์ƒํ™”๋ฅผ ์ง€์›ํ•˜๋Š” ์ปดํ“จํŒ…/๋„คํŠธ์›Œํ‚น ์ธํ”„๋ผ์ƒ์˜ ๋ฏธ๋ž˜์ง€ํ–ฅ์ ์ธ ์„œ๋น„์Šค ํ•ฉ์„ฑ ๋ฐฉ๋ฒ•๋“ค ๊น€์ข…์›, ํ•œ์ƒ์šฐ โ— ๋น… ๋ฐ์ดํ„ฐ์™€ ๊ณต๊ณต ๋ฐ์ดํ„ฐ ํ™œ์šฉ ์ด๋งŒ์žฌ โ— ๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ ํญ์ฆํ˜„์ƒ๊ณผ ์ฝ˜ํ…์ธ  ์ค‘์‹ฌ ๋„คํŠธ์›Œํ‚น ๊ธฐ์ˆ  ์ด์˜์„ โ— ํ•œ๊ตญ์‚ฌํšŒ ๋ณ€ํ™”์™€ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท ์ •์ฑ…์— ๋Œ€ํ•œ ํƒ์ƒ‰์  ์—ฐ๊ตฌ ๊น€์‚ฌํ˜, ์ตœ์ƒํ›ˆ ํŠน์ง‘ : ๋ฏธ๋ž˜์ธํ„ฐ๋„ท

Upload: others

Post on 16-Oct-2021

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: nternet I Security - BIGBOOK

2011 11์ œ2๊ถŒ ์ œ2ํ˜ธ

Internet & Information Security Internet & Information Security

Internet &Inform

ation Security

์ œ2๊ถŒ

์ œ2ํ˜ธ

2011๏ฟฝ11

ISSN 2093-9612

โ— Click ๊ธฐ๋ฐ˜์˜ ๊ธฐ๋ณธ MOFI ํ…Œ์ŠคํŠธ๋ฒ ๋“œ ๊ตฌ์ถ• ์ •ํšŒ์ง„, ์ด์žฌ์šฉ, ๊น€๋ณ‘์ฒ 

โ— ํ”„๋กœ๊ทธ๋žจํ™” ๋ฐ ๊ฐ€์ƒํ™”๋ฅผ ์ง€์›ํ•˜๋Š” ์ปดํ“จํŒ…/๋„คํŠธ์›Œํ‚น ์ธํ”„๋ผ์ƒ์˜

๋ฏธ๋ž˜์ง€ํ–ฅ์ ์ธ ์„œ๋น„์Šค ํ•ฉ์„ฑ ๋ฐฉ๋ฒ•๋“ค ๊น€์ข…์›, ํ•œ์ƒ์šฐ

โ— ๋น… ๋ฐ์ดํ„ฐ์™€ ๊ณต๊ณต ๋ฐ์ดํ„ฐ ํ™œ์šฉ ์ด๋งŒ์žฌ

โ— ๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ ํญ์ฆํ˜„์ƒ๊ณผ ์ฝ˜ํ…์ธ  ์ค‘์‹ฌ ๋„คํŠธ์›Œํ‚น ๊ธฐ์ˆ  ์ด ์„

โ— ํ•œ๊ตญ์‚ฌํšŒ ๋ณ€ํ™”์™€ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท ์ •์ฑ…์— ํ•œ ํƒ์ƒ‰์  ์—ฐ๊ตฌ ๊น€์‚ฌํ˜, ์ตœ์ƒํ›ˆ

โ— Implementation of Basic MOFI Testbed using Click Whoi-Jin Jung, Jae-Yong Lee, Byung-Chul Kim

โ— Futuristic Service Composition Approaches over a Programmable/VirtualizedComputing/Networking Infrastructure JongWon Kim, Sang Woo Han

โ— Big Data and the Utilization of Public Data Manjai Lee

โ— Data Traffic Explosion and Content-Centric Networking Technologies Young-Seok Lee

โ— Exploratory Research on the Future Internet Policy according to the Changes in Korean Society Sa-Hyuk Kim, Sang-Hoon Choi

ํŠน์ง‘ : ๋ฏธ๋ž˜์ธํ„ฐ๋„ท

Page 2: nternet I Security - BIGBOOK

ํ•œ๊ตญ์ธํ„ฐ๋„ท์ง„ํฅ์›์—์„œ ๋ฐœํ–‰ํ•˜๋Š”

โ€œInternet and Information Securityโ€๋Š”

๊ตญ๋‚ด์™ธ ์ธํ„ฐ๋„ท ๋ฐ ์ •๋ณด๋ณดํ˜ธ ๊ด€๋ จ ๋ฒ•์ œ๋„,

์‚ฌํšŒ๋ฌธํ™”, ๊ธฐ์ˆ  ๋“ฑ์˜ ๋™ํ–ฅ์„ ์‹ฌ์ธต ๋ถ„์„ํ•˜๊ณ ,

ํ•œ๊ตญ์˜ ๋ฐ”๋žŒ์งํ•œ ์ธํ„ฐ๋„ท ์ •์ฑ…๋ฐฉํ–ฅ ์ˆ˜๋ฆฝ์—

๊ธฐ์—ฌํ•  ์ƒˆ๋กœ์šด ์—ฐ๊ตฌ์„ฑ๊ณผ๋ฅผ ์†Œ๊ฐœํ•˜๋Š”

ํ•™์ˆ ์ง€์ž…๋‹ˆ๋‹ค. ๋ณธ ์ €๋„์— ํ•™, ์—ฐ๊ตฌ๊ธฐ๊ด€,

์ •๋ถ€๊ธฐ๊ด€ ์ „๋ฌธ๊ฐ€ ์—ฌ๋Ÿฌ๋ถ„๋“ค์˜ ๋งŽ์€

๊ธฐ๊ณ ๋ฅผ ๋ฐ”๋ž๋‹ˆ๋‹ค.

www.kisa.or.kr

๏ฟฝ ํŽธ์ง‘์œ„์›ํšŒ

์œ„์›์žฅ :

์œ„ ์› :

์žฅ์„๊ถŒ ํ•œ์–‘ ๊ฒฝ ํ•™๋ถ€ ๊ต์ˆ˜

์‹ ๋ฏผ์ˆ˜ ํ•œ์–‘ ๊ฒฝ ํ•™๋ถ€ ๊ต์ˆ˜

์˜คํฌ๊ตญ ํ•œ์–‘ ์ปดํ“จํ„ฐ๊ณตํ•™๊ณผ ๊ต์ˆ˜

์œค์„ฑ์ด ๊ฒฝํฌ ์ •์น˜์™ธ๊ตํ•™๊ณผ ๊ต์ˆ˜

์ด๊ฒฝ์ „ ๊ฒฝํฌ ๊ฒฝ ํ•™๋ถ€ ๊ต์ˆ˜

์ด์ž„ ์ˆœ์ฒœํ–ฅ ์ปดํ“จํ„ฐํ•™๋ถ€ ๊ต์ˆ˜

์žฅ์„ฑํ˜ธ ๋ฐฐ์žฌ ์ •์น˜์™ธ๊ตํ•™๊ณผ ๊ต์ˆ˜

์ • ์‹ ์›๊ด‘ ์ปดํ“จํ„ฐ๊ณตํ•™๊ณผ ๊ต์ˆ˜

์ •์ค€ํ˜„ ๋‹จ๊ตญ ๋ฒ•๊ณผ ํ•™ ๊ต์ˆ˜

์กฐํ™”์ˆœ ์—ฐ์„ธ ์ •์น˜์™ธ๊ตํ•™๊ณผ ๊ต์ˆ˜

์ตœ์„ ๊ทœ ๋ช…์ง€ ๋””์ง€ํ„ธ๋ฏธ๋””์–ดํ•™๊ณผ ๊ต์ˆ˜

ํ™ฉ์žฅ์„  ์ค‘์•™ ๊ด‘๊ณ ํ™๋ณดํ•™๊ณผ ๊ต์ˆ˜

์ด์žฌ์ผ ํ•œ๊ตญ์ธํ„ฐ๋„ท์ง„ํฅ์› ์ธํ„ฐ๋„ท์œตํ•ฉ์ •์ฑ…๋‹จ์žฅ

๏ฟฝ ๋ฐœํ–‰์ธ : ์„œ์ข…๋ ฌํ•œ๊ตญ์ธํ„ฐ๋„ท์ง„ํฅ์›์›์žฅ

์„œ ์ข… ๋ ฌ

IIS ํŽธ์ง‘์œ„์›ํšŒ

์†กํŒŒ์‚ฌ00007

2010๋…„ 5์›” 26์ผ

2011๋…„ 11์›” 30์ผ

ํ•œ๊ตญ์ธํ„ฐ๋„ท์ง„ํฅ์›

138-803 ์„œ์šธ์‹œ ์†กํŒŒ๊ตฌ ์ค‘ ๋กœ 109 ๋™๋นŒ๋”ฉ

Tel: (02)405-4118, Fax: (02)405-5119

email: [email protected]

ํ˜ธ์ •์”จ์•คํ”ผ Tel: (02)2277-4718

๋ฐœ ํ–‰ ์ธ

ํŽธ ์ง‘ ์ธ

๋“ฑ ๋ก ๋ฒˆ ํ˜ธ

๋“ฑ ๋ก ๋…„ ์›” ์ผ

๋ฐœ ํ–‰ ์ผ

๋ฐœ ํ–‰ ์ฒ˜

์ œ ์ž‘

:

:

:

:

:

:

:

Internet and Information Security

Internet &Information

Security

Page 3: nternet I Security - BIGBOOK

Click ๊ธฐ๋ฐ˜์˜ ๊ธฐ๋ณธ MOFI ํ…Œ์ŠคํŠธ๋ฒ ๋“œ ๊ตฌ์ถ•

ํ”„๋กœ๊ทธ๋žจํ™” ๋ฐ ๊ฐ€์ƒํ™”๋ฅผ ์ง€์›ํ•˜๋Š” ์ปดํ“จํŒ…/๋„คํŠธ์›Œํ‚น

์ธํ”„๋ผ์ƒ์˜ ๋ฏธ๋ž˜์ง€ํ–ฅ์ ์ธ ์„œ๋น„์Šค ํ•ฉ์„ฑ ๋ฐฉ๋ฒ•๋“ค

๋น… ๋ฐ์ดํ„ฐ์™€ ๊ณต๊ณต ๋ฐ์ดํ„ฐ ํ™œ์šฉ

๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ ํญ์ฆํ˜„์ƒ๊ณผ ์ฝ˜ํ…์ธ  ์ค‘์‹ฌ ๋„คํŠธ์›Œํ‚น ๊ธฐ์ˆ 

ํ•œ๊ตญ์‚ฌํšŒ ๋ณ€ํ™”์™€ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท ์ •์ฑ…์— ํ•œ ํƒ์ƒ‰์  ์—ฐ๊ตฌ

์ •ํšŒ์ง„, ์ด์žฌ์šฉ, ๊น€๋ณ‘์ฒ 

๊น€์ข…์›, ํ•œ์ƒ์šฐ

์ด๋งŒ์žฌ

์ด ์„

๊น€์‚ฌํ˜, ์ตœ์ƒํ›ˆ

03

21

47

65

90

Internet and Information Security ์ œ2๊ถŒ ์ œ2ํ˜ธ(2011๋…„ 11์›”)

๋ชฉ ์ฐจ

๋ณธ QR์ฝ”๋“œ๋ฅผ ์ž…๋ ฅํ•˜์‹œ๋ฉด๋…ผ๋ฌธ ๋‹ค์šด๋กœ๋“œ ํŽ˜์ด์ง€๋กœ์ด๋™ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

Page 4: nternet I Security - BIGBOOK

Internet and Information Security ์ œ ๊ถŒ ์ œ ํ˜ธ( ๋…„ ์›”) pp. 03~20

Internet and Information Security 03

์ตœ๊ทผ ๋“ค์–ด ๊ตญ๋‚ด์™ธ์˜ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท์— ํ•œ ๊ด€์‹ฌ๊ณผ ์—ฐ๊ตฌ๊ฐ€ ํ™œ๋ฐœํžˆ ์ง„ํ–‰ ์ค‘์— ์žˆ๋‹ค. ๊ตญ๋‚ด์—์„œ๋„ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท ์—ฐ

๊ตฌ์˜ ํ•œ ๋ถ„์•ผ๋กœ์„œ ํšจ๊ณผ์ ์ธ ์ด๋™์„ฑ์„ ์ง€์›ํ•˜๋Š” ๋ฌด์„  ํ™˜๊ฒฝ ์œ„์ฃผ์˜ ๋„คํŠธ์›Œํฌ ํ™˜๊ฒฝ์œผ๋กœ์˜ ๋ณ€ํ™”์— ์ดˆ์ ์„ ๋งž์ถ˜ ๋ฏธ๋ž˜์ธํ„ฐ

๋„ท ์•„ํ‚คํ…์ฒ˜๋กœ MOFI๊ฐ€ ์ œ์•ˆ๋˜์—ˆ๋‹ค. MOFI๋Š” ํ˜ธ์ŠคํŠธ ID ๊ธฐ๋ฐ˜์˜ ํ†ต์‹ ์„ ์ œ๊ณตํ•˜๋ฉฐ ๋ผ์šฐํŒ… ํ™•์žฅ์„ฑ์ด ๋ณด์žฅ๋˜๊ณ  ์›ํ™œํ•œ

์ด๋™์„ฑ์ด ์ œ๊ณต๋˜๋Š” ๋ฐ์ดํ„ฐ ์ „๋‹ฌ ๊ตฌ์กฐ์ด๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” MOFI ๊ตฌ์กฐ ์—ฐ๊ตฌ์˜ ์ผ๋ถ€๋ถ„์œผ๋กœ ํ˜ธ์ŠคํŠธ ID ๊ธฐ๋ฐ˜ ํ†ต์‹ ์„ ์ง€

์›ํ•˜๋Š” ๊ธฐ๋ณธ MOFI ํ…Œ์ŠคํŠธ๋ฒ ๋“œ๋ฅผ Click์„ ์‚ฌ์šฉํ•˜์—ฌ ์ตœ์ดˆ๋กœ ๊ตฌ์ถ•ํ•˜๊ณ , ๊ธฐ์กด IPv6 ๋…ธ๋“œ์™€์˜ ํ†ต์‹ ์„ ์œ„ํ•œ MOFI proxy

๋ฅผ ์„ค๊ณ„ํ•˜ ์œผ๋ฉฐ ํ‘œ์ ์ธ ์ธํ„ฐ๋„ท ์„œ๋น„์Šค์ธ ping, www์˜ ์‹คํ—˜์„ ํ†ตํ•ด ํ˜ธ์ŠคํŠธ ID ๊ธฐ๋ฐ˜์˜ ํ†ต์‹  ๊ฐ€๋Šฅ์„ฑ์„ ๊ฒ€์ฆํ•˜

๋‹ค. ๋˜ํ•œ MOFI Access Router์˜ ์ฒ˜๋ฆฌ์— ๋”ฐ๋ฅธ ์„ฑ๋Šฅ ์˜ค๋ฒ„ํ—ค๋“œ ํ–ฅ์„ ํ™•์ธํ•˜๊ธฐ ์œ„ํ•ด Iperf๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ๋ฐ์ดํ„ฐ ์ „๋‹ฌ

์„ฑ๋Šฅ ์ธก์ •์„ ํ•˜ ๋‹ค. ์‹คํ—˜ ๊ฒฐ๊ณผ MOFI host ๋ฐ AR์—์„œ์˜ ์ฒ˜๋ฆฌ ๊ณผ์ •์„ ๊ฑฐ์น˜์ง€ ์•Š๋Š” ๊ฒฝ์šฐ๋ณด๋‹ค๋Š” ์•ฝ๊ฐ„ ์„ฑ๋Šฅ ๊ฐ์†Œ๊ฐ€ ์žˆ

์ง€๋งŒ, MOFI ์‹œ์Šคํ…œ์„ ์‚ฌ์šฉํ•˜๋Š” ๊ฒฝ์šฐ์˜ ๋‹ค์–‘ํ•œ ์žฅ์ ์ธ ํšจ์œจ์  ์ด๋™์„ฑ ์ง€์›, ํ˜ธ์ŠคํŠธ ๊ธฐ๋ฐ˜์˜ ํ†ต์‹  ๋ฐ ๋ผ์šฐํŒ… ํ…Œ์ด๋ธ” ํ™•

์žฅ์„ฑ ์ง€์› ๋“ฑ์— ๋น„ํ•ด ๋ฌด์‹œํ•  ์ˆ˜ ์žˆ๋Š” ์ •๋„์ž„์„ ๊ฒ€์ฆํ•˜ ๋‹ค. ํ…Œ์ŠคํŠธ๋ฒ ๋“œ์˜ MOFI ํ˜ธ์ŠคํŠธ๋ฅผ ๊ตฌ์ถ•ํ•จ์— ์žˆ์–ด ๊ฐ€์ƒ ๋จธ์‹ 

ํ”„๋กœ๊ทธ๋žจ์ธ VirtualBox๋ฅผ ์‚ฌ์šฉํ•˜ ๊ณ , MOFI ํ˜ธ์ŠคํŠธ์™€ AR์˜ ๊ตฌํ˜„์„ ์œ„ํ•ด Click Modular Router๋ฅผ ์‚ฌ์šฉํ•˜ ๋‹ค.

In recent years, interest and research in the area of Future Internet has been rapidly increasing.

In Korea, the MOFI (Mobile Oriented Future Internet) architecture has been proposed to support efficient

mobility management in the Future Internet wireless environments. The MOFI can also provide an HID-based

communication architecture and routing scalability. In this paper, we implemented the first basic MOFI testbed

using a Click Modular Router, designed an MOFI proxy for internetworking with legacy IPv6 nodes, and verified

the feasibility of HID-based communication through an experiment of providing a general service, such as PING

and WWW service. In addition, we tested the data delivery performance using the Iperf tool to check the

performance overhead of MOFI host and AR processing. The results show that while there is negligible

performance degradation in a MOFI network compared to an end-to-end IP network without AR processing,

the MOFI system offers numerous advantages in terms of routing table scalability, efficient location

management and host-based communication. We used VirtualBox as a virtual machine program to build a basic

MOFI host, and used Click modular router for the implementation of the MOFI host and AR.

์ฃผ์ œ์–ด: ๋ฏธ๋ž˜์ธํ„ฐ๋„ท, MOFI, ํด๋ฆญ ๋ชจ๋“ˆ๋Ÿฌ ๋ผ์šฐํ„ฐ, ๋ฌด์„  ๋ง ๊ตฌ์กฐ. ID-LOC ๋ถ„๋ฆฌ

Keywords: Future Internet, MOFI, Click Modular Router, mobile network architecture, ID-LOC separation

์ดˆ๋ก

Abstract

Click ๊ธฐ๋ฐ˜์˜ ๊ธฐ๋ณธ MOFI ํ…Œ์ŠคํŠธ๋ฒ ๋“œ ๊ตฌ์ถ•

์ •ํšŒ์ง„๏ฟฝ ์ด์žฌ์šฉ๏ฟฝ๏ฟฝ ๊น€๋ณ‘์ฒ ๏ฟฝ๏ฟฝ๏ฟฝ

Whoi-Jin Jung Jae-Yong Lee Byung-Chul Kim

This research was supported by the KCC (Korea Communications Commission), under the IT R&D program

supervised by the KCA (Korea Communications Agency) (KCA-2011-10913-05004).

๏ฟฝ๏ฟฝ๏ฟฝ ์ถฉ๋‚จ ํ•™๊ต ์ •๋ณดํ†ต์‹ ๊ณตํ•™๊ณผ ๋ฐ•์‚ฌ๊ณผ์ •

(Doctoral Student, Dept. of Information and Communications, Chungnam National University, [email protected])

๏ฟฝ๏ฟฝ๏ฟฝ ์ถฉ๋‚จ ํ•™๊ต ์ •๋ณดํ†ต์‹ ๊ณตํ•™๊ณผ ๊ต์ˆ˜

(Professor, Dept. of Information and Communications, Chungnam National University, [email protected])

๏ฟฝ๏ฟฝ๏ฟฝ ์ถฉ๋‚จ ํ•™๊ต ์ •๋ณดํ†ต์‹ ๊ณตํ•™๊ณผ ๊ต์ˆ˜

(Professor, Dept. of Information and Communications, Chungnam National University, [email protected])

Implementation of Basic MOFI Testbed using Click

Page 5: nternet I Security - BIGBOOK

INTRODUCTION

With the increasing demands for smart

phones and various types of mobile Internet

terminals, the efficient mobility management is

the most important key technology for

supporting emerging future services. For the

seamless handoff management, lots of works

have been suggested such as MIPv6 (Johnson

et al., 2004) and its variants. But, all these

schemes are based on the current Internet

address structure, so IP address is used as

identifier and locator information and it should

be reassigned whenever the subnet is

changed. They should use the home agent to

intercept the packets towards the mobile node

and tunnel them to the current location

registered at the home agent. However, these

schemes are not effective in the aspects of

mobility management because it suffers from

non-optimal path, mobile node burden on

signaling, and long handover latency.

Also, the routing scalability problems coming

from provider-independent edge network

address space, multi-homing, and traffic

engineering should be solved in near future.

The Routing Research Group (RRG) of IRTF

has actively proposed many interesting

Locator/Identifier Split or Core-Edge Separation

ideas as a solution for the above mentioned

problems. Some interesting schemes are LISP

(Farinacci et al., 2010), GLI-Split (Menth et

al., 2010), HIP (Atkinson, 2010; Moskowitz &

Nikander, 2006). According to these schemes,

the locator information can be obtained using

stable identifier information by the mobile

node or tunnel router, so application process

can maintain its network identifier irrespective

of the current location.

We note that the existing solutions focus

on a specific problem, for instance, mobility,

multi-homing, scalability or compatibility with

the current Internet. Accordingly, they are

likely to be a temporary solution rather than

optimal one. Therefore, more mobile-oriented

ID/LOC split scheme is highly required to

effectively address the existing and future

mobile environment. For this purpose, new

mobile-oriented ID/LOC split scheme and its

mobility management, named Mobile Oriented

Future Internet (MOFI), has been proposed in

Korea (Jung & Koh, 2011a). In the proposed

MOFI architecture, Host ID (HID)-based

communication and efficient mobility

management schemes are provided.

In this paper, we implement a basic MOFI

testbed using Click module (Kohler, 2000)

and verify the feasibility of HID-based

communication. Also, we suggest a MOFI

proxy for supporting legacy Internet nodes

to communicate with MOFI hosts. We test the

feasibility of HID-based communication using

the implemented functional blocks even when

two hosts use the same private IP address in the

different edge networks but with different HIDs,

respectively. We confirm the communication

feasibility using the ping command and web

browsing.

We can summarize our contribution in this

paper as follows;

์ œ ๊ถŒ ์ œ ํ˜ธ

04 ๋…„ ์›”

Page 6: nternet I Security - BIGBOOK

๏ฟฝWe implement MOFI host and Access

Router by using Click module. These

functional elements are essential for

providing MOFI basic function and can

be easily extended by using ease

programmability of Click module. This is

the first MOFI implementation according

to its specification (Jung & Koh, 2011a).

๏ฟฝWe verify the feasibility of HID-based

communication and related operational

procedure. This ID-LOC separation

scheme can solve lots of problem coming

from co-location of ID and LOC of current

IP address.

๏ฟฝWe suggest interworking scenario of

legacy Internet hosts with MOFI system

and verify its feasibility. This can help

incremental deployment of MOFI system.

The rest of this paper is organized as

follows. Section II describes the MOFI system

architecture. Section III describes the

implemented MOFI functional blocks using

Click-modules in detail. Section IV presents

the structure of MOFI proxy and its operation.

In section V, we represent the MOFI testbed

and its experiment results. Finally, Section VI

concludes this paper.

MOFI SYSTEM ARCHITECTURE

Lots of Future Internet architectures for

mobile environments have been suggested.

LIN6 (Teraoka et al., 2003) separates identifier

and locator in IPv6 address and the network

layer extracts the LIN6 ID from the LIN6

generalized ID and concatenates the network

prefix and LIN6 ID to create the LIN6 address

of the destination node. In LIN6, the location

of mobile host is kept track down by using

Mapping Agent (MA).

HIP is another well-known approach. HIP

(Moskowitz & Nikander, 2006) also separates

location from identity by an interposed host

identity protocol layer that operates between

network and transport layers. In HIP, the

dynamic binding between Host Identity (HI)

and IP address is achieved by sending Update

packet to the Rendezvous Server (RVS).

LISP (Farinacci et al., 2010) is a most popular

core-edge separation scheme and separates

addressing in edge networks (EID, End Host

Identifier) from addressing in the core network

(RLOC, Routing Locator). The most outstanding

works on the mobility management in the

LISP architecture are LISP-MIP (Farinacci et

al., 2010) and LISP-MN (Farinacci et al., 2009).

LISP-MIP scheme uses the MIP protocol as a

means to manage mobility, but it has the same

problem as MIP such as mobile node burden

on signaling, protocol complexity and

triangular routing. LISP-MN requires the

mobile node should have Ingress Tunnel

Router (ITR) and Egress Tunnel Router (ETR)

functionality to provide the shortest path for

data packets between LISP mobile nodes. So,

it also has the problem of unnecessary

mapping lookup, double encapsulation and

mobile nodes burden on complex processing.

The Mobile Oriented Future Internet (MOFI)

Implementation of Basic MOFI Testbed using Click

Internet and Information Security 05

Page 7: nternet I Security - BIGBOOK

is a new architecture of future Internet for

mobile environment, which is a part of research

supported by Korean government. The major

concept of the MOFI is the separation of HID

and network locator (LOC) for efficient data

delivery and mobility management. HID is

persistent and assigned by a domain (or an

ISP). IP address of edge router/gateway in

the network can be used as LOC. HID has a

hierarchical format to provide the scalability of

inter-domain mobility control, and its format is

shown in [Fig 1]. We assume that the HID

length is 128 bytes for compatibility with IPv6

legacy hosts. The prefix is used to distinguish

whether a destination host is legacy IP host or

MOFI host. The Domain Identifier is used to

identify a domain associated with the HID or

host, and MOFI uses a 4-byte Autonomous

System Number (ASN) as Domain ID. Host

Identifier is allocated by domainโ€™s administrator

to its hosts. The only requirement is that a

HID should be unique within a domain.

The entire MOFI system is shown in [Fig

2]. New functional elements for supporting

MOFI operation are MOFI host, Access Router

(AR) and LOC Management System (LMS).

The MOFI host has to implement HID-based

Communication Protocol (HCP) for end-to-

end communication between transport layer

and network delivery protocol as shown in

[Fig 3]. The HCP header contains Sender HID

(S-HID) and Receiver HID (R-HID) for the end-

to-end communication. The AR resolves the

LOC of destination HID by inquiring LBS, and

encapsulates data packets by attaching the LOC

into the outer header as shown in [Fig 4]. The

outer header contains Sender LOC (S-LOC) and

Receiver LOC (R-LOC), which represent the IP

addresses of AR for Sender and Receiver,

respectively. Lastly, the LBS keeps track of

mapping information between HID and LOC.

End-to-end communication between any two

end hosts happens based on HID, but routing

inside backbone network uses LOC information

obtained by inquiring LBS. The LBS system

can be implemented as a central database or

distributed in the core network.

Also, in the MOFI, the data delivery protocols

used in access and backbone networks could

be different in order to accommodate various

types of emerging wired or wireless networks

in the future. They are Backbone Delivery

Protocol (BDP) and Access Delivery Protocol

(ADP) respectively. When the destination AR

receives data packets from backbone network,

it detaches the outer header from the received

packets and transmits them to the destination

host based on their HID.

์ œ ๊ถŒ ์ œ ํ˜ธ

06 ๋…„ ์›”

[Fig 1] HID format of MOFI system.

Page 8: nternet I Security - BIGBOOK

Implementation of Basic MOFI Testbed using Click

Internet and Information Security 07

[Fig 2] Reference model of MOFI architecture.

[Fig 3] MOFI protocol stack for data delivery.

[Fig 4] Encapsulation of HCP data packet into IP packet at AR.

Page 9: nternet I Security - BIGBOOK

When a host is attached to an AR, its HID

and Local ID (LID) information is registered to

the AR using HID Binding Protocol (HBP)

(Jung & Koh, 2011b) for the delivery in the

access network as shown in [Fig 5]. LID is

used to identify a local locator (connection

point or interface) of a host in the access

network, which is needed for data packet

delivery between AR and a host. Examples

of LID include the IEEE 802 MAC address,

local IP address or any other link-layer

addresses of hosts for wired/wireless network

interfaces. After the HID Binding, the AR shall

perform the Location Binding (LB) operation

by sending a LOC Binding Request (LBR)

messages to the LBS server as shown in [Fig 6].

The LBR message includes HID and LOC of

the mobile host. The LBS updates its location

database by creating or updating the LOC DB

upon receiving the LBR message. The mobile

host can start sending (or receiving) data

packets to (or from) AR by using the ADP

์ œ ๊ถŒ ์ œ ํ˜ธ

08 ๋…„ ์›”

[Fig 5] HID and LID binding.

[Fig 6] LOC binding operation.

Page 10: nternet I Security - BIGBOOK

only after the hostโ€™s HID and LID binding is

registered to AR by the HBP. Various

heterogeneous access networks, can be

connected to the backbone and ADP, can be

different according to those access network

protocols. The detailed operations of mobility

management using Scalable Distributed

Mobility Control (SDMC) can be referred to

the MOFI document (Jung & Koh, 2011a).

MOFI FUNCTIONAL BLOCK

In this paper, we have implemented MOFI

host and AR function for deploying MOFI

testbed using โ€˜Clickโ€™functional blocks (Kohler,

2000). Click is a flexible software module and

can be easily extended to implement new

network functions. The implementation of MOFI

host and AR is sufficient for proving basic MOFI

concept of HID-based communication and

operational procedure. The LBS system and

related mobility control message processing

module will be implemented as a second step.

In this section, we explain Click-based MOFI

host and AR functional blocks in detail.

1. Click Modular Router

The Click module was made by MIT LCSโ€™s

Parallel and Distributed Operating System

Group, Mazu Networks, ICSI Center and UCLA.

It is a new software architecture for flexible

packet processing. Basically, Click is the

combination of various and new network

elements can easily be made by extending the

previous one. The Click consists of โ€˜elementsโ€™

and โ€˜connectionsโ€™between them as shown in

[Fig 7]. We can use previously developed

network functions such as packet classification,

queuing, scheduling, interfacing, and so on. The

MOFI packet generation based on the HCP

header and its checksum generation is

implemented as a new element by extending

basic Click Modular Router. Click can be executed

in the user-level and kernel-level. Kernel-level

Click has merits of high-speed processing, but it

needs the root privilege and it may harm the

system operation when malfunction happens.

So, only for feasibility confirmation, we

implement the MOFI Click module in the user-

level. We test the performance degradation due to

user-level operation of click modules in the

Implementation of Basic MOFI Testbed using Click

Internet and Information Security 09

[Fig 7] Configuration example of simple packet processor using Click.

Page 11: nternet I Security - BIGBOOK

MOFI host and AR, but the results show that the

performance degradation is negligible.

2. Implementation of MOFI Host

The MOFI protocol should support HID-

based end-to-end communication, so HCP

sublayer is inserted between layer 4 and layer

3 of the end host as shown in [Fig 3]. To

implement this protocol stack at the MOFI

host, we use a virtual machine โ€˜VirtualBoxโ€™

on Linux PC and build HCP processing block

using user-level Click module instead of kernel

socket modification. Packets from original

TCP layer are passed down to HCP processing

module via โ€˜tap0โ€™interface as shown in [Fig

8], and HCP header is inserted after querying

HID mapping table. โ€˜ tap0โ€™interface is the

์ œ ๊ถŒ ์ œ ํ˜ธ

10 ๋…„ ์›”

[Fig 9] Click design for MOFI host.

[Fig 8] MOFI host structure.

Page 12: nternet I Security - BIGBOOK

name of virtual interface for the VM and

โ€˜eth0โ€™is the name of real host interface.

Because the TCP uses the HID as endpoint

identifier, TCP header would not change even

if local locator change happens due to

mobility or tunneling at the AR in the

backbone.

[Fig 9 (a)] shows the Click design scheme

for HCP processing at the MOFI host when the

HCP processing module receives the packet

from the VM. The major functional blocks are

Classifier for packet classification based on

the destination address and HCPEncap for

inserting HCP header. IPEncap and EtherEncap

modules are used for IPv4 packet and frame

header insertion for ADP packets in the edge

network, respectively. [Fig 9 (b)] shows the

Click design when packets to VM are processed

at the MOFI host.

3. Implementation of AR

The main functions of AR are HID-LOC

binding and header translation for MOFI

backbone network based on the HID-LOC

mapping database. HID-LOC mapping entry is

registered in LBS via LOC Binding procedure

and this information is queried via LOC Query.

The header translation between private

address (for ADP) in the edge network and

public IP address of the AR in the core

network (for BDP) happens at the AR. All the

ARโ€™s required functions are also implemented

using Click module, and the detailed Click

design for AR processing is shown in [Fig 10].

Implementation of Basic MOFI Testbed using Click

Internet and Information Security 11

[Fig 10] Click design for MOFI AR.

Page 13: nternet I Security - BIGBOOK

INTERNET WORKING WITHLEGACY NETWORKS

We consider two scenarios for interworking

with legacy IPv6 hosts with the MOFI hosts.

The first one considers the communication

scenario when there are small number of

MOFI hosts and they want to communicate

with legacy IPv6 hosts (legacy IPv6 oceans

and MOFI island), and the other considers

the scenario when most of networks are MOFI

domain and small number of legacy IPv6

nodes communicate with the MOFI hosts

(MOFI oceans and legacy IPv6 island).

When most of networks are legacy IP

domain and some MOFI hosts want to

communicate with the legacy nodes as shown

in [Fig 11], the MOFI host first registers its

local locator (LID) to the MOFI proxy (โ‘ ). In

this scenario, the MOFI Proxy should act like

a Network Address Translator (NAT), so after

receiving HBP message, the MOFI proxy

assigns a new public IP address to MOFI host

(โ‘ก). This address is taken from Provider

Aggregatable (PA) addresses assigned to MOFI

domain. The mapping table between HID

(HIDM) and new IP address (IPM) is

maintained at the MOFI Proxy. After that, the

Proxy registers IPM to the DNS system by

sending DNS Update message (โ‘ข). When a

legacy host queries the destination URL of

MOFI host (โ‘ฃ), then it can obtain the newly

์ œ ๊ถŒ ์ œ ํ˜ธ

12 ๋…„ ์›”

[Fig 11] In case of legacy IPv6 oceans and MOFI island.

Page 14: nternet I Security - BIGBOOK

assigned public IP address of the destination

MOFI host corresponding to the URL (โ‘ค).

The IPv6 host sends data packets from its IP

address to the obtained IP address of MOFI

host (โ‘ฅ). Upon receiving a data packet, the

MOFI proxy gets HID of MOFI host by

looking up the mapping table, constructs the

HCP header and delivers it by ADP using

Local ID of the MOFI host stored at HID

cache. If the MOFI host sends the packet to

the legacy IPv6 host, the MOFI proxy deletes

the HCP header and constructs the IP header

by looking up mapping table to get the source

address, IPM, from HIDM (โ‘ฆ).

On the other hand, if a legacy IP host wants

to communicate with a MOFI host when most

networks are MOFI-based domains, it first

queries and obtains the destination IP address

equal to destination HID from DNS as shown

in [Fig 12] (โ‘ , โ‘ก). It is possible because HID

format is compatible with IPv6 address. Thus,

when the MOFI host registers its LID to AR

using HBP, the AR should registers HID of

the MOFI host to the DNS system. Upon

receiving data packets (โ‘ข), the MOFI proxy

queries LBS using destination HID and obtains

the LOC of AR at the receiving domain (โ‘ฃ,

โ‘ค). The MOFI Proxy first deletes the IP

header and adds the HCP header using

source/destination IP addresses in the received

IP header. It also appends the outer header

using its outgoing IP address as the source IP

address (IPx) and obtained AR_RLOC (IPAR) as

the destination IP address. After that, it tunnels

data packets to the AR at the receiving domain

(โ‘ฅ). The AR caches the binding information

Implementation of Basic MOFI Testbed using Click

Internet and Information Security 13

[Fig 12] In case of MOFI oceans and legacy IPv6 island.

Page 15: nternet I Security - BIGBOOK

between source IP address in the inner header

and that of outer header for later tunneling in

the opposite direction (โ‘ฆ). After that, the AR

decapsulates the outer header and delivers

the data packets to the receiving MOFI host by

ADP (โ‘ง).

MOFI TESTBED EXPERIMENTS

MOFI testbed consists of 5 Linux machines.

Two of them are implemented as ARs and the

other three as MOFI hosts. Access networks are

assumed to have private IP address block and

Korea Research Environment Open NETwork

(KREONET) is used as a backbone network.

To verify the feasibility of HID-based

communication, two end hosts in separate

access networks are assumed to have the same

private IP addresses but different HIDs. In [Fig

13], โ€˜Click-laptopโ€™and โ€˜Click-04โ€™are located

in different private access networks and have

the same IP address, 192.168.2.12. Current

Internet does not support communication

towards an end user within a private network,

and furthermore, communication between end

users located in different private networks is

not possible. However, in the MOFI, all the

communication between end users with

different HIDs is possible even if they are in

different private access networks behind their

NATs and have the same private IP addresses.

The LBS database is configured to have static

mapping table without considering dynamic

update within the hosts and ARs. The HID is

์ œ ๊ถŒ ์ œ ํ˜ธ

14 ๋…„ ์›”

[Fig 13] MOFI testbed topology.

Page 16: nternet I Security - BIGBOOK

128 bits long and it is set to 0x111โ€ฆ111,

0x222โ€ฆ222, and 0x333...333 for the three

hosts, respectively. We have implemented

hosts and ARs using โ€˜Clickโ€™functional blocks

and tested two services, ping and web

browsing, on the MOFI testbed as shown in

[Fig 14].

We first verify HID-based โ€˜pingโ€™command

from HID2 host to HID1 and HID3 hosts as

shown in [Fig 14]. Then, we verify the

feasibility of web browsing service using HID-

based communication after installing web

server on the HID3 host. The web browsing

test result is shown in [Fig 15].

Also, we compare TCP throughput between

MOFI_Enabled and MOFI_Disabled communi-

Implementation of Basic MOFI Testbed using Click

Internet and Information Security 15

[Fig 14] HID-based ping test result.

Page 17: nternet I Security - BIGBOOK

cation scenario using Iperf. TCP sender and

receiver are assumed to be HID2 and HID3

host in [Fig 13]. In our experiment, TCP packet

size is set to 1400 bytes and the throughput is

measured during 300 seconds. The TCP

throughput of MOFI_Enabled case shows a

minor degradation compared to the

MOFI_Disabled, about 3Mbps difference on

the average as shown in [Fig 16]. This is

mainly caused by the additional HCP header

์ œ ๊ถŒ ์ œ ํ˜ธ

16 ๋…„ ์›”

[Fig 15] Web browsing test.

[Fig 16] TCP throughput in both MOFI_Enabled and MOFI_Disabled.

Page 18: nternet I Security - BIGBOOK

and its manipulation overhead although it is

rather small. So, we can conclude that Click-

based MOFI host and AR in the user-level

implementation do not degrade the system

performance severely. On the contrary, the

MOFI system can provide many advantages in

the aspects of routing table scalability, efficient

location management and host-based

communication.

We also test the MOFI Proxy function, when

there are MOFI Ocean and legacy IPv4 Island,

using ping command between MOFI host and

legacy IPv4 host as shown in [Fig 17]. The

โ€˜pingโ€™command test results show that MOFI

Proxy Agent works well as shown in [Fig 18].

We implement the MOFI Proxy using Click

and add some functions for communication

between legacy IPv4 host and MOFI host as

shown in [Fig 19]. For accessing the MOFI

domain from IPv4 hosts, the MOFI Proxy has

to assign HIDs to legacy IPv4 hosts because of

different address format. So the MOFI proxy

Implementation of Basic MOFI Testbed using Click

Internet and Information Security 17

[Fig 17] Testbed for internetworking with legacy network.

[Fig 18] Ping test result between legacy network and MOFI network.

Page 19: nternet I Security - BIGBOOK

has the mapping table to manage the HID

and IP address of legacy IPv4 host as the

mapping entry. Incoming packets are captured

in FromDevice element and checked if they

are from MOFI domain or not. If they are from

MOFI domain, MOFI proxy looks up the IP

address of destination IPv4 host from HID in

the HCP header and inserts IPv4 header after

dropping HCP header, otherwise MOFI proxy

assigns appropriate HID corresponding to the

source host of incoming packet and updates its

mapping table. Next, it classifies incoming

packets based on the protocol because next

element i.e., HCP encapsulation/decapsulation

must need a protocol number. Finally it

forwards them to ToDevice element through

Queue after carrying out translation of network

header and HCP encapsulation.

From all these experiments, we could verify the

following MOFI functions. First, we confirmed

that HID-based communication can be supported

even if two hosts belong to different private

networks and have the same private address.

Second, we also verified the ARโ€™s function of

RLOC lookup, encapsulation/decapsulation and

forwarding. Finally, we confirmed that the

suggested interworking scenario is feasible with

legacy hosts.

์ œ ๊ถŒ ์ œ ํ˜ธ

18 ๋…„ ์›”

[Fig 19] Click-based MOFI proxy functional block diagram.

Page 20: nternet I Security - BIGBOOK

CONCLUSIONS

In this paper, we introduced MOFI system

and its characteristics. The MOFI system can

provide HID-based communication, efficient

mobility management and routing scalability

by separating identifier and locator. Then, we

presented the basic MOFI testbed and its

functional blocks. Using the deployed testbed,

we verified feasibility of HID-based communi-

cations. The basic MOFI testbed consists of

three MOFI hosts and two ARs. Each MOFI host

has a function of encapsulation/decapsulation of

HCP header and each AR has a function of

tunneling between ARs. In addition, we

introduced the MOFI proxy and its operational

procedure for interworking with legacy IP

network. All of the components are implemented

using Click, and Virtual Box is used for HCP

processing at the MOFI hosts.

We experimented with ping, www service as

general Internet service and verified the

feasibility of HID-based communication.

Finally, we tested data delivery performance of

MOFI system to examine overhead of the

MOFI host and ARโ€™s Click operation. The

results just show that the performance

degradation due to additional processing of

MOFI host and AR is negligible compared to

the merits of MOFI system.

The MOFI system has many distinctive

features: Host ID and network LOC, address-

free hosts, HID-based communication with

LOC-based routing, network-based built-in

mobility control, enhanced routing scalability

and separation of access and backbone

network protocols for data delivery. We

believe that MOFI system can be a promising

Future Internet architecture for supporting

HID-based communication and efficient

mobility management services.

โ–ถ REFERENCES

Atkinson, R. J. (2010). ILNP Concept of operations

(IETF draft-rja-ilnp-intro-08). Fremont, CA: Internet

Engineering Task Force.

Farinacci, D., Fuller, V., Lewis, D., & Meyer, D. (2009).

LISP mobility architecture (IETF draft-meyer-lisp-

mn-00). Fremont, CA: Internet Engineering Task

Force.

Farinacci, D., Fuller, V., Meyer, D., & Lewis, D. (2010).

Locator/ID separation protocol (IETF draft-ietf-

lisp-07). Fremont, CA: Internet Engineering Task

Force.

Iperf, http://iperf.sourceforge.net

IRTF Routing Research Group, http://www.irtf.org/rrg

Johnson, D., Perkins, C., & Arkko, J. (2004). Mobility

support in IPv6 (IETF RFC 3775). Fremont, CA:

Internet Engineering Task Force.

Jung, H. Y., & Koh, S. J. (2011a). HINLO: An ID/LOC

split scheme for Mobile Oriented Future Internet.

Proceedings of Future Network & Mobile Summit

2011 Conference.

Jung, H. Y., & Koh, S. J. (2011b). MOFI: Future Internet

architecture with address-free hosts for mobile

environments. Telecommunication Review, 21(2),

343-358.

Kohler, E. (2000). The click modular router. Unpublished

Implementation of Basic MOFI Testbed using Click

Internet and Information Security 19

Page 21: nternet I Security - BIGBOOK

doctoral dissertation, Massachusetts Institute of

Technology, Cambridge, MA.

Menth, M., Hartmann, M., & Klein, D. (2010). Global

locator, local locator, and identifier split (GLI-

Split). Wรผrzburg, Germany: University of

Wรผrzburg Institute of Computer Science.

Moskowitz, R., & Nikander, P. (2006). Host identity

protocol (HIP) architecture (IETF RFC 4423).

Fremont, CA: Internet Engineering Task Force.

Teraoka, F., Ishiyama, M., & Kunishi, M. (2003). LIN6:

A solution to multihoming and mobility in IPv6

(IETF draft-teraoka-multi6-lin6-00). Fremont, CA:

Internet Engineering Task Force.

VirtualBox, http://www.virtualbox.org

์ œ ๊ถŒ ์ œ ํ˜ธ

20 ๋…„ ์›”

Page 22: nternet I Security - BIGBOOK

Internet and Information Security ์ œ ๊ถŒ ์ œ ํ˜ธ( ๋…„ ์›”) pp. 21~46

Internet and Information Security 21

์‚ฌ์šฉ์ž๋“ค์˜ ๋‹ค์–‘ํ•œ ์š”๊ตฌ์— ์‘ํ•˜๋ฉด์„œ ์ƒˆ๋กœ์šด ํ˜•ํƒœ์˜ ํŠนํ™”๋œ ์„œ๋น„์Šค๋ฅผ ์ฐฝ์ถœํ•  ์ˆ˜ ์žˆ๋„๋ก ์šฉ๋Ÿ‰ ๋ฏธ๋””์–ด์˜

์ ์ ˆํ•œ ์‹œ๊ฐ„ ๋‚ด ์ „๋‹ฌ๊ณผ ๋™์ ์ธ ๋ฏธ๋””์–ด ์ค‘์‹ฌ์˜ ์„œ๋น„์Šค ํ•ฉ์„ฑ์ด ์ ์ง„์ ์œผ๋กœ ์—ฐ๋™๋˜๋Š” ์ถ”์„ธ์ด๋‹ค. ๋˜ํ•œ ์š”๊ตฌ๋œ ๋ฏธ๋””์–ด ์ค‘

์‹ฌ์ ์ธ ์„œ๋น„์Šค ํ•ฉ์„ฑ์— ๋งž๋„๋ก ์ฐจ๋ณ„ํ™”๋œ ํ”„๋กœ๊ทธ๋žจํ™” ๋ฐ ๊ฐ€์ƒํ™”๋ฅผ ์ง€์›ํ•˜๋Š” ์ปดํ“จํŒ…/๋„คํŠธ์›Œํ‚น ์ž์›์„ ๊ณต๊ธ‰ํ•  ์ˆ˜ ์žˆ๋Š”

๋ฏธ๋ž˜ ์ง€ํ–ฅ์ ์ธ ์ธํ”„๋ผ์— ํ•œ ๋…ผ์˜๋„ ํ™œ๋ฐœํ•˜๋‹ค. ๋”ฐ๋ผ์„œ ๋ณธ ์„œ๋ฒ ์ด ๋…ผ๋ฌธ์—์„œ๋Š” ํ”„๋กœ๊ทธ๋žจํ™” ๋ฐ ๊ฐ€์ƒํ™”๋ฅผ ์ง€์›ํ•˜๋Š” ์ž

์›๋“ค๋กœ ๊ตฌ์ถ•๋œ ์ธํ”„๋ผ ์œ„์—์„œ ๋ฏธ๋””์–ด ์ค‘์‹ฌ์˜ ์„œ๋น„์Šค ํ•ฉ์„ฑ ๊ธฐ๋ฐ˜์œผ๋กœ ๋ฏธ๋ž˜ ์ง€ํ–ฅ์ ์ธ ์„œ๋น„์Šค๋“ค์„ ๋งŒ๋“œ๋Š” ๋ฐฉ๋ฒ•๊ณผ ๊ทธ ๊ณผ

์ •์„ ์„ค๋ช…ํ•œ๋‹ค. ๊ตฌ์ฒด์ ์œผ๋กœ๋Š” ๋ฏธ๋””์–ด ์ค‘์‹ฌ์œผ๋กœ ์„œ๋น„์Šค๋ฅผ ํ•ฉ์„ฑํ•˜๋Š” ๋™๊ธฐ๋ฅผ ์„ค๋ช…ํ•œ ํ›„์—, ์š”๊ตฌ๋˜๋Š” ์„œ๋น„์Šค ํ•ฉ์„ฑ์„ ๋ช…

์‹œํ•˜๊ณ  ์•ฝ์ •ํ•˜๊ธฐ ์œ„ํ•œ ๋ชจ๋ธ๋ง๊ณผ ๊ณผ์ •์„ ๋ฌ˜์‚ฌํ•œ๋‹ค. ๋˜ํ•œ ์„œ๋น„์Šค๋ฅผ ํ•ฉ์„ฑํ•˜๋Š” ๊ณผ์ •์„ ์ ์‹œ์— ํšจ์œจ์„ฑ์„ ์œ ์ง€ํ•˜๋ฉด์„œ ์กฐ์ ˆ

ํ•˜๋Š” ์ ‘๊ทผ์ด ๋งค์šฐ ์ค‘์š”ํ•จ์„ ์†Œ๊ฐœํ•œ๋‹ค. ์ฆ‰, ์กฐ์ •์„ ์œ„ํ•œ ๊ฐœ์ฒด๋ฅผ ์ฑ„ํƒํ•ด์„œ ์ด๋ฅผ ํ†ตํ•ด์„œ ์š”๊ตฌ๋˜๋Š” ์„œ๋น„์Šค ํ•ฉ์„ฑ์„ ์œ„ํ•œ

๋ณต์žก ์ˆ˜์ค€๊ณผ ๋ณต์ˆ˜ ๊ฐœ์˜ ์„ ํƒ์‚ฌ์–‘๋“ค์„ ์ œ์–ดํ•ด์•ผ ํ•œ๋‹ค. ๋งˆ์ง€๋ง‰์œผ๋กœ ๊ฐ€๊นŒ์šด ๋ฏธ๋ž˜์— ์„œ๋น„์Šค ํ•ฉ์„ฑ์ด ๋ฐ”๋žŒ์งํ•˜๋„๋ก ์กฐ์ •ํ•˜

๊ธฐ ์œ„ํ•ด์„œ ์ œ์•ˆ๋˜๊ณ  ์žˆ๋Š” ๋ช‡ ๊ฐ€์ง€ ์กฐ์ • ๋ฐฉ๋ฒ•๋“ค์„ ์†Œ๊ฐœํ•˜๊ณ  ์ด๋“ค์— ํ•œ ๊ฐ„๋žตํ•œ ๋น„๊ต๋ฅผ ์ œ์‹œํ•œ๋‹ค.

The massive and timely delivery of media is gradually integrating itself with the dynamic

composition of media-centric services, so that new types of customized services can easily be created to match

the diverse demands of end users. Also, for the future infrastructure, differentiated support equipped with

programmable/virtualized computing/networking resources has become one of the key requirements. In this

survey paper, we first present a way of understanding the creation of futuristic services based on media-

centric service composition over programmable/virtualized resources. More specifically, after explaining the

motivations behind media-centric service composition, we describe the modeling and process to specify and

engage the desired media-centric service composition. We then describe how important it is to control the

process behind the service composition in a timely and efficient manner. That is, by adopting an entity for

mediation, we should control the complexity level, while choosing among multiple options for the desired service

composition. Finally, we end by discussing several notable approaches that could coordinate the desired service

composition in the future, and provide some brief comparisons among them.

์ฃผ์ œ์–ด: ์„œ๋น„์Šค ์ง€ํ–ฅ ๊ตฌ์กฐ, ๋ฏธ๋””์–ด ์ค‘์‹ฌ ์„œ๋น„์Šค ํ•ฉ์„ฑ, ํ”„๋กœ๊ทธ๋žจํ™” ๋ฐ ๊ฐ€์ƒํ™”๋œ ์ž์›, ์„œ๋น„์Šค ์˜ค๋ฒ„๋ ˆ์ด ๋„คํŠธ์›Œํฌ, ์„œ๋น„์Šค ํ•ฉ์„ฑ ํ”„๋กœ์„ธ์Šค์˜ ์ œ์–ด

Keywords: service oriented architecture, media-centric service composition, programmable andvirtualized resource, service overlay networks, control of service composition process

์ดˆ๋ก

Abstract

ํ”„๋กœ๊ทธ๋žจํ™” ๋ฐ ๊ฐ€์ƒํ™”๋ฅผ ์ง€์›ํ•˜๋Š” ์ปดํ“จํŒ…/๋„คํŠธ์›Œํ‚น ์ธํ”„๋ผ์ƒ์˜

๋ฏธ๋ž˜์ง€ํ–ฅ์ ์ธ ์„œ๋น„์Šค ํ•ฉ์„ฑ ๋ฐฉ๋ฒ•๋“ค

๊น€์ข…์›๏ฟฝ ํ•œ์ƒ์šฐ๏ฟฝ๏ฟฝ

JongWon Kim Sang Woo Han

This research was supported by the KCC (Korea Communications Commission), under the IT R&D program

supervised by the KCA (Korea Communications Agency) (KCA-2011-09913-05006).

๏ฟฝ๏ฟฝ๏ฟฝ ๊ด‘์ฃผ๊ณผํ•™๊ธฐ์ˆ ์› ์ •๋ณดํ†ต์‹ ๊ณตํ•™๋ถ€ ๊ต์ˆ˜

(Professor, School of Information and Communications, Gwangju Institute of Science and Technology,

[email protected])

๏ฟฝ๏ฟฝ๏ฟฝ ๊ด‘์ฃผ๊ณผํ•™๊ธฐ์ˆ ์› ์ •๋ณด๊ธฐ์ˆ ์‚ฌ์—…๋‹จ ๋ฐ•์‚ฌํ›„์—ฐ๊ตฌ์›

(Postdoctoral Researcher, SCENT Center, Gwangju Institute of Science and Technology, [email protected])

Futuristic Service Composition Approaches over

a Programmable/Virtualized Computing/Networking Infrastructure

Page 23: nternet I Security - BIGBOOK

INTRODUCTION

Recently, quite a few service-oriented

architectures, including service overlay

networks (SONs), have emerged to facilitate

the massive and timely distribution of

continuous media, e.g., audio and video.

Continuous media delivery has been gradually

integrating itself with the dynamic composition

of media-centric1) services so that new types of

customized services could be easily created to

meet the diverse demand of end users

(Nahrstedt & Balke, 2004). For futuristic

infrastructure, the effective and differentiated

support equipped with programmable/

virtualized computing/networking resources

has become one of key requirements. In this

survey paper, we attempt to review several

emerging service composition approaches that

attempt to realize new types of media-centric

services over the emerging programmable/

virtualized computing/networking infrastructure.

In [Fig. 1], we depict the evolution of service

composition methodologies from the viewpoint

of dynamically coordinating the interaction

between services and resources (e.g., processor,

memory, bandwidth, storage) (Kim et al.,

2011). [Fig. 1(a)] shows the traditional

methodology where each monolithic service is

tightly integrated and consequently composed.

This methodology, which has once dominated

in the Internet, is no longer suitable because it

cannot accommodate increasingly diversified

requirements of end users. In addition, since

the monolithic services randomly share the

common infrastructure of networking-

dedicated resources for their own data

delivery, it is quite difficult to provide a certain

level of quality of service (QoS). [Fig. 1(b)]

presents the concept of SON-based service

composition, where the SON is employed as

an intermediate layer to facilitate the flexible

creation of services and the resource

provisioning for QoS. Composing basic-level

components for services in such a manner

allows more flexibility and reusability in

building media-centric services. However,

balancing the quality among multiple instances

of composed services remains unresolved

because allocated resources are still confined

to the networking resources (e.g., for network

bandwidth) and usually logically partitioned.

[Fig. 1(c)] depicts a futuristic direct-composition

methodology for media-centric service

composition. We assume that in future

virtualization techniques will evolve to the

level that could enable fully-isolated slices of

programmable resources. For the desired

service composition, this allows the sufficient

dedication of selected amount of resources

to each component service. If we can develop

a scalable and reliable mechanism for

coordinating (with or without an additional

layer) the composed service and virtualized/

์ œ ๊ถŒ ์ œ ํ˜ธ

22 ๋…„ ์›”

1) With the term โ€˜media-centric service compositionโ€™, we intend to refer an extended category of multimedia service composition that is largelyinvolved with multimedia.

Page 24: nternet I Security - BIGBOOK

programmable resources, it offers an ideal

solution for the future. However, as of now,

this kind of methodology is still in the

beginning stage to be conceptualized.

Thus, in this survey paper, in line with the

evolution of service composition methodologies,

we examine the interaction between media-

centric service composition and underlying

programmable/v i r tua l ized comput ing/

networking resources with the following

coverage:

๏ฟฝUnderstanding the creation of futuristic

services based on service composition

over programmable/virtualized resources.

๏ฟฝCoordinating how to timely and efficiently

control the process behind the service

composition.

๏ฟฝDiscussing several notable approaches

that attempt to coordinate the desired

service composition.

WHAT IS MEDIA-CENTRIC SERVICECOMPOSITION AND HOW TOACHIEVE IT?

1. Media-centric Service Composition

In the paradigm of service-oriented

architecture (SOA) (Huhns & Singh, 2005;

Zeng et al., 2004), complex tasks are first

decomposed into smaller independent entities

that support inter-operability. That is, web

services are commonly created by following

the popular realization based on SOA. Since

the desired flexible service composition could

then be performed in a variety of ways, this

paradigm has made a broad impact to the

multimedia community. That is, we see

Futuristic Service Composition Approaches over a Programmable/Virtualized Computing/Networking Infrastructure

Internet and Information Security 23

[Fig. 1] Evolution of service composition methodologies: (a) the traditional, (b) the SON-based, (c) the direct-composition one.

Page 25: nternet I Security - BIGBOOK

migrations from monolithic multimedia

applications to flexible component-based

ones. This concept also helps build large-scale

multimedia applications by composing diverse

media-centric services on demand. However,

due to the resource-savvy characteristics(in

terms of bandwidth and delay/delay jitter)

of multimedia applications, the service

composition methodologies for web service

composition are not directly applicable.

Note that several characteristics of web service

composition and multimedia service

composition are comprehensively compared in

(Nahrstedt & Balke, 2005). Also a taxonomy of

multimedia service composition is given in

(Nahrstedt & Balke, 2004), which provides a

classification of service composition to support

complex multimedia workflows.

By combining the SOA concept and the

sophisticated handling/processing of media

contents, with media-centric service composition,2)

we can bring the benefit of reusing existing

service realizations and expanding them. We

can also provide an attractive way for dynamic

production and customized delivery of media

contents to end users. We expect that the

emerging complex tasks in the multimedia

domain will demand a strong support of service

composition methodology so as to build media-

centric systems in a scalable, easy-programmable

and flexible manner. Generally speaking, media-

centric service composition is a process where

multiple media-centric services (e.g., media

retrieval, transcoding, display services) are

connected via functional and data dependencies

to create a new composite service (e.g., a video-

on-demand service) over heterogeneous and

distributed computing/networking infrastructures.

To explain the concept of media-centric

service composition, we use an example

illustration as shown in [Fig. 2] (Gu &

Nahrstedt, 2006; Han et al., 2009). It provides a

service composition scenario for distributed

video editing and streaming in a futuristic

personalized broadcasting system, which

supports user-friendly interfaces for haptic-

interaction, 3D visual display and surrounding

sounds, and customized video editing. In this

example system, both live and on-demand

content streaming services feed multimedia

data continuously. According to the demand of

end users, as described by the provided service

dependency graph, a video composition

service mixes these two types of media streams

into an integrated media flow. This video

composition is partially assisted by a caching

service that provides speedy duplication of

media contents with local storage. The

integrated media flow is then distributed to

multiple destination nodes via a multicast

service to enable multi-destination delivery.

Two kinds of display services, with different

capabilities in processing power, screen

resolution, and network bandwidth, are finally

์ œ ๊ถŒ ์ œ ํ˜ธ

24 ๋…„ ์›”

2) However, in this paper, except increased demands for resources to cope with the massive and continuous multimedia contents, the distinctionbetween ordinary (e.g., web-based) and media-centric service composition is not clearly visible.

Page 26: nternet I Security - BIGBOOK

adopted to mimic a heterogeneous device

environment. The networked display service

can receive multiple media streams and

present the media contents on an ultra-high-

definition tiled display. Another display

service, which cannot receive and/or process

the same media streams due to lack of

computing/networking resources, relies on a

transcoding service for stream conversion.

2. Modeling of Media-centric ServiceComposition and its QualityAssessment

By taking the media-centric service

composition in [Fig. 2] as an example, we can

model the targeted service composition as

assemblies of component services with a

service dependency graph (Kim et al., 2010).

In this modeling of media-centric service

composition, each component service

conducts some kind of atomic function(s) to

process continuous media streams. By utilizing

the provisioned computing/networking

resources (such as computation power,

network bandwidth, and storage capacity),

each component service is executed by

running implemented service code(s) or by

utilizing provided software tool(s). Each

component service has respective input and

output interfaces, specified by data format

and QoS parameters and matched to allow

the stitching of services. To maintain its

operation, each component service should

consume required amount of computing/

networking resources, which eventually costs

us corresponding amount of payment. Thus, by

stitching as specified in the service dependency

Futuristic Service Composition Approaches over a Programmable/Virtualized Computing/Networking Infrastructure

Internet and Information Security 25

[Fig. 2] A conceptual diagram of media-centric service composition.

Page 27: nternet I Security - BIGBOOK

graph, the composited service would fulfill

the desired requirements on QoS performance

(e.g., processing delay, continuous playout,

etc.).

Media-centric service composition typically

requires varying level of resource provisioning

from available pool of resources. By securing

and consuming sufficient amount of resources,

the service composition can successfully fulfill

given QoS performance requirements by the

users. However, if we fail to secure sufficient

amount of resources or the underlying

environment gets worse unexpectedly, we

may fall short of targeted performance. For

example, if network bandwidth gets suddenly

limited, an interactive media delivery service

might choose to send media streams at

reduced bit rates (if it is allowed to do so) or

to stop its service. For this kind of decision,

we need a way (i.e., criteria) to quantitatively

evaluate the quality of service composition. To

assess the quality of service composition,

following metrics, proposed by Jaeger et al.

(2004) and Kalasapur et al. (2006), are

commonly utilized: execution time, being

equal to the sum of the execution time of

component services involved (in the case of

sequential composition) or lesser than the

sum (in the case of parallel composition);

computing and networking costs, denoting

the respective amounts of consumed resources;

and composition sustainability, presenting the

availability of alternative service composition

when one or more component services fail.

3. Service Composition Process

According to Huhns & Singh (2005), a

service composition process is defined as a

sequence of interdependent actions, where

inputs and outputs are defined, to be executed

in pursuing the required service composition.

In order to deal with timely and continuous

delivery of large-volume media streams

over heterogeneous computing/networking

infrastructure, in this survey paper, we explain

the media-centric service composition process

as illustrated in [Fig. 3]. When provided with

the targeted service composition model, this

service composition process begins under the

jurisdiction of user (i.e., experimenter). Here

we assume that the service composition

modeling is conducted beforehand (i.e.,

modeling phase is separately executed). Then

the service composition process typically

undergoes two phases: Provisioning phase to

secure resources, identify media contents, and

discover and arrange component services, and

execution phase to carry out the desired

service composition step by step.

Initially, to prepare the desired service

composition, we interpret the provided

description mainly modeled as the service

dependency graph. That is, we utilize the

provided description to interpret all involved

services/contents and resources, and the

data/control dependency for service

composition. In the provided description for

each component service, we specify the

service name to represent its primary

์ œ ๊ถŒ ์ œ ํ˜ธ

26 ๋…„ ์›”

Page 28: nternet I Security - BIGBOOK

function(s), and the resource requirements

for service execution (i.e., type and amount of

required resources). To enable the stitching

and control (i.e., service composability), we

also describe three kinds of interfaces:

stitching points connecting with other services

and carrying experiment data, monitoring

points measuring predefined performance

indexes, and tuning points configuring and

fine-tuning service functions. Also, the content

description includes the name and encoding

format of contents, initial content quality, and

the addresses of content containers. The

provided service dependency graph then

represents the control and data dependencies

between component services (Nahrstedt &

Balke, 2005). Note that, as shown in [Fig. 2],

the component services, represented as

vertices, are stitched together via service links,

represented as directional edges, and the

resulting service composition explains the

desired flows of control/data packets.

First, in the provisioning phase of service

composition process, each experimenter is

authorized to legally use the resource pool

with the creation of slice. With the secured

slice authority, the experimenter selects the

useful nodes, by consulting the resource

description portion. The experimenter also

designs a network topology to connect them

Futuristic Service Composition Approaches over a Programmable/Virtualized Computing/Networking Infrastructure

Internet and Information Security 27

[Fig. 3] An illustration to explain the process for media-centric service composition.

Page 29: nternet I Security - BIGBOOK

together. Based on the designed network

topology, he then builds a network-stitched

pool of selected resources by establishing

physical network paths with the authorized

networking resources (e.g., programmable

network switches) via layer-3 IP or layer-2

VLAN (Virtual Local Area Network) connections.

Thus, the experimenter can now access this

network-stitched pool of resources via the

created slice. To sort out the network-stitched

pool of authorized resources, we classify the

resource pool with computing/networking

capability and store the classified information

about resources in a resource inventory.

Besides, all contents and services are typically

stored in centralized or decentralized

repositories.

Next, in the execution phase of service

composition process, we conduct the service-

composition experiment(s) by using the

authority of created slice. By following the

given description for targeted service

composition, we go through a selected

sequential set (i.e., ordering) of following

actions, i.e., service matchmaking, service

placement, and service stitching, service

monitoring, and service tuning. Note that the

selected sequential set becomes valid in

realizing the desired service composition, if

the resulting process can satisfy the required

quality of service composition.

๏ฟฝService matchmaking finds candidate

services to carry out the atomic functions

described in the service dependency graph.

It then looks for semantically compatible

pairs of services out of discovered

candidate services. Semantic compatibility

is established when the interface of a

service can be matched by another service.

It also looks for appropriate candidate

resources harmonized with the resource

requirements of all discovered services.

๏ฟฝBased on the service matchmaking result,

service placement selects the physical

resources from the network-stitched pool

of resources to run the desired component

services. It then creates service instances

on the chosen set of resources. At this

stage, the service instances are ready to

run individually without interaction with

the other service instances.

๏ฟฝBased on the service dependency graph,

service stitching actually binds the stitching

points of all service instances to ones of

their neighboring service instances. For

this, both service instances to be stitched

should know the addresses of their

counter service instances and establish

direct connections between them.

๏ฟฝFinally, with service monitoring, we monitor

the performance variations of running

service instances, affected by resource

availability. We may run monitoring

service(s) to periodically gather the selected

subset of performance metrics related with

service composition. Alternatively, we may

leverage with constantly operating I&M

(Instrumentation and Measurement) services

to measure environment-wide status about

computing/networking resources. The

์ œ ๊ถŒ ์ œ ํ˜ธ

28 ๋…„ ์›”

Page 30: nternet I Security - BIGBOOK

monitoring feedback is possibly utilized to

understand the current status of service

composition and take appropriate actions to

remedy problematic symptoms.

๏ฟฝFor sustainable service composition, by

service tuning, we can remove the

performance bottlenecks of service

composition. We may perform the overall

tuning of all service instances or the

interdependent tuning of selected service

instances.

4. Challenges for Successful ServiceComposition

To satisfy the required quality of media-centric

service composition in a large scale, the system-

wide support should be arranged properly. It

usually begins with modeling the targeted

service composition through appropriate

component services to handle given media-

based contents, supported by matching types

and amount of resources. Then, to fulfill the

composition requirements, we have to carry

out a selected service composition process,

explained earlier in Section II.3, which is

appropriate for targeted service composition

in successfully handling the challenges for

quality and other requirements (e.g., involved

costs). In other words, to make the desired

service composition successful, we have

to sequentially carry out the discovery

of contents/services/resources, and the

matchmaking, placement, and stitching

of services. All these actions for service

composition process actually impose us lots

of difficulties. If we take the discovery actions

as an example, we need a scalable scheme to

collect all the necessary information for each

type (i.e., contents, services, and resources).

We also need an inventory to store the

information of all available services and process

queries about requested services. Typically,

several distributed nodes, connected in a

network, can act as repositories and, depending

on the number of nodes involved, the

inventory itself can be either decentralized or

distributed. Other essential operations such as

naming resolution and proxy operation can be

deployed on dedicated (and possibly

distributed) nodes. Due to the diverse nature of

supporting resources in terms of its availability,

its networking capability, and its computing

capability, it is quite challenging to arrange an

appropriate environment to successfully carry

out the desired action (i.e., discovery) for the

targeted media-centric service composition.

If we state the above challenges more

formally, in order to create a large-scale

distributed media-centric application, the

underlying infrastructure (i.e., systems and

networks providing the computing/networking

resources) must be well provisioned so that it

can strongly support the overall service

composition process regardless of multiple

heterogeneities. Challenges to enable large-

scale media-centric service composition are

listed in Nahrstedt & Balke (2005) for

infrastructure and semantic data aspects,

respectively. By refining them for the futuristic

Futuristic Service Composition Approaches over a Programmable/Virtualized Computing/Networking Infrastructure

Internet and Information Security 29

Page 31: nternet I Security - BIGBOOK

infrastructure, we can summarize them as

below.

๏ฟฝChallenges in creating semantic meta-data

for service composition - understanding

taxonomies of media-centric service

composition, preparing semantic ontology

language to describe media-centric service

composition, and modeling the service

composition and creating automated

service dependency graphs.

๏ฟฝChallenges in the networking infrastructure

- preparing programmable/virtualized

networking resources for flexible QoS

support, and devising QoS-aware networking

schemes for service composition.

๏ฟฝChallenges in the computing (system)

infrastructure - handling the heterogeneous

networked devices with media-centric

operating system, and leveraging the

emerging virtualized cloud computing

resources.

๏ฟฝChallenges in controlling the service

composition process - enabling timely and

resource-aware control of service composition

process, especially paying attention to service

discovery and inventory, service selection

(i.e., matchmaking), and service execution

(i.e., placement and stitching).

The above listed challenges cover the whole

fused process of service composition, largely

grouped into three kinds of challenges for

semantic-related service composition modeling,

provisioning for service composition process

(i.e., mostly tied with resource provisioning/

management), and the control of service

composition process. Also, if we review the

above three groups of challenges from the

perspective of key players such as end users,

infrastructure (for computing and networking)

providers, and service providers, different

associations among the key players and

challenge groups are commonly observed.

Typically, end users and service providers are in

charge of semantic-related service composition

modeling and the control of service composition

process. As expected, infrastructure providers

are responsible in efficiently provisioning for

service composition process (i.e., mostly tied

with resource provisioning/management).

Moreover, among the key players, interactive

coordination of managing challenges should

be arranged. The issue of โ€œwho will play the

leading role in this interactive coordinationโ€ is

important, since each choice may impose a

distinctive set of requirements and is related

to the efficiency of the whole solution, leading

to the different scalability limit for the desired

large-scale deployment.

ENABLING TIMELY ANDRESOURCE-AWARE CONTROL OFSERVICE COMPOSITION PROCESS

From now, we focus only on one kind of

challenges, how to enable the timely and

resource-aware control of service composition

process.

์ œ ๊ถŒ ์ œ ํ˜ธ

30 ๋…„ ์›”

Page 32: nternet I Security - BIGBOOK

1. Levels of Service Composition andOptions for Service CompositionProcess

To fulfill the service composition requirements,

as explained earlier in Section II.3, we have to

choose a selected process for the desired

service composition and carry it out. The

choice on the options for service composition

process needs more in-depth understanding

about different complexity levels of service

composition, which can be divided into basic-

level and advanced-level as follows.

First, basic-level service composition, focusing

on pre-established service composition, only

supports basic functions to interpret the given

description about required service composition.

In this level, the utilized service dependency

graph is typically static (i.e., remains fixed

throughout the service composition). Also, it

can be manually drawn to describe the required

service composition. For example, most existing

composition for web service belongs to this

basic-level service composition, because it

could not accommodate the temporal variation

of computing/networking services, affected by

the dynamic variations from the available

resources. That is, whenever the variations are

not negligible, the resulting service composition

may fail to satisfy the desired quality of service

composition.

However, most practical media-centric

service composition is closer to advanced-

level service composition, since it is not

possible to satisfy the required quality without

employing the adaptation concept (as widely

adopted in network-adaptive media-based

applications). To make the performed service

composition effective (i.e., useful), we should

consider advanced-level service composition

where the resulting service dependency graph

is not static any longer. We need to efficiently

map component (i.e., composable) services on

appropriate selection(s) from available

network-stitched pool of resources, as

depicted in [Fig. 4].

To automatically (or semi-automatically) do

this, by proactively adopting service

monitoring and tuning actions as part of

service composition, we should be able to

adaptively change the above mappings and

fine-tune individual services. That is, through

the monitoring feedback, specially-designed

coordination can be conducted to the service

composition so that we can take appropriate

actions to resolve problematic situations. As

illustrated in [Fig. 4], we want to support a live

video stream over a lossy network connection

so that the video stream keeps pace with

continuous playback speed. In this case, we

can imagine that a specialized coordination

service, designed for quality control, checks

any vulnerability and performs adaptations

whenever needed. As an example, we can

switch to the FEC-encoded video producer

service whenever the underlying network

connection becomes lossy over some limit.

Like this, by incorporating all these different

levels of conducting the service composition,

we can think of multiple different options for

Futuristic Service Composition Approaches over a Programmable/Virtualized Computing/Networking Infrastructure

Internet and Information Security 31

Page 33: nternet I Security - BIGBOOK

executing the service composition process.

The easiest and straightforward option would

be adding actions for service monitoring and

service tuning into the service composition

process, as depicted in [Fig. 5(a)]. This option

is well tied with the network adaptation for

service composition driven mainly by the end

nodes, partially supported by the underlying

computing/networking infrastructure. Note

that the coordination is also included so that

the resulting service composition becomes

advanced level. Like this, this first option for

service composition process is equal to

converting the service composition from basic

to advanced levels. Next, as shown in [Fig.

5(b)], as an adaptive option for service

์ œ ๊ถŒ ์ œ ํ˜ธ

32 ๋…„ ์›”

[Fig. 4] Diverse interactions w.r.t. resource provisioning to support advanced-level service composition.

Page 34: nternet I Security - BIGBOOK

composition process with pre-arranged service

migration, we may turn on the switching of

instantiated services from one resource to

another. That is, to make up for several

limitations of the resource(s) being used, we

choose to use another pre-arranged (i.e.,

matched for required service, which is placed

in advance) resource. With this option, the

service composition process is repeating the

execution of service stitching, monitoring, and

tuning (i.e., pre-arranged service migration).

Also, in a worse scenario where all pre-

arranged (i.e., provisioned) resources fall short

of required performance. As shown in [Fig.

5(c)] and [Fig. 5(d)], we may restart the service

composition process again from service

matchmaking and further from service

discovery, respectively. That is, into the

service composition process, we now add the

restart options. By restarting from the required

service matchmaking, we can enable resource-

awareness matchmaking. An appropriate

choice would be made to decide which

specific type of services is utilized (i.e., service

matchmaking) and placed on the matchmade

resources. Or we may restart from new

Futuristic Service Composition Approaches over a Programmable/Virtualized Computing/Networking Infrastructure

Internet and Information Security 33

[Fig. 5] Multiple options of executing service composition process.

(a) Adding actions for monitoring and tuning services, (b) switching the instances of services among pre-arranged resources (i.e., service migration),

(c) modifying the service dependency graph by replacing with alternative service(s), (d) modifying the service dependency graph by replacing with new candidate service(s).

Page 35: nternet I Security - BIGBOOK

discovery for candidate service(s) and

subsequent resource-aware matchmaking.

2. Mediator-based Control of ServiceComposition Process

To manage an efficient mapping between

component services and available resources, we

should make the above service composition

process more effective, i.e., by improving the

control of service composition process. Having

more knowledge about the relationship

between the amount of resources and the

quality of service composition is largely called

as resource-aware. The most sophisticated form

of resource awareness can be thought of having

either experimental or theoretical (e.g., via

modeling) relationship. To do this, as illustrated

in [Fig. 5(c)], according to the service

dependency graph, we need to match (i.e.,

service matchmaking) and place (i.e., service

placement) services onto physical resources

while meeting the QoE (Quality of Experience)

requirements (Poladian et al., 2004). We should

combine a selected set of candidate resources

that can maximize the performance indexes of

service composition, as proposed in Huang et

al. (2010). Alternatively, we may conduct the

service matchmaking and placement in a cost-

efficient manner, in order to minimize the

waste of utilized resources. Under these goals,

we should carefully monitor the resource

availability of underlying infrastructure. Note

that in some cases the appropriate application

of I&M service(s) helps us to measure the

system-wide status of resources.

Also, it is very important to achieve the timely

(i.e., speedy) control of service composition

process by properly understanding the service

dependency of requested service composition.

To discuss this speedy service composition,

we introduce a term, timescale of adaptation,

i.e., the time taken to perform the adaptation

(i.e., monitoring and tuning) cycle of service

composition. Depending on the types of

services, each control for service composition

has its own timescale, which means that each

adaptation cycle should be finished within

certain time limit. In fact, the associated

timescale depends on the relationship among

utilized services. For example, when closely-

placed services are stitched together, it usually

has shorter timescale.

As the targeted service composition gets

complicated, we should increase the level of

service composition and deploy more complex

options for service composition process. In

doing so, we need an entity that can help us

to carry out the necessary coordination in

controlling the service composition process.

By enabling mediator(s) as a key control

entity, we propose to perform the timely and

resource-aware control of service composition

process, as depicted in [Fig. 6].

The proposed mediator, either centralized or

distributed, is located in-between the user,

the service composition tools (e.g., OMX (Han

& Kim, 2010), OpenFlow (McKeown et al.,

2008), Omni (Elliott & Falk, 2009), and the

resource aggregate (RA) manager). Note that

์ œ ๊ถŒ ์ œ ํ˜ธ

34 ๋…„ ์›”

Page 36: nternet I Security - BIGBOOK

RA is defined as an aggregation of physical

resources under an administrative domain. By

talking with the RA manager, it tries to cover

the resource-aware control of service

composition process. Also, by understanding

(and monitoring) all involved timescales, it

also attempts to handle the timely control of

service composition process.

FUTURISTIC SERVICE COMPOSITIONAPPROACHES

In this section, we present several notable

examples on futuristic service composition

design. We expect that media-centric services

will become increasingly interlinked with the

physical environments of individuals,

communities, and business entities in the

future. New ways of service creation and

consumption will emerge, aiming to cover

different application needs and preserve the

revenue generation of various stakeholders. It

is difficult to realize such a vision with today's

Internet due to its architectural limitations.

For Future Internet, paving the way for the

futuristic service realization demands more

drastic changes to programmable/virtualized

computing/networking infrastructure. Also,

better alignment between technical capabilities

and business needs is critical.

1. Provider-oriented Service Realizationover Next-Generation SON

Future service environments are expected

to consist of mixed operators including

Futuristic Service Composition Approaches over a Programmable/Virtualized Computing/Networking Infrastructure

Internet and Information Security 35

[Fig. 6] Mediator-based control of media-centric service composition process.

Page 37: nternet I Security - BIGBOOK

prosumers (i.e., providers/users), content-centric

heterogeneous devices, and programmable

service infrastructure. With the foreseen

evolution, it is important to organize services

offered by various SONs and provide access to

stakeholders such as end users and providers.

However, still, there exists no unified SON-

based environment as the service-enabling

backbone. Thus, more efforts in upgrading

SON are needed to support generic QoS

provisioning in the future. The SON upgrade

will make the underlying network more

service-aware so that we can dynamically

achieve the context-aware service composition.

One attempt to build such an environment is

known as NGSON (Next Generation SON)

(IEEE, 2008), which helps providers organize

and improve their business by offering rich

services to their end users so that they can

support the growing lifestyle of end users.

Along this line, NGSON targets a new SON to

bridge the service and transport layers over

the IP-based infrastructure to address the

accommodation of highly adaptive, flexible,

and integrated services. NGSON will

standardize the IP-based SON architecture for

the life-cycle management of multiple, value-

added collaborative, information and

communication services, independent of

underlying transport networks. Although the

entire framework is still in an initial stage

(IEEE, 2008), some entities such as the

collaborative service plane, the network plane,

the operation and management plane, and

others are somewhat discussed. It also

specifies context-aware, dynamically adaptive,

and self-organizing networking capabilities

including advanced service-level routing and

forwarding schemes.

Also, most research on finding a service

path in SONs has addressed problems in wide-

area service composition such as fault-

resilience, adaptability and resource

contention. QoS consistency and load

partitioning in composing a service path for

ubiquitous computing environments have also

been studied in several SON projects. Besides

these issues, P2P-oriented traffic localization to

potentially improve the quality of SON is

investigated by the IETF ALTO (Application

Layer Traffic Optimization) effort, which

standardizes a protocol to enable P2P

applications to obtain information regarding

network-layer topology (Seedorf et al., 2009).

For example, the P4P (Proactive Provider

assistance for P2P) (Xie et al., 2008) offers a

promising service delivery framework

candidate for ALTO that enables ISPs and

application services to work cooperatively to

optimize application communications.

2. Service Realization over VirtualizedOverlay-based Networks

Although NGSON in Section IV.1 is currently

designing a practical approach for SON

upgrade, a lot of major improvements are still

required in order to support generic and

flexible resource provisioning for futuristic

SONs. To allow the spontaneous creation of

์ œ ๊ถŒ ์ œ ํ˜ธ

36 ๋…„ ์›”

Page 38: nternet I Security - BIGBOOK

common communication context (i.e., self-

organizing SON) based on the application-

specific requirements, SpoVNet (Spontaneous

Virtual Networks) (Bless et al., 2008a, 2008b)

attempts to build a virtualized version of

overlay-based networks.

In SpoVNet, with the underlay abstraction,

we can provide generic functionality to cope

with mobility, multi-homing, and heterogeneity.

The underlay abstraction actually comprises

two components. First, the base communication

provides connection-less and connection-

oriented communication between endpoints

identified by sets of network locators. Second,

the base overlay provides node identifiers for

addressing and implementing an ID/Locator

split. Also, being different from the existing

pure P2P overlay, the SpoVNet is aware of the

underlying network infrastructure (i.e., underlay-

awareness) in several aspects. First, with generic

interfaces to underlay functionalities, it allows

transparent deployment of native underlay

mechanisms for mobility, multi-homing, and

others. Second, it utilizes the so-called cross-

layer information service (CLIO) to provide the

measurement information for the optimization

of application-specific overlays. Third, it helps

applications request connectivity with specific

requirements (e.g., security, latency, QoS) in

an abstract way and frees the applications

from network-specific concerns. Last, it uses

optional SpoVNet booster nodes in the

infrastructure to increase the efficiency and

performance of communications. With all these

arrangements, SpoVNet targets at flexible,

adaptive, and spontaneous provisioning of

application-/network-oriented services on top

of heterogeneous networks with the hope

that some selected services can be part of the

futuristic network infrastructure.

3. Service Realization towardSemantic-level Direct Composition

Among the clean-slate design approaches

for future Internet, several efforts define new

and open abstractions of network services

based on the SOA principles (Dutta et al.,

2007). That is, we may provide building blocks

of fine-grained functionality and accomplish

highly-configurable complex communication

tasks by directly combining elementary blocks.

In SILO (Service Integration, controL and

Optimization) (Dutta et al., 2007), a new

abstraction for futuristic network services is

proposed so that it can realize a similar service

composition approach advocated by RBA

(Role-Based Architecture). It focuses on

facilitating โ€œcross-layerโ€interactions to precisely

meet the user requirements and optimize the

performance of service composition. The SILO

architecture provides control entities that can

directly tune the parameters of individual

blocks to match the QoS requirements of

applications and improve the utilization of

network resources.

Aligned with the above network-focused

direct composition of SILO, teams of

researchers are pursing semantic-level service

composition by taking the example of

Futuristic Service Composition Approaches over a Programmable/Virtualized Computing/Networking Infrastructure

Internet and Information Security 37

Page 39: nternet I Security - BIGBOOK

semantic web evolution. First, semantic-level

service composition is approached by ORCA

(Open Resource Control Architecture) project,

which is a control framework candidate for

GENI (Global Environment for Network

Innovations) Future Internet testbed. As

presented in Chase (2009), ORCA proposes

to build a semantic plane to represent the

knowledge about various aspects of the

underlying target system. To allow the

automated creation and management of new

knowledge, it describes a shared vocabulary of

entities and relationships with extensible

semantic Web languages, such as RDF

(Resource Description Framework) and OWL

(Web Ontology Language). The resulting

semantic descriptions are integrated with SILO

and ORCA, which describes various service

functions with inter-service composition

constraints, resource capabilities, and

application requests via commonly used

ontology. Similarly, in another example (Zhao

et al., 2010), a workflow-style semantic

description is proposed, which is demonstrated

in the CineGrid event by SURFnet (Grosso et

al., 2011). The workflow-style semantic

description is linked with two lower-level

semantic descriptions. The semantic-level

description language describes the services

and resources on top of the network

infrastructure. The description for networking

resources models the required properties to

find all network paths between the data

sources and destinations. To enable the

adaptive delivery of media-centric services,

the authors propose to describe how to enable

experimenters to finely specify demanding

resources and to match services/contents with

the available computing/networking resources.

4. FIRST: Balanced DirectComposition ofComputing/Networking Services

Media-centric service composition, based on

a SOC (Service-Oriented Computing) paradigm,

is promising in flexibly building networked

media-centric and time-constrained systems. In

this regards, we have been building the

FIRST@PC (Future Internet Research on

Sustainable Testbed based on PC) testbed (Han

et al., 2009) with heterogeneous (e.g., MediaX

and NetOpen) resources of networked

embedded nodes.3) The resources of networked

embedded nodes are assumed to be highly

programmable and hopefully virtualized in

the sense of both computing and networking.

The media-centric service composition on top

of the FIRST@PC testbed could be represented

as an adaptation process that timely controls

the concatenation of component services

according to the requested service dependency

graph.

[Fig. 7] depicts the high-level concept of

์ œ ๊ถŒ ์ œ ํ˜ธ

38 ๋…„ ์›”

3) As of now, computing resources are already quite programmable and partially virtualized (as seen from the rise of cloud computing). However,networking resources are just starting to be programmable and still far from virtualized.

Page 40: nternet I Security - BIGBOOK

FIRST balanced service composition of

computing/networking services. We use

โ€˜computing servicesโ€™ to refer the existing

computing-oriented services tied with

computing resources and usually confined

within the container of resource(s) themselves.

We also use โ€˜networking servicesโ€™ as the

collection of network-centric services that

assists the transport of diverse flows among

computing services (e.g., those of web servers

and clients). It is well known that each flow in

the network could have different networking

requirement. By using the flow-level network

programmability, the proposed service

composition attempts to fill in the gap caused

by existing networking services (denoted as

โ€˜network servicesโ€™ to emphasize its basic

network connectivity based on today's non-

programmable network substrate). Also, as

shown in [Fig. 7], we attempt to categorize

networking services according to the

relationship with existing networking services,

computing services, and programmable

networking/computing substrates (and resources

inside the substrates).

To verify the conceptual goal of balancing

computing/networking resources for efficient

and flexible service composition, as shown

in [Fig. 8], currently we are working on the

architectural design of FIRST@PC testbed

platform. The proposed platform mainly

includes several types of RAs, TB (TestBed)

management server, and TB experiment

control server. Each RA encapsulates physical

Futuristic Service Composition Approaches over a Programmable/Virtualized Computing/Networking Infrastructure

Internet and Information Security 39

[Fig. 7] Conceptual illustration of balanced composition of computing/networking services.

Page 41: nternet I Security - BIGBOOK

resources and provides remotely accessible

interfaces, named as slivers, to expose the

resources. As shown in [Fig. 8], we have

MediaX (+Cloud) RA to represent the

computing-oriented resources, which is

programmable and can be virtualized. We

also have NetOpen RA to represent the

networking-oriented resources, which are

programmable and limited virtualized (in the

sense of flowspace virtualization) for

OpenFlow-based SDNs (Software-Defined

Networks). Additionally we have RA for

network stitching, which can link the nodes of

other RAs together. The RA manager

configures physical resources and supports

to open yet authorized accesses for resources

according to the presented privileges of

experimenters and administrators. The TB

management server assists administrators

to manage testbed resources by supporting

slice management, resource management,

and resource monitoring. Slice creation

is cooperatively conducted by the TB

management server and corresponding RA

managers. The TB experiment control server

enables experimenters to make use of

allocated resources and to run the service-

composition experiments. With the slice, it

interprets given experiment description and

carries out the described service composition

process (as explained in Section II.3). Also, the

TB experiment control server notifies control

์ œ ๊ถŒ ์ œ ํ˜ธ

40 ๋…„ ์›”

[Fig. 8] Proposed architecture for FIRST@PC testbed platform.

Page 42: nternet I Security - BIGBOOK

events via experiment control plane and

collects the experiment status and results via

measurement plane. With the experimenter

UI, experimenters can check the status of

services as well as the status of allocated

resource pool.

We are also imagining the following

evolution scenario for futuristic computing/

networking resources. The emphasis on the

tight integration of computing and networking

capability of resources leads us to introduce

an early conceptual design of SmartX nodes

for programmable (and eventually virtualized)

RAs to satisfy the computing/networking

needs for resources in a single box (i.e.,

machine). That is, based on SmartX RAs, we

envision the ever-increasing demands for

programmable RAs containing various

computing/networking (albeit with media

processing capabilities) resources in a single

box. Basically, a SmartX node should contain

computing resources such as general-purpose

CPU, GPU, and digital media interfaces,

with which we can effectively perform the

accelerated media processing (e.g., live video

streaming with transcoding). This SmartX node

should also serve as a network switch with its

networking resources, which is programmable

and partially virtualized via the flowspace of

OpenFlow protocol (McKeown et al., 2008).

With these OpenFlow-enabled SmartX nodes,

we can deeply program the networking

resources by linking them with Click software-

based extensible modular router (Kohler et

al., 2000). More specifically, by enabling in-

network processing with Click elements, we

can now support customized computing for all

packets to be forwarded.

[Fig. 9(a)] shows the FIRST@PC testbed

prototype, which is being built and evaluated

in a spiral fashion. In this testbed prototype,

four participating sites are connected via

research networks such as KOREN and

KREONET. We install capsulators on the

physical interfaces of connected edge nodes

and make Ethernet-over-IP tunnels so that

OpenFlow-enabled networks can basically

work on this layer-2 connectivity. Then, in

order to handle media contents, the prototyped

testbed includes media servers to feed live

media flows, connectors/adaptors to conduct

real-time media processing (i.e., networking/

computing) for flows, and networked tiled

displays realizing an ultra-high-resolution video

wall. As a target experiment, we would

completely transport video flows between the

specific media servers and the networked tiled

display. By using an experimenter UI,

experimenters can manually but interactively

select the set of desired services and connect

the services. For this HD media delivery

experiment, the experimenters graphically

illustrate the targeted service dependency

graph, as depicted in [Fig. 9(b)]. Graph

traversal starts with the vertex DXT (DirectX

Texture compression) encoding service that

produces the light-weight-compressed 300

Mbps HD video. It then carries the media

flows via basic networking services, finding a

hop-count-based shortest path over OpenFlow-

Futuristic Service Composition Approaches over a Programmable/Virtualized Computing/Networking Infrastructure

Internet and Information Security 41

Page 43: nternet I Security - BIGBOOK

์ œ ๊ถŒ ์ œ ํ˜ธ

42 ๋…„ ์›”

[Fig. 9] A basic-level service composition experiment in a FIRST@PC testbed prototype.

(a) A FIRST@PC testbed prototype for experimenting basic-level service composition.

(b) A service dependency graph.

(c) Presenting the delivered HD videos in the tiled display.

Page 44: nternet I Security - BIGBOOK

enabled nodes, to deliver them from the

source to the destination nodes. The media

flows then arrive to the networked (tiled)

display service and show them in the display,

as depicted in [Fig. 9(c)].

5. Comparative Analysis

We compare the above four approaches

with respect to the discussed challenges on

successful service composition, which is

summarized in <Table 1>.

๏ฟฝResource programmability. All approaches

offer programmability that enables

controlling the appropriate data forwarding

(van der Merwe et al., 1998). NGSON

provides network information to optimize

the transport-layer performance and

dynamically computes, selects and

possibly optimizes the multiple paths

according to the service-specific QoS.

SPoVNet allows easy provisioning of

networking-oriented services via an

identifier-based addressing scheme and

transport overlays. SILO allows users to

directly integrate and finely control the

desired network protocol stacks like

service composition via explicit control

interfaces. FIRST@PC offers higher-level

abstraction that control programmable

network switches with its networking

resources via the OpenFlow protocol.

๏ฟฝResource virtualization. By using network

virtualization, networking resources can

be deployed and managed for separate

logical services (Chowdhury & Boutaba,

2009). Note that currently NGSON and

SILO provide no way to virtualize network

resources. SPoVNet flexibly supplies QoS-

supported logical overlay networks on

top of heterogeneous physical networks,

whereas it does not provide a fully-

isolated environment. FIRST@PC partially

supports network virtualization via the

OpenFlow flowspace.

๏ฟฝResource management and abstraction.

Futuristic Service Composition Approaches over a Programmable/Virtualized Computing/Networking Infrastructure

Internet and Information Security 43

<Table 1> Comparing service composition approaches.

Challenges NGSON SPoVNet SILO FIRST@PC

Resourceprogrammability

Good Good Excellent Excellent

Resource virtualization Poor Fair Poor Fair

Resource management Via overlay networks Via overlay networks Direct Direct

Resource abstraction Sevice access sub-layer Sevice access sub-layer Knob Primitive

Balanced servicecomposition

Networking services Networking services Networking servicesComputing andnetworking services

Resource-aware andtimely control ofservice composition

service-and-content-aware network trafficoptimization

Hiding of mobility,multi-homing, andprotocolheterogeneiyy

Cross-layer controland optimization

Control of theadaption cycle forsevice composition

Page 45: nternet I Security - BIGBOOK

Both NGSON and SPoVNet build overlay

networks to abstract network heterogeneity

and mobility issues of the underlay

networks. They also enforce monitoring-

based QoS control to manage network

planes. On the contrary, SILO and

FIRST@PC directly access and control

networking/computing elements via

specialized interfaces, named as knobs

and primitives, respectively.

๏ฟฝBalanced service composition. FIRST@PC

attempts to balance the utilization of both

networking and computing resources. It

instantiates service composition after

verifying that provided computing

resources are appropriate and QoS-fitted

with the required networking resources.

On the contrary, all other approaches mostly

concentrate in assembling networking-

centric services.

๏ฟฝResource-aware and timely control of

service composition. All the approaches

attempt to carry out the resource-aware

and timely control of service composition

in various ways. NGSON focuses on the

service-and-content-aware network traffic

optimization, so that redundant flows are

effectively reduced. SPoVNet also assists in

adaptively executing networking services

with the help of cross-layer information

overlay as well as to hide mobility, multi-

homing, and protocol heterogeneity. SILO

offers a way to smoothly integrate per-

flow networking protocol stacks with

cross-layer semantics. Finally, FIRST@PC

allows us to control the adaptation cycle

of service composition by effectively

combining monitoring and tuning methods.

CONCLUSION

In this survey paper, we attempted to

explain how to understand the creation of

futuristic services based on the media-centric

service composition over programmable/

virtualized resources. We then explain why the

timely and efficiently control of service

composition process is important. Finally, we

discuss several notable futuristic approaches,

tied with the diverse research on Future

Internet, which aims to coordinate the control

for desired service composition process.

However, since most futuristic service

composition approaches discussed in this paper

are still under active investigation, the tentative

conclusion is subject to possible updates in

near future. Thus, it is recommended to focus

on catching the overall trends rather than

individual details.

โ–ถ REFERENCES

Bless, R., Hiibsch, C., Mies, S., & Waldhorst, O. P.

(2008a). The underlay abstraction in the spontaneous

virtual networks (SpoVNet) architecture. Next

Generation Internet Networks, 115-122.

Bless, R., Waldhorst, O. P., & Mayer, C. P. (2008b).

The spontaneous virtual networks architecture for

supporting future internet services and applications.

์ œ ๊ถŒ ์ œ ํ˜ธ

44 ๋…„ ์›”

Page 46: nternet I Security - BIGBOOK

Presented at the 1st GI/ITG KuVS Meeting on

Future Internet. Retrieved from http://www.tm.uka.de/

~huebsch/spovnet/data/2008-06-17-FG-future-

internet-org.pdf

Chase, J. (2009). Orca control framework architecture and

internals (Tech. Rep.). Duke University. 1-56.

Chowdhury, N., & Boutaba, R. (2009). Network

virtualization: State of the art and research

challenges. IEEE communications magazine, 47(7),

20-26.

Dutta, R., Rouskas, G. N., Baldine, I., Bragg, A., &

Stevenson, D. (2007). The SILO architecture for

service integration, control, and optimization for

the future Internet. Proceedings of the IEEE

International Conference on Communications 2007,

1899-1904.

Elliott, C., & Falk, A. (2009). An update on the GENI

project. ACM SIGCOMM Computer Communication

Review, 39(3), 28-34.

Grosso, P., Herr, L., Ohta, N., Hearty, P., & de Laat, C.

(2011). Cinegrid: Super high definition media over

optical networks. Future Generation Computer

Systems, 27(7), 881-885.

Gu, X., & Nahrstedt, K. (2006). Distributed multimedia

service composition with statistical QoS assurances.

IEEE Transactions on on Multimedia, 8(1), 141-151.

Han, S. W., & Kim, J. (2010). Preparing experiments with

media-oriented service composition for Future

Internet Proceedings of the 5th International

Conference on Future Internet Technologies, 73-78.

Han, S. W., Kim, N., & Kim, J. (2009). Designing a

virtualized testbed for dynamic multimedia service

composition. Proceedings of the 4th International

Conference on Future Internet Technologies, 1-4.

Huang, X., Shanbhag, S., & Wolf, T. (2010). Automated

service composition and routing in networks with data-

path services. Proceedings of the 19th International

Conference on Computer Communications and

Networks, 1-8.

Huhns, M. N., & Singh, M. P. (2005). Service-oriented

computing: Key concepts and principles. IEEE

Internet Computing, 9(1), 75-81.

IEEE (2008). Draft white paper for next generation

service overlay network (IEEE P1903TM/D1).

Retrieved from http://grouper.ieee.org/groups/

ngson/P1903_2008_0026-White_Paper.pdf

Jaeger, M. C., Rojec-Goldmann, G., & Muhl, G. (2004).

QoS aggregation for web service composition using

workflow patterns. Proceedings of the 8th IEEE

International Conference on Enterprise Distributed

Object Computing, 149-159.

Kalasapur, S., Kumar, M., & Shirazi, B. (2006).

Evaluating service oriented architectures (SOA) in

pervasive computing. Proceedings of the 4th Annual

IEEE International Conference on Pervasive

Computing and Communications, 285-294.

Kim, J., Han, S. W., Kim, N., & Yoo, J.-Y. (2011).

Designing a programmable computing/networking

testbed for experimental media-centric and time-

constrained services. Proceedings of the 6th

International Symposium on Embedded Technology.

Kim, J., Han, S. W., Yi, D.-H., Kim, N., & Kuo,

C.-C. J. (2010). Media-oriented service composition

with service overlay networks: Challenges, approaches

and future trends. Journal of Communications, 5(5),

374-389.

Kohler, E., Morris, R., Chen, B., Jannotti, J., &

Kaashoek, M. F. (2000). The click modular router.

ACM Transactions on Computer Systems, 18(3),

263-297.

Futuristic Service Composition Approaches over a Programmable/Virtualized Computing/Networking Infrastructure

Internet and Information Security 45

Page 47: nternet I Security - BIGBOOK

McKeown, N., Anderson, T., Balakrishnan, H., Parulkar,

G., Peterson, L., Rexford, J.,... Turner, J. (2008).

OpenFlow: Enabling innovation in campus networks.

ACM SIGCOMM Computer Communication Review,

38(2), 69-74.

Nahrstedt, K., & Balke, W.-T. (2004). A taxonomy for

multimedia service composition. Proceedings of

the 12th Annual ACM International Conference on

Multimedia, 88-95.

Nahrstedt, K., & Balke, W.-T. (2005). Towards building

large scale multimedia systems and applications:

Challenges and status. Proceedings of the 1st ACM

International Workshop on Multimedia Service

Composition, 3-10.

Poladian, V., Sousa, J. P., Garlan, D., & Shaw, M. (2004).

Dynamic configuration of resource-aware services.

Proceedings of the 26th International Conference on

Software Engineering, 604-613.

Seedorf, J., Kiesel, S., & Stiemerling, M. (2009). Traffic

localization for P2P-applications: The ALTO

approach. Proceedings of the 9th IEEE International

Conference on Peer-to-Peer Computing, 171-177.

van der Merwe, J. E., Rooney, S., Leslie, L., & Crosby, S.

(1998). The tempest: A practical framework for

network programmability. IEEE Network, 12(3),

20-28.

Xie, H., Yang, Y. R., Krishnamurthy, A., Liu, Y., &

Silberschatz, A. (2008). P4P: Provider portal for

applications. Proceedings of the ACM SIGCOMM

2008 Conference on Data Communication, 351-362.

Zeng, L., Benatallah, B., Ngu, A. H., Dumas, M.,

Kalagnanam, J., & Chang, H. (2004). QoS-aware

middleware for web services composition. IEEE

Transactions on Software Engineering, 30(5),

311-327.

Zhao, Z., Grosso, P., Koning, R., van der Ham, J., & de

Laat, C. (2010). Network resource selection for

data transfer processes in scientific workflows.

Paper presented at the 5th Workshop on Workflows

in Support of Large-Scale Science.

์ œ ๊ถŒ ์ œ ํ˜ธ

46 ๋…„ ์›”

Page 48: nternet I Security - BIGBOOK

Internet and Information Security ์ œ ๊ถŒ ์ œ ํ˜ธ( ๋…„ ์›”) pp. 47~64

Internet and Information Security 47

์ธํ„ฐ๋„ท ์‚ฌ์šฉ์ด ๊ธ‰๊ฒฉํžˆ ์ฆ๊ฐ€ํ•˜๋ฉด์„œ ์šฐ๋ฆฌ๋Š” ์ •๋ณด์˜ ํ™์ˆ˜๋ฅผ ๊ฒฝํ—˜ํ•˜๊ณ  ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ๋ฐ์ดํ„ฐ์˜ ๊ธ‰๊ฒฉํ•œ ์ฆ๊ฐ€๋Š”

์ด์ œ ๊ธฐ์กด ์ฒ˜๋ฆฌ๋ฐฉ์‹์œผ๋กœ๋Š” ์ฆ๊ฐ€ํ•˜๋Š” ๋ฐ์ดํ„ฐ๋ฅผ ๊ฐ๋‹นํ•  ์ˆ˜ ์—†์œผ๋ฉฐ ์ •๋ณด์˜ ์ฒ˜๋ฆฌ์— ์ƒˆ๋กœ์šด ํŒจ๋Ÿฌ๋‹ค์ž„์„ ํ•„์š”๋กœ ํ•œ๋‹ค๋Š” ๊ฒƒ

์„ ์•Œ๋ ค์ฃผ๊ณ  ์žˆ๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ๋ฐ์ดํ„ฐ์˜ ์ฆ๊ฐ€์— ๋”ฐ๋ฅธ ์—ฌ๋Ÿฌ ๋ถ„์•ผ์—์„œ์˜ ์‘ ์‚ฌ๋ก€๋ฅผ ์‚ดํŽด๋ณด๊ณ  ์ตœ๊ทผ ๋น… ๋ฐ์ดํ„ฐ๋ผ๋Š”

์ด๋ฆ„์œผ๋กœ ์ด์Šˆํ™”๋œ ๋ฐ์ดํ„ฐ ์ฒ˜๋ฆฌ์˜ ์ค‘์š”์„ฑ์„ ๊ณต๊ณต ๋ฐ์ดํ„ฐ์˜ ์ž…์žฅ์—์„œ ๊ฒ€ํ† ํ•œ๋‹ค. ๊ณต๊ณต ๋ฐ์ดํ„ฐ๋Š” ์ผ๋ฐ˜ ๋ฐ์ดํ„ฐ์— ๋น„ํ•ด

๊ฐ€์น˜๊ฐ€ ๋†’์œผ๋ฉฐ ์ •๋ถ€๋Š” ๊ณต๊ณต ๋ฐ์ดํ„ฐ์— ํฌํ•จ๋œ ์ •๋ณด๋ฅผ ๋ถ„์„ํ•จ์œผ๋กœ์„œ ํšจ์œจ์ ์ธ ์ •์ฑ…์„ ์ƒ์‚ฐํ•  ์ˆ˜ ์žˆ๋‹ค. ๋ฏธ๊ตญ๊ณผ ๊ตญ ์ •

๋ถ€๋Š” ๊ณต๊ณต ๋ฐ์ดํ„ฐ๋ฅผ ๋งˆ์ด๋‹(mining)ํ•˜๊ณ  ์‹œ๊ฐํ™”ํ•ด์„œ ๊ตญ๋ฏผ์—๊ฒŒ ์šฉ๋Ÿ‰์˜ ๋ฐ์ดํ„ฐ๋ฅผ ์‰ฝ๊ฒŒ ์ดํ•ดํ•  ์ˆ˜ ์žˆ๋„๋ก ์ œ๊ณตํ•˜์—ฌ

์ •๋ถ€ ์ •์ฑ…์˜ ํ™๋ณด์— ํ™œ์šฉํ•˜๊ณ  ์žˆ๋‹ค. ๋ณธ ๊ณ ์—์„œ๋Š” ๋งํฌ๋“œ ๋ฐ์ดํ„ฐ ๋ฐฉ์‹์„ ์ด์šฉํ•˜์—ฌ ๋ถ€์ฒ˜๋งˆ๋‹ค ๋ณ„๋„๋กœ ๊ด€๋ฆฌ๋˜๊ณ  ์žˆ๋Š” ๊ณต

๊ณต ๋ฐ์ดํ„ฐ๋ฅผ ์—ฐ๊ฒฐํ•˜๊ณ  ์ ์ ˆํ•œ ๋งˆ์ด๋‹ ๊ธฐ๋ฒ•๊ณผ ์‹œ๊ฐํ™” ๋„๊ตฌ๋ฅผ ์‚ฌ์šฉํ•œ๋‹ค๋ฉด ๋””์ง€ํ„ธ ๋ฐ์ดํ„ฐ๋ฅผ ์ œ ๋กœ ํ™œ์šฉํ•˜๋Š” ์ฐจ์„ธ ์ „

์ž์ •๋ถ€์˜ ๊ตฌํ˜„์ด ๊ฐ€๋Šฅํ•จ์„ ์ œ์‹œํ•œ๋‹ค.

In this Internet age, we are experiencing a flood of information. This radical increase in the

amount of data indicates that we need a new paradigm to handle such big data. โ€˜Big dataโ€™is a new term

that highlights the fact that this increase in the amount of data is not a problem, but a new challenge and

opportunity. If we can handle the complexity of data, the competitive power of the organization will be

increased. The governments of the US and the UK use public data mining and visualization as a tool to

promote government policies. Linked data is one approach used to connect government data sets that span

multiple organizations. By utilizing data mining and visualization techniques, it is possible to implement

an efficient data driven e-government.

์ฃผ์ œ์–ด: ๊ณต๊ณต ๋ฐ์ดํ„ฐ, ๋น… ๋ฐ์ดํ„ฐ, ๋งํฌ๋“œ ๋ฐ์ดํ„ฐ, ๋ฐ์ดํ„ฐ ๋งˆ์ด๋‹, ์‹œ๊ฐํ™”

Keywords: public data, big data, linked data, data mining, visualization

์ดˆ๋ก

Abstract

๋น… ๋ฐ์ดํ„ฐ์™€ ๊ณต๊ณต ๋ฐ์ดํ„ฐ ํ™œ์šฉ

์ด๋งŒ์žฌ๏ฟฝ

Manjai Lee

๏ฟฝ๏ฟฝ๏ฟฝ ์„œ์šธ ํ•™๊ต ์ฐจ์„ธ ์œตํ•ฉ๊ธฐ์ˆ ์—ฐ๊ตฌ์› ํŠน์ž„์—ฐ๊ตฌ์œ„์›

(Distinguished Fellow, Advanced Institutes of Convergence Technology, Seoul National University, [email protected])

Big Data and the Utilization of Public Data

Page 49: nternet I Security - BIGBOOK

์ธํ„ฐ๋„ท๊ณผ ์›น์ด๋ผ๋Š” ๊ธฐ์ˆ ์ด ์ผ๋ฐ˜์—๊ฒŒ ์•Œ๋ ค์ง„์ง€

๋žต 20๋…„์ด ์ง€๋‚œ ์ง€๊ธˆ ์šฐ๋ฆฌ๋Š” ์ •๋ณด์˜ ํ™์ˆ˜ ์†์—

์‚ด๊ณ  ์žˆ๋‹ค. ์‚ฌ๋ฌด์‹ค์—์„œ ์ผํ•˜๋Š” ๋ถ€๋ถ„์˜ ์ง€์‹ ๊ทผ

๋กœ์ž๋Š” ์—…๋ฌด ์‹œ๊ฐ„์˜ ๋ถ€๋ถ„์„ ์ •๋ณด์˜ ๊ฒ€์ƒ‰์— ๋ณด๋‚ด

๊ณ  ์žˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์›ํ•˜๋Š” ์ •๋ณด๋ฅผ ๋ฐœ๊ฒฌํ•˜์ง€ ๋ชปํ•˜๊ณ 

ํ•œ์ฐธ ๋’ค์— ๋‹ค๋ฅธ ๊ฒฝ๋กœ๋ฅผ ํ†ตํ•˜์—ฌ ์ž์‹ ์ด ์›ํ•˜๋Š” ์ •

๋ณด๋ฅผ ๋ฐœ๊ฒฌํ•˜๊ฒŒ ๋˜๋Š” ๊ฒฝ์šฐ๊ฐ€ ํ—ˆ๋‹คํ•˜๋‹ค. ์ด๋Ÿฌํ•œ ๊ฒฝ

ํ—˜์€ ์ธํ„ฐ๋„ท์„ ํ†ตํ•˜์—ฌ ๋งŽ์€ ์ •๋ณด๋ฅผ ์–ป์„ ์ˆ˜ ์žˆ์ง€

๋งŒ ์ •๋ง๋กœ ์›ํ•˜๋Š” ์‹œ๊ฐ„์— ์›ํ•˜๋Š” ์ •๋ณด๋ฅผ ์–ป์ง€ ๋ชป

ํ•  ์ˆ˜ ์žˆ์Œ์„ ์ผ๊นจ์›Œ์ฃผ๊ณ  ์žˆ๋‹ค. ์—ฌ๊ธฐ์—์„œ ์ธ๋ฅ˜๋Š”

์‹ค์ œ๋กœ ์–ผ๋งˆ๋‚˜ ๋งŽ์€ ์ •๋ณด๋ฅผ ๊ฐ–๊ณ  ์žˆ๊ณ  ๋˜ ์ด๋ฅผ ์ œ

๋กœ ํ™œ์šฉํ•  ์ˆ˜ ์žˆ์œผ๋ ค๋ฉด ์–ด๋–ป๊ฒŒ ํ•ด์•ผ ํ•˜๋Š”๊ฐ€์—

ํ•œ ์˜๋ฌธ์ด ์ œ๊ธฐ๋œ๋‹ค.

์ธํ„ฐ๋„ท ์ด์ „์˜ ์ •๋ณด๋Š” ์ฃผ๋กœ ์ฑ…์ด๋‚˜ ๋ฌธ์„œ ํ˜•ํƒœ๋กœ

์ƒ์‚ฐ๋˜์—ˆ๋‹ค. TV๋ฐฉ์†ก์ด๋‚˜ ๋ผ๋””์˜ค์™€ ๊ฐ™์€ ์ „ํŒŒ ๋งค

์ฒด์— ์˜ํ•œ ์ •๋ณด๋Š” ๊ทนํžˆ ์ผ๋ถ€๋ฅผ ์ œ์™ธํ•˜๊ณ ๋Š” ๋ฐฉ์†ก

ํ›„ ๋ณด๊ด€๋˜์ง€ ์•Š๊ณ  ์†Œ๋ฉธ๋˜์—ˆ๋‹ค. ๋””์ง€ํ„ธ ๊ธฐ์ˆ ๊ณผ ์ธ

ํ„ฐ๋„ท์˜ ๋ฐœ๋‹ฌ๋กœ ๋ชจ๋“  ์‚ฌ๋žŒ์ด ์ •๋ณด์˜ ์†Œ๋น„์ž๋ฉด์„œ ๋™

์‹œ์— ์ •๋ณด๋ฅผ ์ƒ์‚ฐํ•  ์ˆ˜ ์žˆ๊ฒŒ ๋˜์—ˆ๋‹ค. ์—ฌ๊ธฐ์— ์Šค๋งˆ

ํŠธํฐ๊ณผ ๋””์ง€ํ„ธ ์นด๋ฉ”๋ผ์™€ ๊ฐ™์€ ๋Ÿ‰์˜ ์ •๋ณด๋ฅผ ์ƒ์‚ฐ

ํ•  ์ˆ˜ ์žˆ๋Š” ๊ธฐ๊ธฐ๊ฐ€ ์ถ”๊ฐ€๋˜๊ณ  TV๋งค์ฒด๊ฐ€ ๋””์ง€ํ„ธ ๋ฐฉ

์‹์œผ๋กœ ์ „ํ™˜๋˜๋ฉด์„œ ์ •๋ณด ๋‚ด์ง€ ๋ฐ์ดํ„ฐ๋Š” ๋ฌด์„œ์šด ์†

๋„๋กœ ์ฆ๊ฐ€ํ•˜๊ณ  ์žˆ์„ ๊ฒƒ์œผ๋กœ ์ถ”์ •๋œ๋‹ค.

์ด๋Ÿฌํ•œ ๋ฐ์ดํ„ฐ์˜ ์ฆ๊ฐ€๋Š” ์ด๋ฅผ ์ฒ˜๋ฆฌํ•˜๋Š” ์ปดํ“จํ„ฐ

์‹œ์Šคํ…œ์—๋„ ํ–ฅ์„ ์ฃผ์–ด ๊ฐœ๋ณ„์ ์ธ ๋ฐ์ดํ„ฐ์˜ ๋ณด๊ด€

์‹  ํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ…์œผ๋กœ์˜ ๋ณ€ํ™”๋ฅผ ์œ ๋„ํ•˜๊ณ  ์žˆ

๋‹ค. ๋ณธ ์—ฐ๊ตฌ๋Š” ๋ง‰์—ฐํžˆ ์ฆ๊ฐ€ํ•˜๊ณ  ์žˆ์„ ๊ฒƒ์œผ๋กœ ์˜ˆ์ธก

๋˜๋Š” ๋ฐ์ดํ„ฐ์˜ ์–‘์ด ๊ตฌ์ฒด์ ์œผ๋กœ ์–ผ๋งˆ๋‚˜ ๋˜๋ฉฐ ์–ผ๋งˆ

๋‚˜ ๋น ๋ฅธ ์†๋„๋กœ ์ฆ๊ฐ€ํ•˜๋Š” ๊ฒƒ์„ ํŒŒ์•…ํ•˜๋Š” ๊ฒƒ์œผ๋กœ

์‹œ์ž‘ํ•˜ ๋‹ค. ๊ทธ๋ฆฌ๊ณ  ๋ฐ์ดํ„ฐ์˜ ์ฆ๊ฐ€์— ๋”ฐ๋ผ ๊ธฐ์กด

์ •๋ณด์ฒ˜๋ฆฌ ๋ฐฉ์‹์œผ๋กœ๋Š” ์ด๋Ÿฌํ•œ ๋ฌธ์ œ์˜ ์ฒ˜๋ฆฌ์— ์žˆ์–ด

ํ•œ๊ณ„์— ๋„๋‹ฌํ•˜ ์œผ๋ฉฐ ์ƒˆ๋กœ์šด ์ฒ˜๋ฆฌ๋ฐฉ์‹์˜ ํŒจ๋Ÿฌ๋‹ค

์ž„์ด ๋“ฑ์žฅํ•˜๊ณ  ์žˆ์Œ์„ ํ™•์ธํ•˜ ๋‹ค. ๋น… ๋ฐ์ดํ„ฐ๋ผ๋Š”

์ด์Šˆ๋Š” ์ด๋Ÿฌํ•œ ๋ณ€ํ™”๋ฅผ ํ‘œํ•˜๋Š” ์šฉ์–ด๋กœ ๊ทœ๋ชจ ์ •

๋ณด์ฒ˜๋ฆฌ๋ฅผ ํ•„์š”๋กœ ํ•˜๋Š” ๋ชจ๋“  ๊ธฐ๊ด€์— ์ด๋Ÿฌํ•œ ํŒจ๋Ÿฌ๋‹ค

์ž„์˜ ๋ณ€ํ™”๋ฅผ ์•Œ๋ฆฌ๋Š” ์—ญํ• ์„ ํ•˜๊ณ  ์žˆ๋‹ค.

๋ฐ์ดํ„ฐ์˜ ์ฆ๊ฐ€์— ์ฒ˜ํ•˜๊ธฐ ์œ„ํ•ด์„œ๋Š” ๋ฐ์ดํ„ฐ๋กœ

๋ถ€ํ„ฐ ๊ฐ’์ง„ ์ •๋ณด๋ฅผ ์–ป๋Š” ๊ฒƒ์ด ์ค‘์š”ํ•˜๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—

์„œ๋Š” ๋ฐ์ดํ„ฐ์˜ ์ฆ๊ฐ€๋ผ๋Š” ๋ฌธ์ œ์ ์„ ํ•ด๊ฒฐํ•˜๋ ค๊ณ  ๋…ธ

๋ ฅํ•œ ๊ฐ๊ตญ์˜ ์‚ฌ๋ก€๋ฅผ ์‚ดํŽด๋ณด๋„๋ก ํ•œ๋‹ค. ๋ฏผ๊ฐ„์ด๋‚˜

๊ธฐ์—…์ด ๋ณด์œ ํ•œ ๋น… ๋ฐ์ดํ„ฐ์˜ ๋ฌธ์ œ๋Š” ๊ธฐ์—… ๊ฒฝ์Ÿ๋ ฅ์˜

๋ฌธ์ œ๋กœ ๊ธฐ์ˆ ๊ฐœ๋ฐœ๊ณผ ๋น„์ฆˆ๋‹ˆ์Šค๋ชจ๋ธ์„ ๋ณ€ํ™”์‹œํ‚ด์œผ๋กœ

๊ฐ€๋Šฅํ•  ๊ฒƒ์ด๋‹ค. ์ •๋ถ€๋‚˜ ๊ณต๊ณต๊ธฐ๊ด€์ด ๋ณด์œ ํ•œ ๋ชจ๋“ 

๋ฐ์ดํ„ฐ๋ฅผ ํ•˜๋‚˜์˜ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค ํ˜•ํƒœ๋กœ ํ†ตํ•ฉํ•˜๋Š”

๊ฒƒ์€ ๊ธฐ์ˆ ์ ์œผ๋กœ ์ ์ ˆํ•˜์ง€๋„ ์•Š๊ณ  ๋ฒ•๊ณผ ์ œ๋„์˜ ๋ฌธ

์ œ๋กœ ํ˜„์‹ค์ ์œผ๋กœ ๊ฐ€๋Šฅํ•˜์ง€ ์•Š์œผ๋ฉฐ, ๋งํฌ๋“œ ๋ฐ์ดํ„ฐ

์™€ ๊ฐ™์€ ๋ฐ์ดํ„ฐ ์„ธํŠธ๋ฅผ ์—ฐ๊ณ„ํ•˜๋Š” ๋ฐฉ์‹์ด ํ˜„์‹ค์ ์ธ

์•ˆ์ด ๋  ์ˆ˜ ์žˆ์Œ์„ ์‚ดํŽด๋ณด๋„๋ก ํ•œ๋‹ค.

1. ์ •๋ณด์˜ ์ด๋Ÿ‰ ์ฆ๊ฐ€

์ •๋ณด์˜ ๋””์ง€ํ„ธํ™”๊ฐ€ ์ง„ํ–‰๋˜๋ฉฐ ์ •๋ณด๋Ÿ‰์„ ๋””์ง€ํ„ธ

์ •๋ณด๋‹จ์œ„์ธ ๋ฐ”์ดํŠธ ๋‹จ์œ„๋กœ ํ‘œ์‹œํ•  ์ˆ˜ ์žˆ๊ฒŒ ๋˜์—ˆ

๋‹ค. ๋ชจ๋“  ์ •๋ณด์˜ ๋””์ง€ํ„ธํ™”๊ฐ€ ์™„์„ฑ๋˜๊ธฐ ์ด์ „์—๋Š”

์ธ๋ฅ˜๊ฐ€ ๋ณด์œ ํ•œ ์ •๋ณด์˜ ์ด๋Ÿ‰์„ ํŒŒ์•…ํ•˜๊ธฐ ์–ด๋ ค์› ์œผ

๋ฉฐ ๊ฐ€์น˜ ์žˆ๋Š” ์ •๋ณด ์œ„์ฃผ๋กœ ์ •๋ณด์˜ ์–‘์„ ํŒŒ์•…ํ•˜๋Š”

์—ฐ๊ตฌ๊ฐ€ ์‹œ์ž‘๋˜์—ˆ๋‹ค. ๋ฏธ ์˜ํšŒ ๋„์„œ๊ด€์˜ ์ž๋ฃŒ๋ฅผ ๋””

์ง€ํ„ธ๋กœ ๋ณ€ํ™˜ํ•  ๊ฒฝ์šฐ ์•ฝ 3PB(ํŽ˜ํƒ€๋ฐ”์ดํŠธ = 1015๋ฐ”

์ดํŠธ)์˜ ์šฉ๋Ÿ‰์ด ํ•„์š”ํ•˜๋‹ค๋Š” ์—ฐ๊ตฌ๊ฒฐ๊ณผ๊ฐ€ ๋ฐœํ‘œ๋œ ๋ฐ”

์žˆ๋‹ค(Lesk, 2007). ์ด๋Š” ๊ณต์‹์ ์œผ๋กœ ์ถœํŒ๋œ ์„œ์ 

์ด๋‚˜ ๋ฌธ์„œ๋งŒ์„ ํฌํ•จํ•œ ๊ฒƒ์œผ๋กœ ์—ฌ๊ธฐ์— ์‚ฌ์šด๋“œ,

ํ™” ๋“ฑ ๋ฉ€ํ‹ฐ๋ฏธ๋””์–ด ๋ฐ์ดํ„ฐ๋ฅผ ํ•ฉ์นœ๋‹ค๋ฉด ์ธ๋ฅ˜๊ฐ€ ๋ณด์œ 

ํ•œ ๋ชจ๋“  ๋ฐ์ดํ„ฐ๋Š” ๋žต 12,000PB๋กœ ์ถ”์ •๋˜๋ฉฐ,

์ „ ์„ธ๊ณ„๊ฐ€ ๋ณด์œ ํ•œ ์ด์™€ ๊ฐ™์€ ๋ชจ๋“  ์ •๋ณด๋ฅผ ๋””์ง€ํ„ธ

๋กœ ๋ณ€ํ™˜ํ•  ์ˆ˜๋Š” ์—†๋‹ค๋Š” ๊ฒฐ๋ก ์„ ์–ป๋Š”๋‹ค.

1987๋…„๋ถ€ํ„ฐ 2007๋…„ ์‚ฌ์ด์˜ ๋งค์ฒด์˜ ๋ถ„๋ฅ˜, ๋””์ง€

์ œ ๊ถŒ ์ œ ํ˜ธ

48 ๋…„ ์›”

Page 50: nternet I Security - BIGBOOK

ํ„ธ ๋ณ€ํ™˜๋น„์œจ, ๋””์ง€ํ„ธ ๋งค์ฒด์˜ ์••์ถ• ๊ฐ€๋Šฅ์„ฑ, ์ž๋ฃŒ์˜

์ค‘๋ณต ๋“ฑ ๋””์ง€ํ„ธ ์ž๋ฃŒ์˜ ๋ชจ๋“  ํŠน์„ฑ์„ ๊ณ ๋ คํ•œ 1,120

๊ฐœ์˜ ์ •๋ณด์†Œ์Šค๋ฅผ ์ข…ํ•ฉํ•˜์—ฌ ์ „ ์„ธ๊ณ„ ์ •๋ณด์˜ ์ €์žฅ,

ํ†ต์‹  ๋ฐ ๊ณ„์‚ฐ์šฉ๋Ÿ‰์„ 7๋…„ ์ฃผ๊ธฐ๋กœ ์ถ”์ •ํ•œ ๋ฐ” ์žˆ๋‹ค

(Hilbert & Lopez, 2011). [๊ทธ๋ฆผ 1]์€ ์ •๋ณด์˜ ์šฉ

๋Ÿ‰์„ ๋กœ๊ทธ ์Šค์ผ€์ผ๋กœ ํ‘œ์‹œํ•œ ๊ฒƒ์œผ๋กœ 21๋…„์˜ ๊ธฐ๊ฐ„

์ค‘ ์•ฝ 100๋ฐฐ์˜ ์ฆ๊ฐ€๋ฅผ ๋ณด์—ฌ์ค€๋‹ค. ์ด ์ค‘ 1993๋…„๋ถ€

ํ„ฐ 2000๋…„์˜ ๊ธฐ๊ฐ„์— ๋น„ํ•ด 2000๋…„๋ถ€ํ„ฐ 2007๋…„์˜

์ฆ๊ฐ€๊ฐ€ ๋†’์€ ๊ฒƒ์€ ๋ฐ์ดํ„ฐ์˜ ์ฆ๊ฐ€์™€ ํ•จ๊ป˜ ์—ฌ๋Ÿฌ ๋งค

์ฒด๊ฐ€ ๋””์ง€ํ„ธ๋กœ ๋ณ€ํ™˜๋จ์— ๋”ฐ๋ฅธ ํ˜„์ƒ์ด๋‹ค. ๊ทธ๋ž˜ํ”„์˜

์ฆ๊ฐ€์ถ”์„ธ๋ฅผ ๊ฐ์•ˆํ•œ๋‹ค๋ฉด 2011๋…„ ํ˜„์žฌ ์ •๋ณด์˜ ์ด๋Ÿ‰

์€ 1ZB(์ œํƒ€๋ฐ”์ดํŠธ = 1021๋ฐ”์ดํŠธ)๋ฅผ ๋„˜์–ด์„  ๊ฒƒ์œผ

๋กœ ์ถ”์ •๋œ๋‹ค.

์ด๋ฏธ ๋””์ง€ํ„ธ๋กœ ์ „ํ™˜๋œ ๋ฐ์ดํ„ฐ ์™ธ์—๋„ ์ž ์žฌ์ ์ธ

๋””์ง€ํ„ธ ๋ฐ์ดํ„ฐ์ธ ๋ฐฉ์†ก๊ณผ ํ†ต์‹  ๋ฐ์ดํ„ฐ๋ฅผ ๊ณ„๋Ÿ‰ํ•œ ๊ฒฐ

๊ณผ๋Š” <ํ‘œ 1>๊ณผ ๊ฐ™๋‹ค. 2007๋…„์˜ ๊ฒฝ์šฐ ๋ฐฉ์†ก๋ฐฉ์‹์€

์•ฝ 1/4๋งŒ์ด ๋””์ง€ํ„ธ๋กœ ์ „ํ™˜๋˜์—ˆ๊ธฐ์— ๋””์ง€ํ„ธ ๋ฐ์ด

ํ„ฐ๋Š” ์—ฌ์ „ํžˆ ๋†’์€ ์ฆ๊ฐ€๋ฅผ ๋ณด์ผ ๊ฒƒ์œผ๋กœ ์ถ”์ •๋œ๋‹ค.

2. IDC์˜ ์ •๋ณด์˜ ํ™์ˆ˜ ๋ถ„์„

์•ž์„  ์—ฐ๊ตฌ๋กœ ์ •๋ณด ์ฒ˜๋ฆฌ์™€ ๊ด€๋ จ๋œ ์ง€ํ‘œ์˜ ์ฆ๊ฐ€๋Š”

๊ธฐ๋ณธ์ ์œผ๋กœ ๋ฌด์–ด์˜ ๋ฒ•์น™๊ณผ ์œ ์‚ฌํ•˜๊ฒŒ ์ง€์ˆ˜ํ•จ์ˆ˜๋ฅผ

๋”ฐ๋ฅด๋Š” ๊ฒƒ์„ ๋ณผ ์ˆ˜ ์žˆ๋‹ค. IDC๋Š” 2008๋…„ ๋ฐœํ‘œํ•œ ๋ฐฑ

๋น… ๋ฐ์ดํ„ฐ์™€ ๊ณต๊ณต ๋ฐ์ดํ„ฐ ํ™œ์šฉ

Internet and Information Security 49

[๊ทธ๋ฆผ 1] ์ „ ์„ธ๊ณ„ ์ •๋ณด๋Ÿ‰์˜ ๋ณ€ํ™”(๋กœ๊ทธ ์Šค์ผ€์ผ)*์ถœ์ฒ˜: Hilbert & Lopez(2011) ์žฌ๊ตฌ์„ฑ

*์ถœ์ฒ˜: Hilbert & Lopez(2011) ์žฌ๊ตฌ์„ฑ

<ํ‘œ 1> 1986๋…„ ์ดํ›„ ์ •๋ณด์ฆ๊ฐ€(๋‹จ์œ„: EB = 1018๋ฐ”์ดํŠธ)

๊ตฌ๋ถ„ 1986 1993 2000 2007

์ธํ„ฐ๋„ท ๋ฐ์ดํ„ฐ 2.64 15.7 54.5 295

ํ†ต์‹  ๋ฐ์ดํ„ฐ 0.28 0.47 2.24 65.3

๋ฐฉ์†ก ๋ฐ์ดํ„ฐ 432 71.5 1150 1890

๋ฐฉ์†ก ๋ฐ์ดํ„ฐ์˜ ๋””์ง€ํ„ธ ๋น„์œจ 0 % 0 % 7.2 % 24.8 %

Page 51: nternet I Security - BIGBOOK

์„œ๋ฅผ ํ†ตํ•ด 2007๋…„ ์ดํ›„ ์ •๋ณด์˜ ์ƒ์„ฑ์ด ๊ธ‰๊ฒฉํžˆ ์ฆ

๊ฐ€ํ•˜๊ณ  ์žˆ๊ณ  ์ €์žฅ์šฉ๋Ÿ‰์€ ์ด์— ์‘ํ•˜์ง€ ๋ชปํ•ด ๊ท ํ˜•์ด

๊นจ์ง„๋‹ค๋Š” ๋‚ด์šฉ์„ ๋ฐœํ‘œํ•˜ ๋‹ค(Gantz et al.,

2008). ์ด๋Ÿฌํ•œ ํ˜„์ƒ์€ ๊ณผ๊ฑฐ์˜ ์˜ˆ์ƒ๋ณด๋‹ค ๋” ๊ธ‰๊ฒฉํ•˜

๊ฒŒ ๋ณ€ํ•œ ๊ฒƒ์œผ๋กœ ๊ด€์ธก๋˜์—ˆ์œผ๋ฉฐ ๊ฐœ์ธ์˜ ์ •๋ณด๋ณด๊ด€์„

์œ„ํ•œ ์™ธ์žฅํ•˜๋“œ์˜ ์ฆ๊ฐ€์™€ ๋…ธํŠธ๋ถ์ด๋‚˜ ๋ชจ๋ฐ”์ผ ๊ธฐ๊ธฐ

์˜ ๋“ฑ์žฅ์„ ์ฃผ์š” ์›์ธ์œผ๋กœ ์ง€์ ํ•˜ ๋‹ค. ์—ฐ๊ตฌ ๊ฒฐ๊ณผ,

2009๋…„ 0.8ZB์˜ ์ •๋ณด์šฉ๋Ÿ‰์€ 2020๋…„ 35ZB๋กœ 11

๋…„ ๋™์•ˆ ์•ฝ 44๋ฐฐ์˜ ์ฆ๊ฐ€๋ฅผ ์˜ˆ์ธกํ•˜ ๋‹ค. ์ง€๋‚œ 21๋…„

๊ฐ„ 100๋ฐฐ ์ฆ๊ฐ€๋„ ๋งค์šฐ ๊ธ‰๊ฒฉํ•œ ๊ฒƒ์ด๋ผ๊ณ  ์ƒ๊ฐํ•˜๊ณ 

์žˆ๋Š” ์ง€๊ธˆ, ์ด๋ณด๋‹ค ๋” ๊ธ‰๊ฒฉํ•œ ์ฆ๊ฐ€๊ฐ€ ์ด๋ฃจ์–ด์งˆ ๊ฒƒ

์ด๋ผ๋Š” ์˜ˆ์ธก์œผ๋กœ ์ด๋Ÿฌํ•œ ๋ณ€ํ™”์— ์–ด๋–ป๊ฒŒ ์ฒ˜ํ•ด์•ผ

ํ•˜๋Š”๊ฐ€์— ํ•œ ์—ฐ๊ตฌ๊ฐ€ ํ•„์š”ํ•จ์„ ๋ณด์—ฌ์ฃผ๊ณ  ์žˆ๋‹ค.

๊ฐ™์€ IDC์— ๋ฐœํ‘œํ•œ 2009๋…„์˜ ๋ฐฑ์„œ์—์„œ๋Š” 40%

์˜ ์‘๋‹ต์ž๊ฐ€ ์›ํ•˜๋Š” ์‹œ๊ฐ„์— ์›ํ•˜๋Š” ์ •๋ณด๋ฅผ ์–ป์€

๊ฒฝ์šฐ๊ฐ€ 75% ์ดํ•˜๋ผ๋Š” ๋‚ด์šฉ์„ ์ œ์‹œํ•˜๊ณ  ์žˆ๋‹ค

(Gantz et al., 2009). ๋˜ํ•œ ์‘๋‹ต์ž์˜ 60%๋Š” ๋‹จ์ˆœ

ํžˆ ์ •๋ณด๊ฐ€ ์ฆ๊ฐ€ํ•˜๋Š” ๊ฒƒ๋ณด๋‹ค ๋„ˆ๋ฌด๋‚˜ ๋‹ค์–‘ํ•œ ๋‹ค๋ฅธ ํ˜•

ํƒœ์˜ ์ •๋ณด๋ฅผ ๋‹ค๋ฃจ์–ด์•ผ ํ•˜๋Š” ๊ฒƒ์ด ๋” ํฐ ๋ฌธ์ œ๋ผ๋Š”

์˜๊ฒฌ์„ ํ”ผ๋ ฅํ•˜ ๊ณ  ์ •๋ณด์˜ ์ฆ๊ฐ€์— ๋”ฐ๋ฅธ ์–ด๋ ค์›€์œผ

๋กœ ์ด๋ฉ”์ผ๊ณผ ์ธ์‡„๋œ ๋ฌธ์„œ๋ฅผ ์šฐ์„ ์ ์œผ๋กœ ๊ผฝ๊ณ  ์žˆ๋‹ค.

๋ณธ ๋…ผ๋ฌธ์— ์‚ฌ์šฉ๋˜๋Š” ํฐ ๋‹จ์œ„์˜ ์ˆ˜๋Š” ์ผ๋ฐ˜์ธ์ด

๊ทธ ํฐ ์ •๋„๋ฅผ ์ดํ•ดํ•˜๊ธฐ ์–ด๋ ต๋‹ค. ๊ตฌ์ฒด์ ์œผ๋กœ 35ZB

๋ผ๋Š” ๊ฐ’์ด ์–ผ๋งˆ๋‚˜ ํฐ ๊ฒƒ์ธ๊ฐ€๋ฅผ ์‚ดํŽด๋ณด์ž. ์šฐ๋ฆฌ๊ฐ€

์‚ฌ์šฉํ•˜๋Š” ์ •๋ณด ๋˜๋Š” ๋ฐ์ดํ„ฐ๋Š” ๋ถ€๋ถ„ ํŒŒ์ผ ๋‹จ์œ„๋กœ

์ €์žฅ๋˜๊ณ  ๊ฒ€์ƒ‰๋œ๋‹ค. 35ZB๋ผ๋Š” ์šฉ๋Ÿ‰์€ ํŒŒ์ผ์˜ ๊ฐœ

์ˆ˜๋กœ ๋ฐ”๊พธ๋ฉด ๋žต 25x1015๊ฐœ๋กœ ํ•œ ํ‘œํ˜„์œผ๋กœ๋Š”

2.5๊ฒฝ์œผ๋กœ ํ‘œ์‹œ๋œ๋‹ค. ๋งŒ์•ฝ ์ด๋Ÿฌํ•œ ์ •๋ณด์˜ ํ™์ˆ˜์—

์„œ ์›ํ•˜๋Š” ๋‚ด์šฉ์„ ์ฐพ์œผ๋ ค ํ•œ๋‹ค๋ฉด 2.5๊ฒฝ ๊ฐœ์˜ ํŒŒ์ผ

์„ ๊ฒ€์ƒ‰ํ•  ์ˆ˜ ์žˆ๋Š” ๊ฒ€์ƒ‰์—”์ง„์ด ํ•„์š”ํ•˜๋‹ค. ์ด๋Ÿฌํ•œ

๋ฐ์ดํ„ฐ๊ฐ€ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค๋กœ ๊ฒ€์ƒ‰ํ•  ์ˆ˜ ์žˆ๋Š” ์ •ํ˜•ํ™”

๋œ ๋ฐ์ดํ„ฐ๋ผ๋ฉด ํ˜„ ๊ธฐ์ˆ ๋กœ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•  ์ˆ˜ ์žˆ์„

๊ฐ€๋Šฅ์„ฑ์€ ์กด์žฌํ•œ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ๋ถ€๋ถ„์˜ ๋ฐ์ดํ„ฐ๋Š” ๋น„

์ •ํ˜•์ธ ํ˜•ํƒœ๋กœ ํŒŒ์ผ์˜ ๋‚ด์šฉ์„ ํ™•์ธํ•˜๊ธฐ ์ „์—๋Š” ์–ด

๋–ค ๋‚ด์šฉ์ด ํฌํ•จ๋˜์–ด ์žˆ๋Š”์ง€๋ฅผ ํŒŒ์•…ํ•  ์ˆ˜ ์—†๊ธฐ ๋•Œ

๋ฌธ์— ๋‹จ์ˆœํžˆ ์ •๋ณด์˜ ์–‘์ด ์ฆ๊ฐ€ํ•œ๋‹ค๋Š” ๊ฒƒ์€ ์˜คํžˆ๋ ค

์ •๋ณด์˜ ํ™œ์šฉ์„ ๋ฐฉํ•ดํ•˜๋Š” ํ˜„์ƒ์ด ๋  ์ˆ˜ ์žˆ๋‹ค. ๋˜ํ•œ

์ •๋ณด์ฒ˜๋ฆฌ์— ์†Œ์š”๋˜๋Š” ๋น„์šฉ์€ ๊ฑฐ์˜ ๊ณ ์ •๋˜์–ด ์žˆ๋‹ค

๊ณ  ์•Œ๋ ค์ ธ ์žˆ์œผ๋ฉฐ, ๋”ฐ๋ผ์„œ ๋ฐ์ดํ„ฐ๋‹น ์ฒ˜๋ฆฌ ๋น„์šฉ์€

๊ธ‰๊ฒฉํžˆ ๊ฐ์†Œํ•  ๊ฒƒ์ด๊ณ  ์ด๋Š” ์‹ค์ œ๋กœ ๋ฐ์ดํ„ฐ ๊ด€๋ฆฌ์—

์ด์ „๋ณด๋‹ค ์ ์€ ๋น„์šฉ์œผ๋กœ ์ฒ˜๋ฆฌํ•ด์•ผ ํ•œ๋‹ค๋Š” ๊ฒƒ์„ ์ผ

๊นจ์›Œ์ค€๋‹ค.

3. ๋งคํ‚จ์ง€์˜ ๋น… ๋ฐ์ดํ„ฐ ๋ถ„์„

๋งคํ‚จ์ง€์—์„œ๋Š” 2011๋…„ 5์›” ์ธํ„ฐ๋„ท ๋ฐ์ดํ„ฐ์˜ ์ฆ

๊ฐ€๊ฐ€ ์ „ ์„ธ๊ณ„์˜ ๊ฒฝ์ œ์— ๋ฏธ์น˜๋Š” ํ–ฅ์„ ๋ถ„์„ํ•œ ๋ณด

๊ณ ์„œ๋ฅผ ๋น… ๋ฐ์ดํ„ฐ(big data)๋ผ๋Š” ์ด๋ฆ„์œผ๋กœ ๋ฐœํ‘œํ•˜

๋‹ค(Manyika et al., 2011). ๋น… ๋ฐ์ดํ„ฐ๋ฅผ ๋ฐ์ด

ํ„ฐ ์šฉ๋Ÿ‰์— ๋”ฐ๋ฅธ ๋ถ„๋ฅ˜๊ฐ€ ์•„๋‹ˆ๋ผ ๊ธฐ์กด์˜ ๋ฐ์ดํ„ฐ๋ฒ ์ด

์Šค ์ฒ˜๋ฆฌ๋ฐฉ์‹์œผ๋กœ ํ•ด๊ฒฐํ•  ์ˆ˜ ์—†๋Š” ๋ฐ์ดํ„ฐ์˜ ์„ธํŠธ๋กœ

์ •์˜ํ•˜๊ณ  ์ด๋Ÿฌํ•œ ๋ฐ์ดํ„ฐ๋ฅผ ์ฒ˜๋ฆฌํ•  ์ˆ˜ ์žˆ๋Š” ๊ธฐ์ˆ ์ด

๋‚˜ ์—ญ๋Ÿ‰์„ ๋ณด์œ ํ•œ ๊ธฐ์—…์ด๋‚˜ ๊ตญ๊ฐ€๊ฐ€ ๋ฏธ๋ž˜์— ๊ฒฝ์Ÿ๋ ฅ

์„ ๊ฐ–๊ฒŒ ๋˜๋ฉฐ, ๋”ฐ๋ผ์„œ ๊ตญ๊ฐ€๋‚˜ ๊ธฐ์—…์€ ๋น… ๋ฐ์ดํ„ฐ์—

๊ด€์‹ฌ์„ ๊ธฐ์šธ์—ฌ์•ผ ํ•œ๋‹ค๊ณ  ์—ญ์„คํ•˜ ๋‹ค. ๋งคํ‚จ์ง€์˜ ๋ถ„

์„์— ๋”ฐ๋ฅด๋ฉด ์ „ ์„ธ๊ณ„ ์ธ๊ตฌ์˜ 60%์— ํ•ด๋‹นํ•˜๋Š” 40

์–ต ๋ช…์ด ๋ชจ๋ฐ”์ผํฐ์„ ์‚ฌ์šฉํ•˜๊ณ  ์žˆ์œผ๋ฉฐ ์ธ๊ตฌ์˜ 12%

์ˆ˜์ค€์ด ๋ณด์œ ํ•œ ์Šค๋งˆํŠธํฐ์€ ์ˆ˜๋…„ ๋‚ด์— ๋ชจ๋“  ๋ชจ๋ฐ”์ผ

ํฐ์„ ์ฒดํ•  ๊ฒƒ์ด๋‹ค. ๋˜ํ•œ ํ˜„์žฌ 3์ฒœ ๋งŒ ๊ฐœ์˜ ๋„คํŠธ

์›Œํฌ ์„ผ์„œ๋Š” ์—ฐ๊ฐ„ 30%๋ผ๋Š” ๊ธ‰๊ฒฉํ•œ ์„ฑ์žฅ์„ ๋ณด์ด๊ณ 

์žˆ์œผ๋ฉฐ ์ด๋Ÿฌํ•œ ์„ฑ์žฅ์„ธ๊ฐ€ ์–ธ์ œ ๋ฉˆ์ถœ์ง€๋ฅผ ์˜ˆ์ธกํ•˜๊ธฐ

๋„ ์–ด๋ ค์šด ์ƒํƒœ์ด๋‹ค.

๋น… ๋ฐ์ดํ„ฐ๊ฐ€ ์ œ๊ณตํ•˜๋Š” ๊ธฐํšŒ๋Š” ๋ฐ์ดํ„ฐ๊ฐ€ ์ฆ๊ฐ€ํ•˜

๋Š” ํŠน์ • ๋ถ„์•ผ์˜ ๊ธฐ์—…์—๋งŒ ํ•ด๋‹น๋˜๋Š” ๊ฒƒ์ด ์•„๋‹ˆ๋ฉฐ

์Šค๋งˆํŠธํฐ์„ ์‚ฌ์šฉํ•˜๋Š” ๋ถ€๋ถ„์˜ ๊ตญ๊ฐ€์—์„œ ๋ฐœ๊ฒฌํ• 

์ˆ˜ ์žˆ๋‹ค. ๋น… ๋ฐ์ดํ„ฐ๊ฐ€ ๊ฐ€์ง€๊ณ  ์žˆ๋Š” ๋‚ด์žฌ์ ์ธ ๊ฐ€์น˜

๋ฅผ ๊ด€๊ณ„์ž์—๊ฒŒ ๋น ๋ฅด๊ฒŒ ์ œ๊ณตํ•จ์œผ๋กœ ์ƒˆ๋กœ์šด ๊ฐ€์น˜๋ฅผ

์ฐฝ์กฐํ•  ์ˆ˜ ์žˆ๋Š”๋ฐ, ์ด๋Ÿฌํ•œ ๊ฐ€์น˜์˜ ์ฐฝ์กฐ๋Š” ๊ธฐ์—…์ด

๋‚˜ ๊ธฐ๊ด€์˜ ํˆฌ๋ช…์„ฑ์„ ํ™•๋ณดํ•จ๊ณผ ๋™์‹œ์— ์†Œ๋น„์ž์˜ ์ˆ˜

์š”๋ฅผ ์ ์‹œ์— ๋ฐœ๊ฒฌํ•  ์ˆ˜ ์žˆ์–ด ์ƒˆ๋กœ์šด ์„œ๋น„์Šค๋ฅผ ๋จผ

์ œ ๊ถŒ ์ œ ํ˜ธ

50 ๋…„ ์›”

Page 52: nternet I Security - BIGBOOK

์ € ์ œ๊ณตํ•จ์œผ๋กœ์„œ ๊ฐ€๋Šฅํ•˜๋‹ค. ์ด๋Ÿฌํ•œ ๊ธฐํšŒ๋ฅผ ์–ป๊ธฐ

์œ„ํ•ด์„œ๋Š” ์ž๋™ํ™”๋œ ๋ฐ์ดํ„ฐ์˜ ๋ถ„์„์ด ํ•„์š”ํ•˜๋‹ค. ํŠน

ํžˆ ์„ธ๊ธˆ์ง•์ˆ˜๋‚˜ ์žฌ๊ณ ๊ด€๋ฆฌ์— ์žˆ์–ด ๋ฌธ์ œ๊ฐ€ ๋˜๋Š” ํŠน์ด

ํ•œ ์‚ฌํ•ญ์„ ์‰ฝ๊ฒŒ ๋ฐœ๊ฒฌํ•˜์—ฌ ๋‹ด๋‹น์ž์—๊ฒŒ ์ œ๊ณตํ•จ์œผ๋กœ

์„œ ์œ„ํ—˜์„ ๋ถ„์‚ฐํ•  ์ˆ˜ ์žˆ๋Š” ๊ฒƒ์€ ๋น… ๋ฐ์ดํ„ฐ ์ฒ˜๋ฆฌ์—

์žˆ์–ด ๋งค์šฐ ์ค‘์š”ํ•œ ๊ธฐ๋Šฅ์ด๋ฉฐ ์ด๋ฅผ ์œ„ํ•ด ์กฐ์ง์˜ ๋ณ€

ํ™”๊นŒ์ง€๋ฅผ ๊ฒ€ํ† ํ•ด์•ผ ํ•  ๋‹จ๊ณ„์ด๋‹ค.

๋น… ๋ฐ์ดํ„ฐ ์ฒ˜๋ฆฌ๊ธฐ์ˆ ๋กœ๋Š” ๋ฐ์ดํ„ฐ ๋งˆ์ด๋‹, ๋จธ์‹  ๋Ÿฌ

๋‹, ์ž์—ฐ์–ด ์ฒ˜๋ฆฌ์™€ ๊ฐ™์€ ์ „ํ†ต์ ์ธ ๋ฐ์ดํ„ฐ ๋ถ„์„ ๊ธฐ

์ˆ ๊ณผ ๋น… ํ…Œ์ด๋ธ”, ์นด์‚ฐ๋“œ๋ผ์™€ ๊ฐ™์€ ์ƒˆ๋กญ๊ฒŒ ๋“ฑ์žฅํ•˜๋Š”

๋น… ๋ฐ์ดํ„ฐ ์ฒ˜๋ฆฌ ๊ธฐ๋ฒ•, ๊ทธ๋ฆฌ๊ณ  ๋ถ„์„๋œ ๋ฐ์ดํ„ฐ๋ฅผ ์‚ฌ

์šฉ์ž์—๊ฒŒ ์ดํ•ดํ•˜๊ธฐ ์‰ฝ๊ฒŒ ์‹œ๊ฐํ™”ํ•˜๋Š” ๊ธฐ์ˆ ์„ ๋“ค ์ˆ˜

์žˆ๋‹ค. ๋ณด๊ณ ์„œ์—์„œ๋Š” ๋น… ๋ฐ์ดํ„ฐ๋ฅผ ์ œ ๋กœ ํ™œ์šฉํ•  ๊ฒฝ

์šฐ ๊ฐ€์žฅ ํฐ ํšจ๊ณผ๋ฅผ ์–ป์„ ์ˆ˜ ์žˆ๋Š” ๋ถ„์•ผ๋กœ <ํ‘œ 2>์—

์ œ์‹œ๋œ ๋‹ค์„ฏ ๋„๋ฉ”์ธ์„ ์˜ˆ์‹œํ•˜ ๋‹ค.

๋น… ๋ฐ์ดํ„ฐ์— ์ฒ˜ํ•˜๊ธฐ ์œ„ํ•ด์„œ ๋ฏธ๊ตญ์˜ ๊ฒฝ์šฐ ๋ฐ์ด

ํ„ฐ๋ฅผ ๋ถ„์„ํ•  ๋Šฅ๋ ฅ์„ ๊ฐ–์ถ˜ 14๋งŒ ๋ช…์—์„œ 20๋งŒ ๋ช…์˜

์ธ๋ ฅ์ด ํ•„์š”ํ•  ๊ฒƒ์ด๋ฉฐ ์ด์— ๋ฏธ๋ฆฌ ๋น„ํ•  ๊ฒƒ์„ ์ง€

์ ํ•˜๊ณ  ์žˆ๋‹ค. ๋˜ํ•œ ๋ฐ์ดํ„ฐ ๊ด€๋ฆฌ์ •์ฑ…, ๊ธฐ์ˆ ๊ฐœ๋ฐœ, ๋ฐ

์ดํ„ฐ์˜ ์ ‘๊ทผ ๋ฐฉ์‹ ๊ฐœ์„ ์„ ๊ตฌ์ฒด์ ์ธ ์•ก์…˜ ์•„์ดํ…œ์œผ

๋กœ ์ œ์‹œํ•˜๊ณ  ์žˆ๋‹ค.

4. ์ง ๊ทธ๋ ˆ์ด์˜ ์ œ4 ํŒจ๋Ÿฌ๋‹ค์ž„

๋ฐ์ดํ„ฐ์˜ ์ฆ๊ฐ€๋Š” ์ผ๋ฐ˜ ๊ธฐ์—…์˜ ๋ฌธ์ œ๊ฐ€ ์•„๋‹ˆ๋ผ ๊ณผ

ํ•™๊ณ„์—๋„ ํ–ฅ์„ ๋ฏธ์น˜๊ณ  ์žˆ๋‹ค. ๋งˆ์ดํฌ๋กœ์†Œํ”„ํŠธ์˜

์ง ๊ทธ๋ ˆ์ด๋Š” ๊ณผํ•™์˜ ๋ฐฉ๋ฒ•๋ก  ์ž์ฒด๋ฅผ ๋ฐ”๊พธ์–ด์•ผ ํ•œ๋‹ค

๋Š” ์ œ4 ํŒจ๋Ÿฌ๋‹ค์ž„(The Fourth Paradigm)์„ ์ฃผ์žฅ

ํ•˜ ๋‹ค(Hey et al., 2009). ๊ทธ์˜ ์ฃผ์žฅ์— ๋”ฐ๋ฅด๋ฉด

์ตœ์ดˆ์˜ ๊ณผํ•™์€ ์ž์—ฐํ˜„์ƒ์„ ๊ด€์ฐฐํ•จ์œผ๋กœ ์‹œ์ž‘๋˜์—ˆ

๊ณ , ๋‹ค์Œ์œผ๋กœ ์ž์—ฐ์„ ์ดํ•ดํ•˜๊ธฐ ์œ„ํ•œ ์ด๋ก ์  ๋ชจ๋ธ

์„ ๋งŒ๋“œ๋Š” ๋ฐฉ์‹์œผ๋กœ ๊ณผํ•™ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜ ์œผ๋ฉฐ ๋‰ด

ํ„ด์˜ ๋ฒ•์น™์ด ์ข‹์€ ์˜ˆ์ด๋‹ค. ์ดํ›„ ์ปดํ“จํ„ฐ๊ฐ€ ๋“ฑ์žฅํ•œ

์ง€๋‚œ ์ˆ˜์‹ญ ๋…„ ๋™์•ˆ ๊ณผํ•™์€ ๋ณต์žกํ•œ ํ˜„์ƒ์„ ์‹œ๋ฎฌ๋ ˆ

์ด์…˜ํ•˜๋Š” ๋ฐฉ์‹์„ ์‚ฌ์šฉํ•˜ ๋‹ค. ์ œ4 ํŒจ๋Ÿฌ๋‹ค์ž„์€ ์ด

์ œ๋Š” ์ธก์ • ์žฅ์น˜์— ์˜ํ•ด ์–ป์–ด์ง„ ๋ฐ์ดํ„ฐ๋ฅผ ์†Œํ”„ํŠธ์›จ

์–ด๋กœ ๋ถ„์„ํ•˜์—ฌ ์ƒˆ๋กญ๊ฒŒ ์–ป์€ ์ง€์‹์„ ๋ฐœํ‘œํ•˜๋Š” ๋ฐฉ์‹

์œผ๋กœ ๋ฐ”๋€Œ์—ˆ์Œ์„ ์ฃผ์žฅํ•œ๋‹ค. ์‹ค์ œ ์šฐ์ฃผ๊ณผํ•™ ๋ถ„์•ผ์—

์žˆ์–ด ์—ฐ๊ตฌ์ž๋Š” ์ฒœ์ฒด๋ง์›๊ฒฝ์„ ์กฐ์ž‘ํ•˜๋ฉฐ ๋ฐ์ดํ„ฐ๋ฅผ

์–ป๋Š” ๊ฒƒ์ด ์•„๋‹ˆ๋ผ ์ด๋ฏธ ์–ป์–ด์ง„ ์ˆ˜์ฒœ ๊ฐœ ์ด์ƒ์˜ ์ฒœ

์ฒด ๊ด€์ธก ๋ฐ์ดํ„ฐ๋ฅผ ์†Œํ”„ํŠธ์›จ์–ด๋ฅผ ์ด์šฉํ•˜์—ฌ ๋ถ„์„ํ•˜

๊ณ  ์ด๋กœ๋ถ€ํ„ฐ ์ƒˆ๋กœ์šด ์ด๋ก ์„ ์ถ”์ถœํ•˜๋Š” ๋ฐฉ์‹์„ ์‚ฌ์šฉ

ํ•˜๊ณ  ์žˆ๋‹ค.

๋น… ๋ฐ์ดํ„ฐ์™€ ๊ณต๊ณต ๋ฐ์ดํ„ฐ ํ™œ์šฉ

Internet and Information Security 51

*์ถœ์ฒ˜: Manyika et al.(2011) ์žฌ๊ตฌ์„ฑ

<ํ‘œ 2> ๋งคํ‚จ์ง€์—์„œ ์ œ์‹œํ•œ ๋น… ๋ฐ์ดํ„ฐ ํ™œ์šฉ๋ถ„์•ผ

๋„๋ฉ”์ธ ๋ถ„์„ ์ƒ ๋ฐ์ดํ„ฐ ์˜ˆ์ƒํšจ๊ณผ

๋ฏธ๊ตญ์˜ ์˜๋ฃŒ์‚ฐ์—…์ œ์•ฝ์‚ฌ ์—ฐ๊ตฌ๊ฐœ๋ฐœ ๋ฐ์ดํ„ฐ, ํ™˜์ž ์น˜๋ฃŒ

/์ž„์ƒ ๋ฐ์ดํ„ฐ, ์˜๋ฃŒ์‚ฐ์—…์˜ ๋น„์šฉ ๋ฐ์ดํ„ฐ

์—ฐ๊ฐ„ $3์กฐ

์—ฐ๊ฐ„ 0.7% ์ƒ์‚ฐ์„ฑ ํ–ฅ์ƒ

์œ ๋Ÿฝ์˜ ๊ณต๊ณตํ–‰์ • ์ •๋ถ€์˜ ํ–‰์ •์—…๋ฌด์—์„œ ๋ฐœ์ƒํ•˜๋Š” ๋ฐ์ดํ„ฐ์—ฐ๊ฐ„ 2.5์กฐ

์—ฐ๊ฐ„ 0.5% ์ƒ์‚ฐ์„ฑ ํ–ฅ์ƒ

์†Œ๋งค์—… ๊ณ ๊ฐ์˜ ๊ฑฐ๋ž˜ ๋ฐ์ดํ„ฐ, ๊ตฌ๋งค๊ฒฝํ–ฅ$1์กฐ + ์„œ๋น„์Šค ์—…์ž ์ˆ˜์ต

$7์กฐ ์†Œ๋น„์ž ์ด์ต

์ œ์กฐ์—…๊ณ ๊ฐ ์ทจํ–ฅ ๋ฐ์ดํ„ฐ, ์ˆ˜์š” ์˜ˆ์ธก ๋ฐ์ดํ„ฐ,

์ œ์กฐ๊ณผ์ • ๋ฐ์ดํ„ฐ, ์„ผ์„œ ํ™œ์šฉ ๋ฐ์ดํ„ฐ

60% ๋งˆ์ง„ ์ฆ๊ฐ€

0.5~1.0% ์ƒ์‚ฐ์„ฑ ํ–ฅ์ƒ

๊ฐœ์ธ ์œ„์น˜ ๋ฐ์ดํ„ฐ ๊ฐœ์ธ, ์ฐจ๋Ÿ‰์˜ ์œ„์น˜ ๋ฐ์ดํ„ฐ๊ฐœ๋ฐœ ๋ฐ ์กฐ๋ฆฝ๋น„์šฉ 50% ๊ฐ์†Œ

์šด์ „์ž๋ณธ 7% ๊ฐ์†Œ

Page 53: nternet I Security - BIGBOOK

์ง ๊ทธ๋ ˆ์ด๋Š” ๋ฏธ๋ž˜์˜ ์—ฐ๊ตฌ๋ฐฉ์‹์€ ์ด๋Ÿฌํ•œ ๋ฐ์ดํ„ฐ

๋ถ„์„ ๊ธฐ๋ฒ•์ด ๋‹ค์–‘ํ•œ ๊ณผํ•™์—ฐ๊ตฌ์˜ ์ผ๋ฐ˜์ ์ธ ํ˜„์ƒ์ด

๋ฉฐ ๊ณผํ•™์ž๋Š” ๋ฐ์ดํ„ฐ๋ฅผ ๋‹ค๋ฃจ๋Š” ๋Šฅ๋ ฅ์„ ๊ฐ€์ ธ์•ผ ํ•˜๊ณ 

์ด๋ฅผ ์œ„ํ•ด์„œ๋Š” ๋ฐ์ดํ„ฐ ๋ถ„์„ ์†Œํ”„ํŠธ์›จ์–ด ๊ธฐ์ˆ ์„ ๋”

์šฑ ๋ฐœ์ „์‹œ์ผœ์•ผ ํ•จ์„ ๊ฐ•์กฐํ•œ๋‹ค. ๋˜ํ•œ ์ธํ„ฐ๋„ท์€ ๋‹จ

์ˆœํžˆ ์—ฐ๊ตฌ๊ฒฐ๊ณผ๋ฅผ ๋ฐฐํฌํ•˜๋ฉฐ ํ•„์š”ํ•œ ์ž๋ฃŒ๋ฅผ ๊ฒ€์ƒ‰ํ•˜

์—ฌ ์‚ฌ์šฉํ•˜๋Š” ์ˆ˜๋‹จ์œผ๋กœ ๊ทธ์น˜์ง€ ๋ง๊ณ , ๊ฒ€์ƒ‰๋œ ์—ฐ๊ตฌ

๋…ผ๋ฌธ์— ํฌํ•จ๋œ ์‹คํ—˜๊ฒฐ๊ณผ๋ฟ ์•„๋‹ˆ๋ผ ์‹คํ—˜์— ์‚ฌ์šฉ๋œ

๋ฐ์ดํ„ฐ๋ฅผ ํ•จ๊ป˜ ์ œ๊ณตํ•˜๋Š” ๋ฐฉ์‹์œผ๋กœ ๋ฐ”๋€Œ์–ด์•ผ ํ•จ์„

์—ญ์„คํ•˜๊ณ  ์žˆ๋‹ค. ์—ฐ๊ตฌ๊ฒฐ๊ณผ์˜ ๊ฒ€์ฆ ๋‚ด์ง€๋Š” ์ถ”๊ฐ€์ ์ธ

์—ฐ๊ตฌ๋Š” ์ด๋Ÿฌํ•œ ๋ฐ์ดํ„ฐ๋ฅผ ํ™œ์šฉํ•จ์œผ๋กœ์จ ๋ฐœ์ „ํ•  ์ˆ˜

์žˆ์œผ๋ฉฐ ์ด๋Ÿฌํ•œ ๋ฐฉ๋ฒ•์„ ์‚ฌ์šฉํ•  ๊ฒฝ์šฐ ๊ณผํ•™๊ธฐ์ˆ ์„ ํ•œ

๋‹จ๊ณ„ ๊ฒฉ์ƒํ•  ์ˆ˜ ์žˆ์„ ๊ฒƒ์ด๋ผ๊ณ  ์ฃผ์žฅํ•œ๋‹ค. ๋น… ๋ฐ์ด

ํ„ฐ๋Š” ๋งŽ์€ ์‹คํ—˜์„ ๊ฑฐ์ณ์•ผ ํ•˜๋Š” ์ƒ๋ช…๊ณผํ•™ ๋ถ„์•ผ์—์„œ

์šฐ์„ ์ ์œผ๋กœ ์ฃผ๋ชฉ๋ฐ›๊ณ  ์žˆ์œผ๋‚˜ ๋ชจ๋“  ๊ณผํ•™ ์—ฐ๊ตฌ์—์„œ

๋„์ž…๋˜๊ณ  ์žˆ๋‹ค.

์•ž์žฅ์—์„œ ์ •๋ณด ๋‚ด์ง€๋Š” ๋ฐ์ดํ„ฐ๊ฐ€ ๊ธ‰๊ฒฉํžˆ ์ฆ๊ฐ€ํ•˜

๊ณ  ์žˆ๊ณ  ์ด์— ํ•œ ์ฑ…์ด ํ•„์š”ํ•จ์„ ์ œ์‹œํ•˜ ์œผ๋ฉฐ

๋ฐ์ดํ„ฐ์˜ ์ฆ๊ฐ€์— ๋”ฐ๋ฅธ ๋ฌธ์ œ๋Š” ๋น… ๋ฐ์ดํ„ฐ๋ผ๋Š” ์šฉ์–ด

๋กœ ์ด์Šˆํ™”๋˜์—ˆ์Œ์„ ๋ณด ๋‹ค. ์œ„ํ‚คํ”ผ๋””์•„์˜ ๋น… ๋ฐ์ด

ํ„ฐ์˜ ์ •์˜๋Š” ๋งคํ‚จ์ง€ ๋ณด๊ณ ์„œ์˜ ์ •์˜์™€ ๊ฑฐ์˜ ๊ฐ™๋‹ค.1)

๊ฐ€ํŠธ๋„ˆ ๊ทธ๋ฃน์˜ ์ •์˜๋Š” ๋ฐ์ดํ„ฐ ๋ณผ๋ฅจ์˜ ์ฆ๊ฐ€, ๋ฐ์ด

ํ„ฐ ์ž…์ถœ๋ ฅ ์†๋„์˜ ์ฆ๊ฐ€, ๋ฐ์ดํ„ฐ์˜ ๋‹ค์–‘์„ฑ์˜ ์ฆ๊ฐ€

์˜ 3๊ฐ€์ง€ ํŠน์ง•์„ ๋น… ๋ฐ์ดํ„ฐ์˜ ๋ฌธ์ œ๋กœ ์ •์˜ํ•˜๊ณ  ์žˆ

๋‹ค(Gartner, 2011). ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ๋ฐ์ดํ„ฐ์˜ ํ™œ

์šฉ์ธก๋ฉด์„ ํ•จ๊ป˜ ๊ณ ๋ คํ•˜์—ฌ ํ˜„์žฌ ์ •๋ถ€์˜ ์ •๋ณดํ™”์™€ ๊ด€

๋ จ๋œ ๋น… ๋ฐ์ดํ„ฐ์˜ ์ •์˜์ธโ€˜ ์šฉ๋Ÿ‰ ๋ฐ์ดํ„ฐ๋ฅผ ํ™œ์šฉ

์ œ ๊ถŒ ์ œ ํ˜ธ

52 ๋…„ ์›”

[๊ทธ๋ฆผ 2] ์ œ4 ํŒจ๋Ÿฌ๋‹ค์ž„ ๊ฐœ๋… ์š”์•ฝ*์ถœ์ฒ˜: Hey et al.(2009)

1) ์œ„ํ‚คํ”ผ๋””์•„, http://en.wikipedia.org/wiki/Big_data

Page 54: nternet I Security - BIGBOOK

๋ถ„์„ํ•˜์—ฌ ๊ฐ€์น˜ ์žˆ๋Š” ์ •๋ณด๋ฅผ ์ถ”์ถœํ•˜๊ณ  ์ƒ์„ฑ๋œ ์ง€์‹

์„ ๋ฐ”ํƒ•์œผ๋กœ ๋Šฅ๋™์ ์œผ๋กœ ์‘ํ•˜๊ฑฐ๋‚˜ ๋ณ€ํ™”๋ฅผ ์˜ˆ์ธก

ํ•˜๊ธฐ ์œ„ํ•œ ์ •๋ณดํ™” ๊ธฐ์ˆ โ€™์„ ์‚ฌ์šฉํ•˜๊ธฐ๋กœ ํ•œ๋‹ค(๊ตญ๊ฐ€

์ •๋ณดํ™”์ „๋žต์œ„์›ํšŒ, 2011). ์ด ์ •์˜๋Š” ๋น… ๋ฐ์ดํ„ฐ

๋ฌธ์ œ๊ฐ€ ๋‹จ์ˆœํžˆ ์ƒˆ๋กœ์šด ๊ธฐ์ˆ  ๊ฐœ๋ฐœ์˜ ๋ฌธ์ œ๊ฐ€ ์•„๋‹ˆ๋ผ

์ •๋ณด์˜ ์—ฐ๊ณ„์˜ ๋ฌธ์ œ์ผ ์ˆ˜๋„ ์žˆ์Œ์„ ๋‚ดํฌํ•˜๊ณ  ์žˆ

๋‹ค. ๋น… ๋ฐ์ดํ„ฐ์™€ ๊ด€๋ จ๋œ ๊ฐ๊ตญ์˜ ํ™œ๋™๊ณผ ๊ณต๊ณต ๋ฐ์ด

ํ„ฐ ํ™œ์šฉ ์‚ฌ๋ก€๋ฅผ ์‚ดํŽด๋ณด์ž.

1. ๋ฏธ๊ตญ ๊ตญํ† ์•ˆ๋ณด๋ถ€์˜ ๋น„์ฃผ์–ผ ์• ๋„๋ฆฌํ‹ฑ์Šค

๋ฏธ๊ตญ์˜ ๊ฒฝ์šฐ 9.11 ํ…Œ๋Ÿฌ๋Š” ์ •์น˜์ ์œผ๋กœ ์ค‘์š”ํ•  ๋ฟ

์•„๋‹ˆ๋ผ ๋ฐ์ดํ„ฐ์˜ ์ค‘์š”์„ฑ์— ๊ฒฝ๊ฐ์‹ฌ์„ ๋ถˆ๋Ÿฌ์ผ์œผํ‚จ

์‚ฌ๊ฑด์ด๋‹ค. CIA, FBI์™€ ๊ฐ™์€ ์—ฌ๋Ÿฌ ์•ˆ๋ณด๋ฅผ ๋‹ด๋‹นํ•˜

๋Š” ๊ธฐ๊ด€์ด ์žˆ์—ˆ์ง€๋งŒ ํ…Œ๋Ÿฌ๋ฅผ ๋ฏธ์—ฐ์— ๋ฐฉ์ง€ํ•˜์ง€ ๋ชปํ•œ

๊ฒƒ์—๋Š” ์ •๋ณด ๋ถ„์„์ด ๋’ค๋”ฐ๋ฅด์ง€ ๋ชปํ•œ ๊ฒƒ์ด ํ•˜๋‚˜์˜

๋ฌธ์ œ์ ์œผ๋กœ ์ง€์ ๋˜์—ˆ๋‹ค. ํ…Œ๋Ÿฌ์˜ ์‚ฌํ›„ ์ฑ…์œผ๋กœ ๊ตญ

๋ฐฉ์„ฑ๊ณผ๋Š” ๋ณ„๋„๋กœ ๊ตญํ† ์•ˆ๋ณด๋ถ€๊ฐ€ ์‹ ์„ค๋˜์—ˆ์œผ๋ฉฐ ์ •

๋ณด ๋ถ„์„์˜ ๊ฒฐ๊ณผ๋ฅผ ๋งค์ผ ํŒŒ์•…ํ•  ์ˆ˜ ์žˆ๋„๋ก ํ•˜๋Š” ๊ฒƒ

์„ ์ž„๋ฌด ์ค‘ ํ•˜๋‚˜๋กœ ๋ถ€์—ฌํ•˜ ๋‹ค.

๊ตญํ† ์•ˆ๋ณด๋ถ€์˜ 2008๋…„ ์ง์ œ์— ๋”ฐ๋ฅด๋ฉด ์ •๋ณด ๋ถ„์„

(intelligence & analysis) ๋‹ด๋‹น ์ฐจ๊ด€๋ณด ์ง์ฑ…์„

๋‘๊ณ  ๋น„์ฃผ์–ผ ์• ๋„๋ฆฌํ‹ฑ์Šค(visual analytics) ๋ถ„์•ผ

์˜ ์—ฐ๊ตฌ๊ฐœ๋ฐœ ์ง€์›์„ ์—…๋ฌด์˜ ์ผ๋ถ€๋กœ ํ•˜๊ณ  ์žˆ๋‹ค

(Borja, 2008). ๋น„์ฃผ์–ผ ์• ๋„๋ฆฌํ‹ฑ์Šค๋Š” ๊ธฐ์กด์˜ ์ •

๋ณด ์‹œ๊ฐํ™”์— ๋ถ„์„์ ์ธ ์ด๋ก ์„ ๊ฒฐํ•ฉํ•œ ๊ฒƒ์œผ๋กœ ์ „๋ฐ˜

์ ์ธ ์‚ฌ๊ฑด์˜ ์ง„ํ–‰์ƒํ™ฉ์„ ๋ฐ”๋กœ ํŒŒ์•…ํ•  ์ˆ˜ ์žˆ๊ณ  ์ƒˆ

๋กœ์šด ์ฒ˜์— ๋”ฐ๋ผ ๊ฒฐ๊ณผ๊ฐ€ ์–ด๋–ป๊ฒŒ ๋ณ€ํ•˜๋Š”์ง€๋ฅผ ๋ณผ

์ˆ˜ ์žˆ๋Š” ์ธํ„ฐ๋ž™ํ‹ฐ๋ธŒ ๊ธฐ๋Šฅ์„ ์ง€์›ํ•œ๋‹ค. ์ด๋Ÿฌํ•œ ์‹œ

๊ฐํ™” ๋„๊ตฌ๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ๊ธฐ์กด์— ํŒŒ์•…ํ•˜์ง€ ๋ชปํ•˜๋˜ ์•ˆ

๋ณด์˜ ์œ„ํ˜‘์ด๋‚˜ ๊ฐ์‹œ ์ƒ์˜ ๋ณ€ํ™”๋ฅผ ์‰ฝ๊ฒŒ ์ธ์ง€ํ•˜๋„

๋ก ํ•˜์—ฌ ์ƒˆ๋กญ๊ฒŒ ๋ฐœ์ƒํ•  ๊ฐ€๋Šฅ์„ฑ์ด ์žˆ๋Š” ๋ฌธ์ œ์— ์ 

์‹œ์— ์ฒ˜ํ•˜๋Š” ๊ฒƒ์„ ๋ชฉํ‘œ๋กœ ์‚ผ๊ณ  ์žˆ๋‹ค(Lavigne &

Goulin, 2011). ๋ฏธ๊ตญ์˜ ์ด๋Ÿฌํ•œ ์›€์ง์ž„์€ ์•ˆ๋ณด ๋ถ„

์•ผ์—์„œ ๋ฏธ๊ตญ๊ณผ ํ–‰๋™์„ ๊ฐ™์ด ํ•˜๋Š” ์บ๋‚˜๋‹ค, ๊ตญ ๋“ฑ

๊ตญ๊ฐ€์—์„œ๋„ ์ „๊ฐœ๋˜๊ณ  ์žˆ๋‹ค.

๋ฏธ๊ตญ ์ •๋ถ€๋Š” ๋น„์ฃผ์–ผ ์• ๋„๋ฆฌํ‹ฑ์Šค ๋ถ„์•ผ์˜ ์—ฐ๊ตฌ๋ฅผ ๊ตฌ

์ฒดํ™”ํ•˜๊ธฐ ์œ„ํ•œ ๋ฐฉํŽธ์œผ๋กœ 2004๋…„ NVAC(National

Visualization and Analytics Center)๋ผ๋Š” ์—ฐ๊ตฌ์„ผ

ํ„ฐ๋ฅผ ์„ค๋ฆฝํ•˜ ์œผ๋ฉฐ ๋น„์ฃผ์–ผ ์• ๋„๋ฆฌํ‹ฑ์Šค ์—ฐ๊ตฌ์˜ ๋‚ด

์šฉ ๋ฐ ์ ‘๊ทผ๋ฐฉ์‹์— ํ•œ ์ €์„œ(Thomas & Cook,

2005)๋ฅผ ํ†ตํ•˜์—ฌ ๋ถ„์•ผ์˜ ํ•™๋ฌธ์  ์ค‘์š”์„ฑ์„ ์•Œ๋ ธ๋‹ค.

NVAC์˜ ๊ธฐ๋ณธ์ ์ธ ๋ชฉํ‘œ๋Š” ๊ตญ๊ฐ€์˜ ์•ˆ๋ณด๋ฌธ์ œ์˜ ๋ณต

์žก์„ฑ์„ ํ•ด๊ฒฐํ•˜๊ณ ์ž ํ•˜๋Š” ๊ฒƒ์ด๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์—ฐ๊ตฌ๊ฒฐ

๊ณผ๋Š” ๋ฐ์ดํ„ฐ ๋งˆ์ด๋‹๊ณผ ๋ถ„์„๊ฒฐ๊ณผ์˜ ์‹œ๊ฐํ™”์— ์žˆ๊ธฐ

๋•Œ๋ฌธ์— ์—ฐ๊ตฌ๊ฒฐ๊ณผ์˜ ์ƒ๋‹น๋ถ€๋ถ„์€ ๋ณต์žกํ•œ ๋ฐ์ดํ„ฐ๋ฅผ

๋ถ„์„ํ•˜๋Š” ๋ฏธ๊ตญ ์ •๋ถ€์˜ ๋ชจ๋“  ๋ถ€์„œ์—์„œ ํ™œ์šฉํ•  ์ˆ˜

์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ์‚ฌ๋ก€๋Š” ๊ตญ๋‚ด์˜ ์•ˆ๋ณด๋‚˜ ์žฌํ•ด ์ฑ… ๋ถ„

์•ผ์˜ ๋น… ๋ฐ์ดํ„ฐ ์ฒ˜๋ฆฌ์— ์ข‹์€ ์ฐธ๊ณ ๊ฐ€ ๋œ๋‹ค.

2. ์ผ๋ณธ์˜ ์ •๋ณดํญ๋ฐœ ํ”„๋กœ์ ํŠธ

์ผ๋ณธ์€ 9.11 ํ…Œ๋Ÿฌ์™€ ๊ฐ™์€ ์‚ฌ๊ฑด์„ ๊ฒช์ง€๋Š” ์•Š์•˜์ง€

๋งŒ ์ •๋ณด์˜ ํญ๋ฐœ์ ์ธ ์ฆ๊ฐ€๊ฐ€ ๋ฌธ์ œ๊ฐ€ ๋  ๊ฒƒ์ด๋ผ๋Š”

๊ฒƒ์„ ์ผ์ฐ ์ธ์ง€ํ•˜ ์œผ๋ฉฐ 2005๋…„๋ถ€ํ„ฐ 2011๋…„๊นŒ์ง€

6๋…„์˜ ๊ธฐ๊ฐ„ ๋™์•ˆโ€˜์ •๋ณดํญ๋ฐœ์— ๋น„ํ•œ ์ธํ”„๋ผ์ŠคํŠธ

๋Ÿญ์ฒ˜โ€™๋ผ๋Š” ๊ทœ๋ชจ ์—ฐ๊ตฌ ํ”„๋กœ์ ํŠธ๋ฅผ ์ถ”์ง„ํ•˜ ๋‹ค

(Kitsuregawa, 2007; Kitsuregawa & Nishida,

2010). ํ”„๋กœ์ ํŠธ๋Š” ํฌ๊ฒŒ ์„ธ ๊ทธ๋ฃน์œผ๋กœ ๋‚˜๋ˆ„์–ด ์ง„ํ–‰

๋˜์—ˆ๋‹ค. ํ”„๋กœ์ ํŠธ์˜ ์—ฐ๊ด€๊ตฌ์กฐ๋Š” [๊ทธ๋ฆผ 3]๊ณผ ๊ฐ™๋‹ค.

(1) ์ •๋ณดํญ๋ฐœ์‹œ ์˜์ •๋ณด๊ด€๋ฆฌ, ์œตํ•ฉ, ํ™œ์šฉ์„ ์œ„

ํ•œ ์ธํ”„๋ผ์ŠคํŠธ๋Ÿญ์ฒ˜(A01)

์ •๋ณดํญ๋ฐœ์ด ์ง„ํ–‰๋˜๋ฉด ๋Ÿ‰์˜ ์ •๋ณด๋ฅผ ๋‹ค๋ฃจ์–ด์•ผ

ํ•˜๋Š” ๊ฒ€์ƒ‰์˜ ๋ฌธ์ œ๊ฐ€ ๊ฐ€์žฅ ๋จผ์ € ์ œ๊ธฐ๋œ๋‹ค. ํ˜„์žฌ์˜

๊ฒ€์ƒ‰๋ฐฉ์‹์—์„œ๋Š” ๊ฒ€์ƒ‰์–ด์™€ ๊ฐ€์žฅ ๊ด€๋ จ์ด ๋†’๋‹ค๊ณ  ์ƒ

๊ฐ๋˜๋Š” 10๊ฐœ ๋‚ด์™ธ์˜ ๋ฌธ์„œ๋งŒ์„ ๋ณด์—ฌ์ฃผ๊ธฐ ๋•Œ๋ฌธ์— ๋‹ค

์ˆ˜์˜ ์˜๊ฒฌ๋งŒ ์ œ์‹œ๋˜๊ณ  ์˜๋ฏธ ์žˆ๋Š” ์†Œ์ˆ˜์˜ ์˜๊ฒฌ์„

ํ™•์ธํ•  ์ˆ˜ ์—†์œผ๋ฉฐ ์ด๋Ÿฌํ•œ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•  ์ˆ˜ ์žˆ๋Š”

์ƒˆ๋กœ์šด ๊ฒ€์ƒ‰์—”์ง„์„ ๊ฐœ๋ฐœํ•œ๋‹ค.

๋น… ๋ฐ์ดํ„ฐ์™€ ๊ณต๊ณต ๋ฐ์ดํ„ฐ ํ™œ์šฉ

Internet and Information Security 53

Page 55: nternet I Security - BIGBOOK

(2) ์ •๋ณดํญ๋ฐœ ๋น„IT์‹œ์Šคํ…œ์˜์ธํ”„๋ผ์ŠคํŠธ๋Ÿญ์ฒ˜(A02)

์ •๋ณดํญ๋ฐœ์ด ์ง„ํ–‰๋˜๋ฉด ๊ทœ๋ชจ์˜ ๋ฐ์ดํ„ฐ๋ฅผ ์ €์žฅ

ํ•  IT์‹œ์Šคํ…œ์„ ํ•„์š”๋กœ ํ•œ๋‹ค. ์ด ๊ทธ๋ฃน์€ ์šฉ๋Ÿ‰ ๋ฐ

์ดํ„ฐ ์ €์žฅ ์‹œ์Šคํ…œ ์ •๋ณด๋ฅผ ๋ชจ๋‹ˆํ„ฐ๋งํ•˜๋ฉด์„œ ๊ด€๋ฆฌํ• 

์ˆ˜ ์žˆ๋Š” ๊ทธ๋ฆฌ๋“œ ์‹œ์Šคํ…œ์„ ์—ฐ๊ตฌํ•œ๋‹ค. ์‹œ์Šคํ…œ์˜ ๋ฌธ

์ œ๋Š” ์ธ๊ฐ„์˜ ๊ฐœ์ž… ์—†์ด ์ž๋™์ ์œผ๋กœ ์ปดํ“จํŒ… ์ž์›์„

์žฌ์กฐ์ •ํ•˜๋Š” ๋ฐฉ์‹์œผ๋กœ ์œ ์ง€ํ•˜๋„๋ก ํ•œ๋‹ค.

(3) ์ •๋ณดํญ๋ฐœ์‹œ ์˜ ํœด๋จผ ์ปค๋ฎค๋‹ˆ์ผ€์ด์…˜ ์ธํ”„๋ผ

์ŠคํŠธ๋Ÿญ์ฒ˜(A03)

์ด ๊ทธ๋ฃน์€ ์ •๋ณด์˜ ๋ณต์žก์— ํ•ด ์ธ๊ฐ„์ด ์–ด๋–ป๊ฒŒ

์ฒ˜ํ•  ์ˆ˜ ์žˆ๋Š”๊ฐ€๋ฅผ ์—ฐ๊ตฌํ•œ๋‹ค. ๊ธฐ๋ณธ์ ์œผ๋กœ ๋ฉ€ํ‹ฐ๋ชจ

๋‹ฌ ์ƒํ˜ธ์ž‘์šฉ์„ ํ†ตํ•˜์—ฌ ์ •๋ณด์‹œ์Šคํ…œ๊ณผ ์ธ๊ฐ„๊ณผ์˜ ์ •

๋ณด์˜ ๊ฐญ์„ ์ค„์ด๋ ค๋Š” ๋…ธ๋ ฅ๊ณผ ๋ฏธ๋ž˜์˜ ์ผ์ƒ์ƒํ™œ์—์„œ

๋“ฑ์žฅํ•  ๋กœ๋ด‡๊ณผ์˜ ์ƒํ˜ธ์ž‘์šฉ ์—ฐ๊ตฌ๋ฅผ ํฌํ•จํ•œ๋‹ค.

(4) ์ง€์‹๊ธฐ๋ฐ˜์‚ฌํšŒ์˜๊ฑฐ๋ฒ„๋„Œ์Šค ๋ฌธ์ œ(B01)

๊ณตํ•™์ž๋ณด๋‹ค๋Š” ์ธ๋ฌธ์‚ฌํšŒ๊ณผํ•™์ž์˜ ์ฐธ์—ฌ๋กœ ์ง„ํ–‰

๋˜์—ˆ์œผ๋ฉฐ ๊ธฐ์ˆ ์˜ ์—ญ๊ธฐ๋Šฅ ๋“ฑ ์‚ฌํšŒ์— ๋ฏธ์น˜๋Š” ํŒŒ์žฅ์ด

์—ฐ๊ตฌ์˜ ์ƒ์ด ๋œ๋‹ค. ํŠนํžˆ ๊ฑด๊ฐ•์ •๋ณด์™€ ์š”์–‘์ง€์›

๋“ฑ ์ผ๋ณธ ํŠน์œ ์˜ ๊ณ ๋ น์ž ์‚ฌํšŒ์— ํ•œ ์‚ฌํšŒ์  ๋ฌธ์ œ

๋ฅผ ๋‹ค์ˆ˜ ํฌํ•จํ•˜๊ณ  ์žˆ๋‹ค.

3. ๋งํฌ๋“œ ๋ฐ์ดํ„ฐ

๋น… ๋ฐ์ดํ„ฐ ๋ฌธ์ œ๋ฅผ ๋‹จ์ˆœํžˆ ์šฉ๋Ÿ‰ ๋ฐ์ดํ„ฐ์˜ ๋ฌธ์ œ

๋กœ ์ •์˜ํ•  ๊ฒฝ์šฐ ๋งํฌ๋“œ ๋ฐ์ดํ„ฐ์™€์˜ ์—ฐ๊ด€์„ฑ์€ ๋งŽ์ง€

์•Š๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ํ˜„ ๊ธฐ์ˆ ๋กœ ์ฒ˜๋ฆฌํ•  ์ˆ˜ ์—†๋Š” ์šฉ๋Ÿ‰์€ ์•„

๋‹ˆ๋‚˜ ์–ด๋– ํ•œ ์ด์œ ์—์„œ ์—ฐ๊ณ„๊ฐ€ ๋ถˆ๊ฐ€๋Šฅํ•˜์—ฌ ๋ถ„์„์ด

๋ถˆ๊ฐ€๋Šฅํ•œ ๋ฐ์ดํ„ฐ๊ฐ€ ํฐ ๋น„์ค‘์„ ์ฐจ์ง€ํ•˜๊ณ  ์žˆ๋Š” ์‹ค์ •

์„ ๊ฐ์•ˆํ•œ๋‹ค๋ฉด ๋งํฌ๋“œ ๋ฐ์ดํ„ฐ๋Š” ๋น… ๋ฐ์ดํ„ฐ์˜ ํ•˜๋‚˜

์˜ ํ•ด๊ฒฐ์ฑ…์œผ๋กœ ์ •์˜ํ•  ์ˆ˜ ์žˆ๋‹ค. ์ธํ„ฐ๋„ท์— ์˜ํ•œ ์ •

๋ณด์ „๋‹ฌ์€ ๋ถ€๋ถ„ ํ…์ŠคํŠธ ๊ธฐ๋ฐ˜์˜ ์›น ๋ฌธ์„œํ˜•ํƒœ๋กœ ์ด

๋ฃจ์–ด์ ธ ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ํ…์ŠคํŠธ ๋ฌธ์„œ๋Š” ์ผ๋ฐ˜ ์‚ฌ์šฉ์ž

๊ฐ€ ๋ณด๊ธฐ ์ ํ•ฉํ•˜๋„๋ก ๋งŒ๋“ค์–ด์ง„ ๊ฒƒ์œผ๋กœ ์ •ํ˜•ํ™”๋œ ๋ฐ

์ดํ„ฐ๋ฒ ์ด์Šค ์ฒ˜๋ฆฌ๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ํ•˜๋Š” ์ปดํ“จํ„ฐ์™€ ๊ฐ™์€

๊ธฐ๊ณ„๋ฅผ ์ด์šฉํ•œ ๋ถ„์„์€ ๋งค์šฐ ์–ด๋ ต๋‹ค. ๋งค์‹œ์—…

(mashup) ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์„ ๊ฐœ๋ฐœํ•˜๊ธฐ ์œ„ํ•ด ์ด๋Ÿฌํ•œ

์ œ ๊ถŒ ์ œ ํ˜ธ

54 ๋…„ ์›”

[๊ทธ๋ฆผ 3] ์ •๋ณดํญ๋ฐœ ํ”„๋กœ์ ํŠธ ๊ฐœ๋…๋„

*์ถœ์ฒ˜: Kitsuregawa(2007) ์žฌ๊ตฌ์„ฑ

Page 56: nternet I Security - BIGBOOK

๋ฐ์ดํ„ฐ๋ฅผ ๋ถ€๋ถ„์ ์œผ๋กœ ํ™œ์šฉํ•œ ์˜ˆ๋Š” ์žˆ์œผ๋‚˜ ๊ทผ๋ณธ์ 

์ธ ๋ฌธ์ œ ํ•ด๊ฒฐ์„ ์œ„ํ•ด์„œ๋Š” HTML๊ณผ ๊ฐ™์€ ์ธํ„ฐ๋„ท

ํ”„๋กœํ† ์ฝœ์„ ์ด์šฉํ•œ ๋ฐ์ดํ„ฐ์˜ ์—ฐ๊ฒฐ์ด ๊ฐ€๋Šฅํ•˜๋„๋ก

์›น์˜ ๋ณ€๊ฒฝ์ด ํ•„์š”ํ•˜๋‹ค.

์ปดํ“จํ„ฐ์™€ ๊ฐ™์€ ๊ธฐ๊ณ„ ์Šค์Šค๋กœ ์›น์— ์ ‘๊ทผํ•˜์—ฌ ์ž๋ฃŒ

๋ฅผ ๋ถ„์„ํ•  ์ˆ˜ ์žˆ๋„๋ก ํ•˜๋Š” ๊ธฐ์ˆ ์€ ์‹œ๋งจํ‹ฑ ์›น์ด๋ผ

๋Š” ์ด๋ฆ„์œผ๋กœ ์‹œ์ž‘๋˜์—ˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์‹œ๋งจํ‹ฑ ์›น์˜ ์—ฐ

๊ตฌ์ž์˜ ์˜๋„์™€๋Š” ๋‹ฌ๋ฆฌ ์ธํ„ฐ๋„ท ์ปค๋ฎค๋‹ˆํ‹ฐ๊ฐ€ ์ด๋ฅผ ์ฑ„

ํƒํ•˜์ง€ ์•Š์•„ ์ œ ๋กœ ํ™œ์šฉ๋˜์ง€ ๋ชปํ•˜ ๋‹ค. ์›น์˜ ์ฐฝ

์‹œ์ž๋ผ๊ณ ๋„ ํ•  ์ˆ˜ ์žˆ๋Š” ํŒ€ ๋ฒ„๋„ˆ์Šค๋ฆฌ๋Š”โ€˜Raw

Data Nowโ€™๋ผ๋Š” ์—ฐ์„ค์„ ํ†ตํ•˜์—ฌ ๊ธฐ์กด์˜ ์ธํ„ฐ๋„ท์„

๋ฌธ์„œ์˜ ์—ฐ๊ฒฐ๋ฟ ์•„๋‹ˆ๋ผ ๋ฐ์ดํ„ฐ์˜ ์—ฐ๊ฒฐ์„ ๊ฐ€๋Šฅํ•˜๊ฒŒ

ํ•˜์ž๋Š” ๋งํฌ๋“œ ๋ฐ์ดํ„ฐ(linked data) ๋ณด๊ธ‰์„ ๊ฐ•์กฐ

ํ•˜ ๋‹ค(Berners-Lee, 2009). ์ด๋Ÿฌํ•œ ๋ฐ์ดํ„ฐ ์—ฐ

๊ฒฐ ํ”„๋กœ์ ํŠธ๋Š” 2007๋…„ 1์›” W3C์— ์˜ํ•ด ๋ฐœํ‘œ๋œ

ํ›„ ๋งŽ์€ ์—ฐ๊ตฌ์ž์™€ ๊ธฐ๊ด€์˜ ์ง€์›์„ ๋ฐ›์•„ ๊ธ‰์†ํžˆ ํ™•

์‚ฐ๋˜๊ณ  ์žˆ๋‹ค(Bizer et al., 2009).

๋งํฌ๋“œ ๋ฐ์ดํ„ฐ์˜ ์žฅ์ ์„ ์˜ˆ๋ฅผ ๋“ค์–ด ๋ณด์ž. ํ‰์ฐฝ

๋™๊ณ„์˜ฌ๋ฆผํ”ฝ์— ํ•œ ์ •๋ณด๋ฅผ ์†Œ๊ฐœํ•˜๋Š” ์›น์‚ฌ์ดํŠธ๋ฅผ

๋งŒ๋“ ๋‹ค๊ณ  ๊ฐ€์ •ํ•œ๋‹ค. ๋‚ด์šฉ ์ค‘์— ๊น€์—ฐ์•„ ์„ ์ˆ˜๋ฅผ ์†Œ

๊ฐœํ•˜๋Š” ํŽ˜์ด์ง€๋ฅผ ๊ฐœ์„คํ•ด์•ผ ํ•˜๋Š”๋ฐ ๊น€์—ฐ์•„ ์„ ์ˆ˜์—

ํ•œ ์†Œ๊ฐœ๋‚ด์šฉ์€ ๊น€์—ฐ์•„ ์„ ์ˆ˜๊ฐ€ ์ƒˆ๋กœ์šด ๊ฒฝ๊ธฐ์— ์ถœ

์ „ํ•  ๋•Œ๋งˆ๋‹ค ๋ฐ”๊พธ์–ด์•ผ ํ•œ๋‹ค. ๋งค๋ฒˆ ์ด๋Ÿฌํ•œ ๋‚ด์šฉ์„

ํ™•์ธํ•˜๊ณ  ์ˆ˜์ •ํ•˜๋Š” ์‹  ์œ„ํ‚คํ”ผ๋””์•„์˜ ๊น€์—ฐ์•„๋ผ

๋Š” ๋ฌธ์„œ์™€ ๋งํฌ์‹œํ‚ค๋ฉด ์ƒˆ๋กœ์šด ๊ฒฝ๊ธฐ๊ฐ€ ์ง„ํ–‰๋  ๊ฒฝ์šฐ

๋ฌธ์„œ๋ฅผ ์ˆ˜์ •ํ•˜๋Š” ๋ฒˆ๊ฑฐ๋กœ์›€์„ ํ”ผํ•  ์ˆ˜ ์žˆ๋‹ค. ์ด๋Š”

์œ„ํ‚คํ”ผ๋””์•„์—์„œ ๋งํฌ๋“œ ๋ฐ์ดํ„ฐ๋ฅผ ์ œ๊ณตํ•˜๊ธฐ์— ๊ฐ€

๋Šฅํ•œ ๊ฒƒ์ด๋‹ค.

๋งํฌ๋“œ ๋ฐ์ดํ„ฐ๋Š” ํŠธ๋ฆฌํ”Œ์ด๋ผ๋Š” ์—ฐ๊ฒฐ ๊ตฌ์กฐ๋ฅผ ํ†ต

ํ•ด ๊ตฌํ˜„๋œ๋‹ค. ์˜ˆ๋ฅผ ๋“ค์–ด ์šฐ๋ฆฌ๋‚˜๋ผ ์ง€์—ญ์— ํ•œ ๋ฐ

์ดํ„ฐ๋Š” ํ•œ๋ฏผ๊ตญ ์ง€์—ญ์ •๋ณด ๋ฐ์ดํ„ฐ์„ธํŠธ์— ๋ณด๊ด€๋˜

์–ด ์žˆ๊ณ  ์˜ฌ๋ฆผํ”ฝ ๊ฐœ์ตœ๋„์‹œ๋Š” ์˜ฌ๋ฆผํ”ฝ ๋ฐ์ดํ„ฐ ์„ธํŠธ์—

ํฌํ•จ๋˜์–ด ์žˆ์„ ๊ฒฝ์šฐโ€œ ํ•œ๋ฏผ๊ตญ-๋„์‹œ์ด๋‹ค-ํ‰์ฐฝโ€

์ด๋ผ๋Š” ๊ด€๊ณ„์™€โ€œ์˜ฌ๋ฆผํ”ฝ-๊ฐœ์ตœ๋˜์—ˆ๋‹ค-ํ‰์ฐฝโ€์ด๋ผ๋Š”

๋‘ ๊ฐœ์˜ ํŠธ๋ฆฌํ”Œ ๊ตฌ์กฐ๋ฅผ ํ†ตํ•ด ํ‰์ฐฝ์— ๊ด€ํ•œ ์ •๋ณด๋ฅผ

์ฐพ๊ณ ์ž ํ•  ๊ฒฝ์šฐ ํ•œ๋ฏผ๊ตญ์˜ ์ง€์—ญ์ •๋ณด ๋ฐ์ดํ„ฐ์„ธํŠธ

์— ๊ธฐ๋ก๋œ ๋‚ด์šฉ์„ ์ด์šฉํ•  ์ˆ˜ ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ํŠธ๋ฆฌํ”Œ

๋ฐฉ์‹์˜ ์—ฐ๊ณ„๋Š” ๋งํฌ๋“œ ๋ฐ์ดํ„ฐ ๊ตฌ์กฐ์˜ ํ•ต์‹ฌ์ด๋‹ค.

2010๋…„ 11์›” ํ˜„์žฌ 285์–ต ๊ฐœ์˜ ํŠธ๋ฆฌํ”Œ์ด ๋ณด๊ณ ๋˜์—ˆ

์œผ๋ฉฐ ๊ธ‰์†ํžˆ ์ฆ๊ฐ€ํ•˜๊ณ  ์žˆ์Œ์„ ์•Œ ์ˆ˜ ์žˆ๋‹ค. ๋งํฌ๋“œ

๋ฐ์ดํ„ฐ๋Š” ์ •๋ณด์˜ ๋ณต์žก์„ฑ์„ ํ•ด๊ฒฐํ•˜๊ณ  ๋ฐ์ดํ„ฐ์— ์ง

์ ‘ ์ ‘๊ทผํ•˜์—ฌ ๋ฐ์ดํ„ฐ๋ฅผ ์•Œ๊ธฐ ์‰ฌ์šด ํ˜•ํƒœ๋กœ ์ œ๊ณตํ• 

์ˆ˜ ์žˆ๋„๋ก ํ•˜๋Š”๋ฐ ๊ผญ ํ•„์š”ํ•œ ๊ธฐ๋Šฅ์ด๋‹ค. ์•ž์„  ๋น„์ฃผ

์–ผ ์• ๋„๋ฆฌํ‹ฑ์Šค๊ฐ€ ์ •๋ณด์˜ ๋ถ„์„๊ณผ ์‹œ๊ฐํ™”๋ฅผ ๊ฐ•์กฐํ•˜

๊ณ  ์žˆ๋‹ค๋ฉด ๋งํฌ๋“œ ๋ฐ์ดํ„ฐ๋Š” ์ธํ„ฐ๋„ท์— ์กด์žฌํ•˜๋Š” ๋ชจ

๋“  ๋ฐ์ดํ„ฐ์„ธํŠธ๋ฅผ ํšจ์œจ์ ์œผ๋กœ ์—ฐ๊ฒฐํ•˜์—ฌ ๋ถ„์„์„ ๊ฐ€

๋Šฅํ•˜๊ฒŒ ํ•˜๋Š” ์ธํ”„๋ผ๋กœ ๋ณผ ์ˆ˜ ์žˆ๋‹ค.

[๊ทธ๋ฆผ 4]๋Š” 2010๋…„ 11์›” ํ˜„์žฌ ๋งํฌ๋“œ ๋ฐ์ดํ„ฐ๋ฅผ

์ด์šฉํ•˜์—ฌ ์—ฐ๊ฒฐ๋œ ์ฃผ์š” ์›น ์‚ฌ์ดํŠธ๋ฅผ ๋ณด์—ฌ์ฃผ๊ณ  ์žˆ

๋‹ค. ์ค‘์‹ฌ์—๋Š” ๋งํฌ๋“œ ๋ฐ์ดํ„ฐ์˜ ์ถœ๋ฐœ ์‚ฌ์ดํŠธ์ธ

DBPedia๊ฐ€ ๋งŽ์€ ํƒ€ ์‚ฌ์ดํŠธ์™€ ์—ฐ๊ฒฐ๋œ ๊ฒƒ์„ ๋ณผ ์ˆ˜

์žˆ๋‹ค. ๋งํฌ๋“œ ๋ฐ์ดํ„ฐ๋ฅผ ํ™œ์šฉ๋˜๋Š” ๋„๋ฉ”์ธ์— ํ•œ

ํ†ต๊ณ„๋Š” <ํ‘œ 3>๊ณผ ๊ฐ™๋‹ค. ์ •๋ถ€ ๊ด€๋ จ ์ •๋ณด๊ฐ€ ๊ฐ€์žฅ ๋งŽ

์€ ํŠธ๋ฆฌํ”Œ ์ •๋ณด๋ฅผ ์ฐจ์ง€ํ•˜๊ณ  ์žˆ์œผ๋ฉฐ ์‹ค์ œ ์‚ฌ์šฉ์€

์ƒ๋ช…๊ณผํ•™ ๋ถ„์•ผ์—์„œ ๊ฐ€์žฅ ํ™œ๋ฐœํžˆ ์ „๊ฐœ๋˜๊ณ  ์žˆ์Œ์„

๋ณผ ์ˆ˜ ์žˆ๋‹ค.

4. ๊ณต๊ณต ๋ฐ์ดํ„ฐ ํ™œ์šฉ

๊ณต๊ณต ๋ฐ์ดํ„ฐ(public data)๋Š” ์ •๋ถ€ ๋˜๋Š” ๊ณต๊ณต๊ธฐ

๊ด€์ด ๋ณด์œ ํ•˜๊ณ  ์žˆ๋Š” ๋ฐ์ดํ„ฐ๋ฅผ ๋งํ•œ๋‹ค. ๊ณต๊ณต๊ธฐ๊ด€์˜

์—…๋ฌด๊ณผ์ •์—์„œ ์–ป์–ด์ง„ ๋ฐ์ดํ„ฐ๋“ค๋กœ ๋ฐ์ดํ„ฐ ์ค‘์—์„œ

์ƒ ์ ์œผ๋กœ ๊ฐ€์น˜๊ฐ€ ๋†’์œผ๋ฉฐ, ํ˜„์žฌ ๊ธฐ์ˆ ๋กœ ์ฒ˜๋ฆฌํ•˜๊ธฐ

์–ด๋ ค์šธ ์ •๋„์˜ ์šฉ๋Ÿ‰ ๋ฐ์ดํ„ฐ๋Š” ์•„๋‹ˆ๋‚˜ ๋ถ„์„์˜ ์šฉ

๋„๋กœ ํ™œ์šฉ๋˜์ง€ ๋ชปํ•˜๊ณ  ์žˆ๋‹ค. ์•ž์„œ III์žฅ์˜ ์‹œ์ž‘์—

๋น… ๋ฐ์ดํ„ฐ๋ฅผ ๋‹จ์ˆœํ•œ ๋ฐ์ดํ„ฐ ํฌ๊ธฐ์˜ ๋ฌธ์ œ๊ฐ€ ์•„๋‹ˆ๋ผ

๋ถ„์„์˜ ๋ฌธ์ œ๋กœ ์ •์˜ํ•œ ๊ฒƒ์€ ๊ณต๊ณต ๋ฐ์ดํ„ฐ์˜ ๋ฌธ์ œ๋ฅผ

๋ถ€๊ฐ์‹œํ‚ค๊ธฐ ์œ„ํ•œ ๊ฒƒ์ด๋‹ค. ๋ฏธ๊ตญ, ๊ตญ ๋“ฑ ์„ ์ง„๊ตญ์—

์„œ๋Š” ๊ณต๊ณต ๋ฐ์ดํ„ฐ์˜ ํ™œ์šฉ์ด ์ •๋ถ€์˜ ๋ฏผ ์„œ๋น„์Šค์™€

์ง๊ฒฐ๋˜์–ด ์žˆ์Œ์„ ์ธ์ง€ํ•˜๊ณ  ๊ณต๊ณต ๋ฐ์ดํ„ฐ์˜ ํ™œ์šฉ์„

๋น… ๋ฐ์ดํ„ฐ์™€ ๊ณต๊ณต ๋ฐ์ดํ„ฐ ํ™œ์šฉ

Internet and Information Security 55

Page 57: nternet I Security - BIGBOOK

์ •๋ถ€ ์ •์ฑ…์œผ๋กœ ์ถ”์ง„ํ•˜๊ณ  ์žˆ๋‹ค.

ํŒ€ ๋ฒ„๋„ˆ์Šค๋ฆฌ๋Š” ์ •๋ถ€๊ฐ€ ๊ฐ–๊ณ  ์žˆ๋Š” ๋ฐ์ดํ„ฐ๋ฅผ ๋งํฌ

๋“œ ๋ฐ์ดํ„ฐ ๋ฐฉ์‹์œผ๋กœ ์›น์— ์ œ๊ณตํ•ด์•ผ ํ•œ๋‹ค๋Š” ๊ฒƒ์„

๊ฐ•์กฐํ•˜ ๋‹ค(Berners-Lee, 2009). ์ด๋ฏธ ์ •๋ถ€๊ฐ€

๊ฐ–๊ณ  ์žˆ๋Š” ๋ฐ์ดํ„ฐ๋ฅผ ๊ณต๊ฐœํ•˜์—ฌ ํˆฌ๋ช…ํ•œ ์ •๋ถ€๋ฅผ ๋งŒ๋“ค

์–ด์•ผ ํ•œ๋‹ค๋Š” ์ƒ๊ฐ์€ ๋ฏธ๊ตญ์˜ ์˜ค๋ฐ”๋งˆ ํ†ต๋ น์˜ ์„ ๊ฑฐ

๊ณต์•ฝ์—๋„ ํฌํ•จ๋  ์ •๋„๋กœ ๋ฏธ ๊ตญ๋ฏผ์˜ ์ง€์ง€๋ฅผ ์–ป์€ ์ •

์ฑ…์ด๋‹ค. ์ผ๋ฐ˜์ ์œผ๋กœ ๋ฐ์ดํ„ฐ์˜ ๊ณต๊ฐœ์— ํ•ด ๋ถ€์ฒ˜ ๋‚ด

์—์„œ๋Š” ์ƒ๋‹นํ•œ ๊ฑฐ๋ถ€๊ฐ์„ ๊ฐ–๊ณ  ์žˆ์–ด ์ด๋ฅผ ๊ฐ€๋Šฅ์ผ€ ํ•˜

๊ธฐ ์œ„ํ•ด์„œ๋Š” ์ตœ๊ณ  ์ฑ…์ž„์ž์˜ ์ •์ฑ…์˜์ง€๊ฐ€ ํ•„์š”ํ•˜๋‹ค

(Robinson et al., 2009). ๋ฏธ๊ตญ์˜ ์˜ค๋ฐ”๋งˆ ํ†ต๋ น์€

์ž์‹ ์˜ ์„ ๊ฑฐ๊ณต์•ฝ ๋กœ 2009๋…„ ์ •๋ถ€์˜ ์ •๋ณด๋ฅผ ๊ณต๊ฐœ

์ œ ๊ถŒ ์ œ ํ˜ธ

56 ๋…„ ์›”

*์ถœ์ฒ˜: Heath & Bizer(2011)

<ํ‘œ 3> ๋งํฌ๋“œ ๋ฐ์ดํ„ฐ์˜ ์—ฐ๊ฒฐ ํ˜„ํ™ฉ

๋„๋ฉ”์ธ ๋ฐ์ดํ„ฐ ์„ธํŠธ ํŠธ๋ฆฌํ”Œ(๋‹จ์œ„: ์ฒœ) % ๋งํฌ(๋‹จ์œ„: ์ฒœ) %

๋ฏธ๋””์–ด 26 2,454,299 8.59 50,377 12.73

์ง€๋ฆฌ์ •๋ณด 16 5,907,260 20.68 16,539 4.18

์ •๋ถ€ 26 11,630,305 40.72 17,944 4.53

์ถœํŒ 68 2,307,901 8.08 77,995 19.70

๋„๋ฉ”์ธ ๊ฐ„ ์—ฐ๊ฒฐ 22 3,541,130 12.40 29,121 7.36

์ƒ๋ช…๊ณผํ•™ 42 2,664,119 9.33 200,418 50.64

์‚ฌ์šฉ์ž ์ฝ˜ํ…์ธ  7 57,463 0.20 3,402 0.86

๊ณ„ 28,562,479 395,756

[๊ทธ๋ฆผ 4] 2010๋…„ 11์›”์˜ ๋งํฌ๋“œ ๋ฐ์ดํ„ฐ ์—ฐ๊ฒฐ ๊ตฌ์กฐ

*์ถœ์ฒ˜: Heath & Bizer(2011)

Page 58: nternet I Security - BIGBOOK

ํ•˜๋Š” ๋ฏธ ์—ฐ๋ฐฉ์ •๋ถ€์˜ CIO(Chief Information

Officer)์— ๋น„๋ฒก ์ฟค๋“œ๋ผ๋ฅผ ์ž„๋ช…ํ•˜์—ฌ data.gov๋ผ

๋Š” ์›น ์‚ฌ์ดํŠธ๋ฅผ ๊ตฌ์ถ•ํ•˜๋„๋ก ํ•˜๊ณ  ์ด๋ฅผ ํ†ตํ•˜์—ฌ ์ •

๋ถ€ ๋ฐ์ดํ„ฐ๋ฅผ ๊ณต๊ฐœํ•˜๋„๋ก ํ•˜ ๋‹ค. ๊ตญ ์—ญ์‹œ ๊ฐ™์€

์‹œ๊ธฐ์— data.go.uk๋ฅผ ๊ธฐํšํ•˜๊ณ  ํŒ€ ๋ฒ„๋„ˆ์Šค๋ฆฌ๋ฅผ ์ฑ…

์ž„์ž๋กœ ๊ธฐ์šฉํ•˜ ๋‹ค. ํŒ€ ๋ฒ„๋„ˆ์Šค๋ฆฌ๋Š” ์›น์— ํ•œ ํ™•

๊ณ ํ•œ ๋ฐฉํ–ฅ์„ฑ๊ณผ ๊ฐœ์ธ์ ์ธ ์ธ์ง€๋„๋ฅผ ๋ฐ”ํƒ•์œผ๋กœ ์ถœ๋ฐœ

์€ ๋ฏธ๊ตญ๋ณด๋‹ค ๋Šฆ์—ˆ์ง€๋งŒ ๋ฏธ๊ตญ๋ณด๋‹ค ์•ž์„  ์ˆ˜์ค€์˜ ๊ณต๊ณต

์ •๋ณด๋ฅผ ์ œ๊ณตํ•˜๊ณ  ์žˆ์–ด ๊ณต๊ณต ๋ฐ์ดํ„ฐ์˜ ๊ณต๊ฐœ๋ฅผ ์ถ”์ง„

ํ•˜๊ณ ์ž ํ•˜๋Š” ํƒ€ ์ •๋ถ€์˜ ์ฐธ๊ณ ๋ชจ๋ธ์ด ๋˜๊ณ  ์žˆ๋‹ค.

ํŒ€ ๋ฒ„๋„ˆ์Šค๋ฆฌ๋Š” ๋งํฌ๋“œ ๋ฐ์ดํ„ฐ๊ฐ€ ์ œ ๋กœ ํ™œ์šฉ๋˜

๊ธฐ ์œ„ํ•ด์„œ๋Š” ๋ฐ์ดํ„ฐ๋ฅผ ์–ด๋–ป๊ฒŒ ์ œ๊ณตํ•ด์•ผ ํ•˜๋Š”์ง€์—

ํ•œ ๊ฐ€์ด๋“œ๋ผ์ธ์„ ์ œ์‹œํ•œ ๋ฐ” ์žˆ๋‹ค. ๋งํฌ๋“œ ๋ฐ์ด

ํ„ฐ์˜ ๋ณธ์งˆ์„ ์ œ ๋กœ ์ดํ•ดํ•˜๊ณ  ๋ฐ์ดํ„ฐ๋ฅผ ๊ตฌํ˜„ํ–ˆ๋Š”

๊ฐ€์— ๋”ฐ๋ผ <ํ‘œ 4>์™€ ๊ฐ™์ด ์ œ๊ณต๋˜๋Š” ๋ฐ์ดํ„ฐ๋ฅผ 5๋“ฑ

๊ธ‰์˜ ๋ณ„๋กœ ํ‘œ์‹œํ•˜๋Š” ๋ฐฉ์‹์„ ์ œ์‹œํ•˜ ๋‹ค. ์ด๋Š” ๊ณต

๊ณต๊ธฐ๊ด€์˜ ์ฐธ์—ฌ๋ฅผ ์ž๋ฐœ์ ์œผ๋กœ ์œ ๋„ํ•˜๋Š”๋ฐ ํฐ ํšจ๊ณผ

๋ฅผ ์–ป๊ณ  ์žˆ๋‹ค. ๋ณ„์ด ๋งŽ์€ ๋ฐ์ดํ„ฐ๋Š” ๋ณ„์ด ์ ์€ ๋ฐ์ด

ํ„ฐ์˜ ๊ธฐ๋Šฅ์„ ๋ชจ๋‘ ํฌํ•จํ•œ ์ƒํƒœ์—์„œ ์ถ”๊ฐ€๋œ ๊ธฐ๋Šฅ๋งŒ

์„ ํ‘œ์‹œํ•˜ ๋‹ค.

๊ฐ๊ตญ์˜ ์ •๋ถ€๋Š” ์ •๋ถ€ ๋ณด์œ  ๋ฐ์ดํ„ฐ๋ฅผ ์ด์šฉํ•˜์—ฌ ๊ฐ

์ข… ์ •์ฑ…์„ ๊ฐœ๋ฐœํ•˜๊ณ  ๊ตญ๋ฏผ ์„œ๋น„์Šค๋ฅผ ์ง์ ‘ ์ˆ˜ํ–‰

ํ•œ๋‹ค. ์ •๋ถ€๊ฐ€ ๋ณด์œ ํ•œ ๋ฐ์ดํ„ฐ๋ฅผ ๊ณต๊ณต ๋ฐ์ดํ„ฐ๋กœ ์ œ

๊ณตํ•  ๊ฒฝ์šฐ ๊ฐ€๋Šฅํ•œ ์„œ๋น„์Šค๊ฐ€ ์–ด๋–ค ๊ฒƒ์ด ์žˆ์„์ง€๋Š”

์Šค๋งˆํŠธํฐ์˜ ์•ฑ๊ณผ ๊ฐ™์ด ๋ฏธ๋ฆฌ ์†๋‹จํ•˜๊ธฐ ์–ด๋ ต๋‹ค. ํ˜„

์žฌ ๋ถ€๋ถ„์ ์œผ๋กœ ์ œ๊ณต๋œ ๊ณต๊ณต ๋ฐ์ดํ„ฐ๋กœ ๊ฐ€๋Šฅํ•œ ์˜ˆ๋ฅผ

์‚ดํŽด๋ณด์ž. ๊ณต๊ณต ๋ฐ์ดํ„ฐ ์ค‘ ๋น… ๋ฐ์ดํ„ฐ๋ฅผ ์‚ฌ์šฉํ•œ ์˜ˆ

๋Š” ์ ์ ˆํ•œ ์˜ˆ๊ฐ€ ์—†๊ธฐ์— ์ผ๋ฐ˜์ธ์—๊ฒŒ ํŒŒ๊ธ‰ํšจ๊ณผ๊ฐ€ ํฐ

๋‚ด์šฉ ์œ„์ฃผ๋กœ ์ œ์‹œํ•˜ ๋‹ค. ๋˜ํ•œ ๊ณต๊ณต ์„œ๋น„์Šค๋ฅผ ์œ„

ํ•ด์„œ๋Š” ๋ฐ์ดํ„ฐ๋ฅผ ์ดํ•ดํ•˜๊ธฐ ์‰ฌ์šด ์‹œ๊ฐํ™” ๊ธฐ์ˆ ์„ ์‚ฌ

์šฉํ•ด์•ผ ํ•จ์„ ์•Œ๋ ค์ฃผ๊ณ  ์žˆ๋‹ค.

(1) Where does my money go?

๊ณต๊ฐœ์ง€์‹์žฌ๋‹จ(Open Knowledge Foundation)

์ด๋ผ๋Š” ๋ฏผ๊ฐ„๊ธฐ๊ด€์—์„œ ์šด ํ•˜๋Š” ์›น ์‚ฌ์ดํŠธ์—์„œ๋Š”

๊ตญ ์ •๋ถ€๊ฐ€ ์ œ๊ณตํ•œ ๊ณต๊ณต ๋ฐ์ดํ„ฐ๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ์ผ๋ฐ˜

์ธ์ด ์ดํ•ดํ•˜๊ธฐ ์‰ฝ๋„๋ก ์‹œ๊ฐํ™” ๊ธฐ๋ฒ•์„ ์‚ฌ์šฉํ•˜์—ฌ ๋ณด

์—ฌ์ฃผ๊ณ  ์žˆ๋‹ค.2) ๊ทธ ์ค‘ ํ‘œ์ ์ธ ๋‚ด์šฉ์ดโ€˜๋‚ด๊ฐ€ ๋‚ธ ์„ธ

๊ธˆ์€ ์–ด๋””์— ์“ฐ์ด๋‚˜?โ€™๋ผ๋Š” ์ด๋ฆ„์˜ ์ธํ„ฐ๋ž™์…˜์ด ๊ฐ€

๋Šฅํ•œ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์ด๋‹ค. ๊ฐœ์ธ์˜ ์ˆ˜์ž…์— ํ•ด๋‹น๋œ ๊ธˆ

์•ก์„ ์ง€์ •ํ•  ๊ฒฝ์šฐ ์„ธ๊ธˆ ๋‚ฉ๋ถ€์•ก๊ณผ ์„ธ๊ธˆ์ด ์‚ฌ์šฉ๋˜๋Š”

ํ•ญ๋ชฉ์„ ๋ณต์ง€, ์˜๋ฃŒ, ๊ต์œก, ๊ตญ๋ฐฉ ๋“ฑ ํ•ญ๋ชฉ๋ณ„๋กœ 2๋‹จ๊ณ„

๋กœ ๋„์‹ํ™”ํ•˜์—ฌ ๋ณด์—ฌ์ฃผ๊ณ  ์žˆ์–ด ๋‚ฉ์„ธ์— ํ•œ ์ดํ•ด๋ฅผ

๋„์™€์ฃผ๊ณ  ์žˆ๋‹ค.

(2) OECD Better Life Initiative

OECD๋Š” ๋™์ผํ•œ ๊ธฐ์ค€์œผ๋กœ ํšŒ์›๊ตญ ๊ฐ„์˜ ํ†ต๊ณ„๋ฅผ

๋น„๊ตํ•  ์ˆ˜ ์žˆ๋„๋ก ๋‹ค์–‘ํ•œ ๋ฐ์ดํ„ฐ๋ฅผ ์ƒ์‚ฐํ•˜์—ฌ ์ œ๊ณต

๋น… ๋ฐ์ดํ„ฐ์™€ ๊ณต๊ณต ๋ฐ์ดํ„ฐ ํ™œ์šฉ

Internet and Information Security 57

*์ถœ์ฒ˜: Berners-Lee(2009) ์žฌ๊ตฌ์„ฑ

<ํ‘œ 4> ํŒ€ ๋ฒ„๋„ˆ์Šค๋ฆฌ์˜ ๋งํฌ๋“œ ๋ฐ์ดํ„ฐ 5๋“ฑ๊ธ‰ ํ‘œ์‹œ

๋“ฑ ๊ธ‰ ์„ค ๋ช…

โ˜… ์ž„์˜์˜ ํ˜•์‹์œผ๋กœ ๊ณต๊ฐœ

โ˜…โ˜… ๊ธฐ๊ณ„ ์ฒ˜๋ฆฌ ๊ฐ€๋Šฅํ•œ ์ •ํ˜• ๋ฐ์ดํ„ฐ ํ˜•์‹(์˜ˆ: ์—‘์…€)

โ˜…โ˜…โ˜… ๊ณต๊ฐœ ํ‘œ์ค€ ํ˜•์‹

โ˜…โ˜…โ˜…โ˜… URL์„ ์‚ฌ์šฉํ•˜๋Š” ๋งํฌ๋“œ ๋ฐ์ดํ„ฐ ํ˜•์‹

โ˜…โ˜…โ˜…โ˜…โ˜… ํƒ€ ์›น์‚ฌ์ดํŠธ์™€ ์—ฐ๊ณ„ ์ œ๊ณต

2) Where does my money go? http://wheredoesmymoneygo.org/dashboard

Page 59: nternet I Security - BIGBOOK

ํ•œ๋‹ค. ๊ทธ ์ค‘ ๊ฐ€์žฅ ๋„๋ฆฌ ์•Œ๋ ค์ง„ ๊ฒƒ์€ ํšŒ์›๊ตญ์˜ ์‚ถ์˜

์งˆ์„ ์ง€ํ‘œํ™”ํ•œ ๊ฒƒ์ด๋‹ค. ์ด ์ง€ํ‘œ์—๋Š” ์ฃผํƒ, ์ˆ˜์ž…,

์ง์—…, ๊ต์œก ๋“ฑ ์ „์ฒด 11๊ฐœ์˜ ์ธก์ •์น˜๋ฅผ ์ œ๊ณตํ•˜๋ฉฐ ๊ฐœ

์ธ์˜ ์„ ํ˜ธ์— ๋”ฐ๋ผ ์ด์— ๋น„์ค‘์„ ๊ฐ์•ˆํ•˜์—ฌ ๊ตญ๋ฏผ์˜

์‚ถ์„ ํ‰๊ฐ€ํ•  ์ˆ˜ ์žˆ๋„๋ก ํ•˜๊ณ  ์žˆ๋‹ค.3)

(3) IT Dashboard

๋ฏธ๊ตญ ์ •๋ถ€์—์„œ ์ง์ ‘ ์šด ํ•˜๋Š” ์›น ์‚ฌ์ดํŠธ ์ค‘ ํ•˜

๋‚˜๋กœ ๋ฏธ ์ •๋ถ€์—์„œ ๋ฐœ์ฃผํ•˜๋Š” IT ๊ด€๋ จ ์˜ˆ์‚ฐ์„ ์ข…ํ•ฉ

์ ์œผ๋กœ ๋ณด์—ฌ์ค€๋‹ค.4) ์ •๋ถ€์˜ ๊ณต์‹ ๋ฐ์ดํ„ฐ๋ฅผ ์‚ฌ์šฉํ•˜

๊ณ  ์žˆ๊ธฐ์— ์˜ˆ์‚ฐ ์ž์ฒด, ์˜ˆ์‚ฐ์˜ ์ฆ๊ฐ, ์‹œ๊ฐ„์˜ ๋ณ€ํ™”์—

๋”ฐ๋ฅธ ๋ณ€ํ™” ๊ทธ๋ž˜ํ”„, ๋ฉด์ ์„ ์‚ฌ์šฉํ•œ ๊ทธ๋ž˜ํ”„ ๋“ฑ ๋‹ค์–‘

ํ•œ ๋ฐฉ์‹์˜ ์‹œ๊ฐํ™” ๊ธฐ๋ฒ•์„ ์‚ฌ์šฉํ•œ๋‹ค.

(4) ๊ตฌ ๊ณต๊ณต ๋ฐ์ดํ„ฐ ์ต์Šคํ”Œ๋กœ๋Ÿฌ

๊ตฌ ์€ 2010๋…„ 3์›” ๊ณต๊ณต๋ฐ์ดํ„ฐ๋ฅผ ํ™œ์šฉํ•˜์—ฌ ๋ฐ

์ดํ„ฐ์˜ ์˜๋ฏธ๋ฅผ ์ดํ•ดํ•˜๋„๋ก ํ•˜๋Š” ๊ณต๊ณต ๋ฐ์ดํ„ฐ ์ต์Šค

ํ”Œ๋กœ๋Ÿฌ(public data explorer)๋ผ๋Š” ์›น ์‚ฌ์ดํŠธ๋ฅผ

์šด ํ•˜๊ณ  ์žˆ๋‹ค. OECD, ๋ฏธ๊ตญ ์ •๋ถ€, ์œ ๋Ÿฝ ํ†ต๊ณ„์ฒญ์˜

์ž๋ฃŒ๋ฅผ ํ™œ์šฉํ•˜๊ณ  ์žˆ์œผ๋ฉฐ ๊ฐœ์ธ๋„ ๋ฐ์ดํ„ฐ์„ธํŠธ๋ฅผ ์—…

๋กœ๋“œํ•˜๋ฉด ์ด์šฉ์ด ๊ฐ€๋Šฅํ•˜๋‹ค. ๋ถ€๋ถ„์˜ ๋‚ด์šฉ์€ ์ •ํ˜•

ํ™”๋œ ์ˆซ์ž ๋ฐ์ดํ„ฐ๋ฅผ ํ™œ์šฉํ•œ ๊ฒƒ์ด๋‚˜ ๋น… ๋ฐ์ดํ„ฐ์™€

๊ด€๊ณ„๋œ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์œผ๋กœ ์ž์ฒด์˜ ๊ฒ€์ƒ‰์—”์ง„์„ ์ด

์šฉํ•œ ๋ถ„์„ํ•œ ๋…๊ฐ์˜ ์œ ํ–‰์— ํ•œ ๋ฐ์ดํ„ฐ์„ธํŠธ๋ฅผ ํฌ

ํ•จํ•˜๊ณ  ์žˆ๋‹ค.5) ์ด๋Š” ๊ตฌ ์˜ ์ง€๋ฉ”์ผ์— ํฌํ•จ๋œ ๋‚ด์šฉ

์—์„œ ๋…๊ฐ๊ณผ ๊ด€๋ จ๋œ ๋‹จ์–ด๊ฐ€ ์–ธ์ œ ๋“ฑ์žฅํ•˜ ๋Š”๊ฐ€ ํ•˜

๋Š” ํŒจํ„ด์„ ๊ตญ๊ฐ€๋ณ„๋กœ ๋ถ„์„ํ•œ ๊ฒƒ์œผ๋กœ ๋ฏธ๊ตญ ์งˆ๋ณ‘์„ผํ„ฐ

์— ๋ณด๊ณ ๋œ ๋‚ด์šฉ๊ณผ ์ผ์น˜ํ•˜๋Š” ๊ฒƒ์„ ๋ณด์—ฌ์ฃผ๊ณ  ์žˆ๋‹ค.

์ด๋Š” ๋น„์ •ํ˜• ๋ฐ์ดํ„ฐ์ธ ๋ฉ”์ผ ๋ถ„์„์œผ๋กœ ์ด์ „์˜ ๋ถ„์„

๋ฐฉ๋ฒ•์œผ๋กœ ์–ป๊ธฐ ์–ด๋ ค์šด ์ƒˆ๋กœ์šด ํ˜„์ƒ์„ ๋ฐœ๊ฒฌํ•  ์ˆ˜

์žˆ์Œ์„ ๋ณด์—ฌ์ฃผ๋Š” ์˜ˆ์ด๋‹ค.

์ œ ๊ถŒ ์ œ ํ˜ธ

58 ๋…„ ์›”

[๊ทธ๋ฆผ 5] โ€œ๋‚ด๊ฐ€ ๋‚ธ ์„ธ๊ธˆ์€ ์–ด๋””์— ์“ฐ์ด๋‚˜?โ€ํ™”๋ฉด(์—ฐ๊ฐ„ ์ˆ˜์ž… 10๋งŒ ํŒŒ์šด๋“œ ํ‘œํ˜„)

3) OECD Better life Initiative, http://www.oecdbetterlifeindex.org4) USA Government IT Dashboard, http://www.itdashboard.gov5) ๊ตฌ ๋…๊ฐํŠธ๋ Œ๋“œ, http://www.google.org/flutrends/about/how.html

Page 60: nternet I Security - BIGBOOK

๋น… ๋ฐ์ดํ„ฐ์™€ ๊ณต๊ณต ๋ฐ์ดํ„ฐ ํ™œ์šฉ

Internet and Information Security 59

[๊ทธ๋ฆผ 6] OECD Better Life Initiative

[๊ทธ๋ฆผ 7] ๋ฏธ๊ตญ์˜ IT ๊ด€๋ จ ์˜ˆ์‚ฐ์˜ ๋ณ€ํ™” ํ‘œํ˜„(๋ฉด์  ํ‘œํ˜„ ๋ฐฉ์‹)

Page 61: nternet I Security - BIGBOOK

1. ๊ณต๊ณต ๋ฐ์ดํ„ฐ์˜ ํ™œ์šฉ์ƒํ™ฉ

์ง€๊ธˆ๊นŒ์ง€ ์ฃผ๋กœ ์™ธ๊ตญ์˜ ๋น… ๋ฐ์ดํ„ฐ ์ฒ˜๋ฐฉ์•ˆ ๋ฐ

๊ณต๊ณต ๋ฐ์ดํ„ฐ ํ™œ์šฉ์— ํ•œ ์‚ฌ๋ก€๋ฅผ ์‚ดํŽด๋ณด์•˜๋‹ค. ๊ตญ

๋‚ด์˜ ๊ฒฝ์šฐ ๋น… ๋ฐ์ดํ„ฐ์™€ ๊ฐ™์€ ๋ฐ์ดํ„ฐ์˜ ์ฆ๊ฐ€๋ณด๋‹ค

์ธํ„ฐ๋„ท ํŠธ๋ž˜ํ”ฝ์˜ ์ฆ๊ฐ€๋ฅผ ๋” ์‹ฌ๊ฐํ•˜๊ฒŒ ์ƒ๊ฐํ•˜ ์œผ

๋ฉฐ ๋ฐ์ดํ„ฐ์˜ ํ™œ์šฉ์ด๋ผ๋Š” ์ธก๋ฉด์˜ ์—ฐ๊ตฌ๋Š” ์ƒ ์ ์œผ

๋กœ ๋ถ€์กฑํ•˜๋‹ค. ๋˜ํ•œ ๊ณ ๊ธ‰ ์ •๋ณด์˜ ๊ฒ€์ƒ‰์„ ๊ตฌ ๊ณผ ๊ฐ™

์€ ์™ธ๊ตญ๊ธฐ์—…์˜ ์†”๋ฃจ์…˜์— ์˜์กดํ•˜๊ธฐ ๋•Œ๋ฌธ์— ๋ฐ์ดํ„ฐ

์˜ ์ฆ๊ฐ€์— ํ•œ ๋ฌธ์ œ๋Š” ๊ธฐ์—…์˜ ๋ฌธ์ œ์ด๋ฉฐ ๊ตญ๊ฐ€ ๊ฒฝ

์Ÿ๋ ฅ์˜ ๋ฌธ์ œ๋กœ ์ธ์‹๋˜์ง€ ์•Š์€ ์ƒํƒœ์ด๋‹ค. ์ •๋ถ€ ๋‚ด

์ง€๋Š” ์ •๋ถ€ ์‚ฐํ•˜๊ธฐ๊ด€์—์„œ ๋ณด์œ ํ•œ ๋ฐ์ดํ„ฐ๋Š” ๊ตญ๋‚ด์—

์„œ ๋ณด์œ ํ•œ ๋ฐ์ดํ„ฐ ์ค‘ ๊ฐ€์žฅ ๊ทœ๋ชจ๊ฐ€ ํฌ๊ณ  ๊ฐ€์น˜ ์žˆ๋Š”

๋ฐ์ดํ„ฐ ์ค‘ ํ•˜๋‚˜์ผ ๊ฒƒ์ด๋ฉฐ ์ด๋Ÿฌํ•œ ๋ฐ์ดํ„ฐ๊ฐ€ ์ •์ฑ…

์ž…์•ˆ์— ์–ด๋–ป๊ฒŒ ํ™œ์šฉ๋˜๊ณ  ์žˆ๋Š”์ง€๋ฅผ ์‚ดํŽด๋ณด์ž.

์šฐ๋ฆฌ๋‚˜๋ผ์˜ ๊ฒฝ์šฐใ€Œ๊ณต๊ณต๊ธฐ๊ด€์˜ ์ •๋ณด๊ณต๊ฐœ์— ๊ด€ํ•œ

๋ฒ•ใ€์— ๋”ฐ๋ผ ๋ชจ๋“  ๊ณต๊ณต๊ธฐ๊ด€์€ ๊ตญ๊ฐ€์•ˆ๋ณด์™€ ๊ฐ™์€ ๋ฒ•

์œผ๋กœ ์ •ํ•œ ๋น„๊ณต๊ฐœ ์ƒ์ •๋ณด๋ฅผ ์ œ์™ธํ•˜๊ณ ๋Š” ๋ชจ๋‘ ๊ณต

๊ฐœํ•˜๋„๋ก ๋˜์–ด ์žˆ๋‹ค. ํŠนํžˆ ์ „์ž์ •๋ถ€๊ฐ€ ํ™œ์„ฑํ™”๋˜๋ฉด

์„œ ์ •๋ณด๋ชฉ๋ก์„ ์ž‘์„ฑํ•˜๊ณ  ์ด๋ฅผ ์ •๋ณดํ†ต์‹ ๋ง์„ ํ™œ์šฉ

ํ•œ ์ •๋ณด๊ณต๊ฐœ์‹œ์Šคํ…œ์„ ํ†ตํ•˜์—ฌ ๊ณต๊ฐœํ•˜๋„๋ก ๋˜์–ด ์žˆ

์–ด ์ธํ„ฐ๋„ท ์ ‘์†๋งŒ์œผ๋กœ ์ •๋ถ€๊ฐ€ ์–ด๋– ํ•œ ์ •๋ณด๋ฅผ ๊ณต๊ฐœ

ํ•˜๊ณ  ์žˆ๋Š”์ง€ ํ™•์ธํ•  ์ˆ˜ ์žˆ๋Š” ์ƒํƒœ์ด๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ํ•ด

๋‹น๋ฒ•๋ น์—์„œ๋Š” ์ •๋ณด์˜ ์ •์˜์— ์žˆ์–ด ๋ฌธ์„œ, ๋„๋ฉด, ์‚ฌ

์ง„, ํ•„๋ฆ„ ๋“ฑ ๋‹ค์–‘ํ•œ ๋งค์ฒด๋ฅผ ํฌํ•จํ•˜๊ณ  ์žˆ์œผ๋‚˜ ์•ž์—

์„œ ๋งํ•œ ๊ฐ€์žฅ ๊ฐ€์น˜๊ฐ€ ์žˆ๋Š” ์›์‹œ ๋ฐ์ดํ„ฐ์— ํ•œ ์–ธ

๊ธ‰์ด ์—†์–ด ๋ถ€๋ถ„์˜ ์ •๋ณด๋Š” ๊ธฐ๊ณ„์— ์˜ํ•œ ์ ‘๊ทผ์ด

๋ถˆ๊ฐ€๋Šฅํ•œ ๋ฌธ์„œ๋กœ ์ œํ•œ๋˜์–ด ์žˆ๋Š” ์ƒํƒœ์ด๋‹ค.

๊ณต๊ณต์ •๋ณด์™€ ์ผ๋ถ€ ์ค‘๋ณต๋˜๊ธฐ๋„ ํ•˜๋Š” ๋‹ค์–‘ํ•œ ๋ณด๊ณ 

์„œ๋“ค์€ ๊ตญ๊ฐ€์ง€์‹ ํฌํ„ธ์„ ํ†ตํ•˜์—ฌ ์ ‘๊ทผํ•  ์ˆ˜ ์žˆ๋‹ค.

ํ•œ๊ตญ์ •๋ณดํ™”์ง„ํฅ์›์ด ์šด ํ•˜๋Š” ๊ตญ๊ฐ€์ง€์‹ํฌํ„ธ์˜ ๊ฒฝ

์šฐ ์ •๋ถ€ ๋‚ด์ง€๋Š” ์‚ฐํ•˜ ๊ณต๊ณต๊ธฐ๊ด€์—์„œ ์ž‘์„ฑํ•œ ๋ณด๊ณ ์„œ

์™€ ๊ฐ™์€ ๋ฌธ์„œ๋ฅผ ์ง์ ‘ ๋˜๋Š” ๋งํฌ๋ฅผ ์ œ๊ณตํ•œ๋‹ค. ๋ณด๊ณ 

์„œ์˜ ๋‚ด์šฉ ์ค‘์— ํ•„์š”ํ•œ ๋ฐ์ดํ„ฐ๊ฐ€ ํฌํ•จ๋˜์–ด ์žˆ๊ธฐ์—

์ „ํ˜€ ๊ฐ€์น˜๊ฐ€ ์—†์ง€๋Š” ์•Š์ง€๋งŒ ์ผ๋ฐ˜์ ์œผ๋กœ ํ•ด๋‹น๋˜๋Š”

๋ฌธ์„œ๋ฅผ ์ฐพ๋Š” ํŠน๋ณ„ํ•œ ๋ชฉ์ ์„ ๊ฐ€์ง„ ๊ฐœ์ธ์—๊ฒŒ๋งŒ ๋„์›€

์ด ๋  ์ˆ˜ ์žˆ๋Š” ์ •๋ณด๊ณต๊ฐœ ํ˜•ํƒœ์ด๋‹ค.

์ •๋ถ€์—์„œ ์ œ๊ณตํ•˜๋Š” ํ†ต๊ณ„๋Š” ์ˆซ์ž๋กœ ํ‘œ์‹œ๋œ ์ •ํ˜•

ํ™”๋œ ์›์‹œ ๋ฐ์ดํ„ฐ์˜ ํ‘œ์ ์ธ ์˜ˆ์ด๋‹ค. ํ†ต๊ณ„์ฒญ์€

ํ†ต๊ณ„์ฒ˜๋ฆฌ์˜ ์ „๋ฌธ์„ฑ์„ ๋ฐœํœ˜ํ•œ ๊ตญ๊ฐ€ํ†ต๊ณ„ํฌํ„ธ

(kosis.kr)์„ ์šด ํ•˜๊ณ  ์žˆ๋‹ค. ํ†ต๊ณ„์ฒญ์—์„œ ์ œ๊ณตํ•˜

๋Š” ํ†ต๊ณ„๋ฅผ ๋ถ€๋ถ„ ์—‘์…€ ํŒŒ์ผ ํ˜•ํƒœ๋กœ ์ œ๊ณตํ•˜๊ณ  ์žˆ

์ œ ๊ถŒ ์ œ ํ˜ธ

60 ๋…„ ์›”

[๊ทธ๋ฆผ 8] ๊ตฌ ์˜ ๊ณต๊ณต ๋ฐ์ดํ„ฐ ์ต์Šคํ”Œ๋กœ๋Ÿฌ์˜ ๋…๊ฐ ์œ ํ–‰ ๋ถ„์„

Page 62: nternet I Security - BIGBOOK

์–ด ๋ถ€๋ถ„์ ์œผ๋กœ๋Š” ์›์‹œ ๋ฐ์ดํ„ฐ๋ฅผ ํ•„์š”๋กœ ํ•˜๋Š” ์š”๊ตฌ

์— ๋ถ€์‘ํ•˜๊ณ  ์žˆ๋‹ค. ๋˜ํ•œ ๊ตญ์ œ๊ธฐ๊ด€, IMF, ์›”๋“œ๋ฑ…

ํฌ, OECD ๋“ฑ๊ณผ ๊ฐ™์€ ๊ตญ์ œ๊ธฐ๊ด€๊ณผ ์ œํœดํ•˜์—ฌ ์ œ๊ณต

๋˜๋Š” ๋ฐ์ดํ„ฐ์— ์ ‘๊ทผํ•  ์ˆ˜ ์žˆ๋‹ค. ํŠนํžˆ G20๊ณผ ๊ฐ™์€

ํ–‰์‚ฌ์— ๋งž์ถ”์–ด G20 ํ†ต๊ณ„ ์ƒํ™ฉํŒ๊ณผ ๊ฐ™์€ ์‹œ๊ฐํ™”

๊ธฐ๋ฒ•์„ ์‚ฌ์šฉํ•œ ๋ฐ์ดํ„ฐ๋ฅผ ์ œ๊ณตํ•˜๊ณ  ์žˆ์–ด ๊ณต๊ณต ๋ฐ์ด

ํ„ฐ ์ œ๊ณต์˜ โ˜…โ˜… ๋“ฑ๊ธ‰์œผ๋กœ ํ‰๊ฐ€๋œ๋‹ค.

2. ๋น… ๋ฐ์ดํ„ฐ ํ™œ์šฉ์„ ์œ„ํ•œ ๊ฐœ์„ ๋ฐฉํ–ฅ

๊ตญ๋‚ด์˜ ๊ฒฝ์šฐ ๋ถ€์ฒ˜ ๋ฐ ์ •๋ถ€ ์‚ฐํ•˜๊ธฐ๊ด€๋ณ„๋กœ ํ†ต๊ณ„๋ฅผ

์ƒ์‚ฐํ•˜๊ณ  ์žˆ์œผ๋ฉฐ ๋ถ€์ฒ˜ ๊ฐœ๋ณ„์ ์œผ๋กœ ์ •๋ณด๋ฅผ ๊ณต๊ฐœํ•˜

๊ณ  ์žˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์•ž์„œ ์„ค๋ช…ํ•œ ๋กœ ๋ถ€๋ถ„์˜ ์ •๋ณด

๋ฅผ โ˜…โ˜… ๋“ฑ๊ธ‰์œผ๋กœ ์ œ๊ณตํ•˜๊ณ  ์žˆ๋‹ค๊ณ  ๋ณผ ์ˆ˜ ์žˆ๋‹ค. ๊ตญ

๊ฐ€ ํ–‰์ •์˜ ๋ณต์žก์„ฑ์— ๋”ฐ๋ผ ํ•œ ๋ถ€์ฒ˜๊ฐ€ ์ •์ฑ…์„ ์‹œํ–‰

ํ•˜๊ธฐ ์œ„ํ•ด์„œ๋Š” ํ•ด๋‹น ๋ถ€์ฒ˜์˜ ๋ณด์œ  ํ†ต๊ณ„๋งŒ์œผ๋กœ ์ •์ฑ…

์„ ๊ตฌํ˜„ํ•˜๊ธฐ ์–ด๋ ต๋‹ค. [๊ทธ๋ฆผ 9]์—์„œ ๋ณผ ์ˆ˜ ์žˆ๋“ฏ์ด

๋ณด๊ฑด๋ณต์ง€๋ถ€์—์„œ ์ถ”์ง„ ์ค‘์ธ ๊ตญ๋ฏผ ๋ณต์ง€๋ฅผ ์œ„ํ•œ ์‚ฌํšŒ

๋ณต์ง€ ๊ด€๋ฆฌ๋ง์˜ ๊ฒฝ์šฐ 27๊ฐœ ๊ธฐ๊ด€์—์„œ 215์ข…์˜ ์ •๋ณด

๋ฅผ ์ œ๊ณต๋ฐ›์•„ ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜๊ณ  ์žˆ๋‹ค(์ตœํ˜„์ˆ˜,

2009). ์ด๋Š” ์ •๋ถ€ ์ฐจ์›์˜ ๋น… ๋ฐ์ดํ„ฐ ๊ด€๋ จ ์—…๋ฌด๋กœ

๋Š” ๊ฐ€์žฅ ๋ฐœ์ „๋œ ์‚ฌ๋ก€๋ผ๊ณ  ํ•  ์ˆ˜ ์žˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์ด๋Ÿฌ

ํ•œ ํ†ตํ•ฉ๋ง์„ ๊ตฌ์ถ•ํ•˜๊ธฐ ์œ„ํ•ด ๊ฐ ๋ถ€์ฒ˜์— ํ•ด๋‹น๋˜๋Š”

๋ฐ์ดํ„ฐ๋ฅผ ๊ตฌ์ฒด์ ์œผ๋กœ ํŒŒ์•…ํ•˜๊ณ  ์ด๋ฆฌ์‹ค์—์„œ ์ด๋ฅผ

์กฐ์ •ํ•˜๋Š” ํ–‰์ •์ ์ธ ๋…ธ๋ ฅ์ด ํ•„์š”ํ–ˆ๋˜ ๊ฒƒ์œผ๋กœ ์•Œ๋ ค

์ง€๊ณ  ์žˆ๋‹ค.

ํ˜„์žฌ์™€ ๊ฐ™์€ ์ ‘๊ทผ๋ฐฉ๋ฒ•์„ ์‚ฌ์šฉํ•  ๊ฒฝ์šฐ ์ƒˆ๋กœ์šด

๊ตญ๋ฏผ ์„œ๋น„์Šค๋ฅผ ๊ฐœ๋ฐœํ•˜๊ธฐ ์œ„ํ•ด์„œ๋Š” ์„œ๋น„์Šค์˜ ์ •์˜

๊ฐ€ ์ด๋ฃจ์–ด์ง„ ํ›„ ์ •๋ถ€์˜ ์ดํ•ด๊ด€๊ณ„ ๋ถ€์ฒ˜๊ฐ€ ๋ชจ์—ฌ ํ•„

์š”ํ•œ ๋ฐ์ดํ„ฐ ์„ธํŠธ๋ฅผ ๋ถ„์„ํ•˜๊ณ  ์ด๋ฅผ ์ œ๊ณตํ•˜๊ธฐ ์œ„ํ•ด

๋น… ๋ฐ์ดํ„ฐ์™€ ๊ณต๊ณต ๋ฐ์ดํ„ฐ ํ™œ์šฉ

Internet and Information Security 61

[๊ทธ๋ฆผ 9] ์‚ฌํšŒ๋ณต์ง€ํ†ตํ•ฉ๊ด€๋ฆฌ๋ง์˜ ๋ฐ์ดํ„ฐ ์—ฐ๊ฒฐ ์‚ฌ๋ก€

*์ถœ์ฒ˜: ์ตœํ˜„์ˆ˜(2009)

Page 63: nternet I Security - BIGBOOK

๋ถ€์„œ ๋‚ด์˜ ์ •๋ณด์‹œ์Šคํ…œ์„ ์ˆ˜์ •ํ•ด์•ผ ํ•˜๋Š” ์ž‘์—…์„ ๋ฐ˜

๋ณตํ•ด์•ผ ํ•œ๋‹ค. ์˜ˆ๋ฅผ ๋“ค๋ฉด ๊ตฌ์ œ์—ญ ์ข…ํ•ฉ ์ฑ…, ๋„์‹œํ™

์ˆ˜ ๋ฐฉ์ง€ ์ฑ… ๋“ฑ ๊ฐ ๋ถ€์„œ๊ฐ€ ๋ณด์œ ํ•œ ๋ฐ์ดํ„ฐ๋ฅผ ์ข…ํ•ฉ

์ ์œผ๋กœ ๋ถ„์„ํ•ด์•ผ ํ•˜๋Š” ์ƒˆ๋กœ์šด ์‚ฌ๊ฑด์ด ๋ฐœ์ƒํ•  ๊ฒฝ

์šฐ, ํ•„์š”ํ•œ ๋ฐ์ดํ„ฐ ์„ธํŠธ๋ฅผ ์ •์˜ํ•˜๊ณ  ๋ถ€์ฒ˜๊ฐ€ ๋…ผ์˜

๋ฅผ ์ง„ํ–‰ํ•˜๋Š” ์ผ์ด ๋ฐ˜๋ณต๋  ๊ฐ€๋Šฅ์„ฑ์ด ๋†’๋‹ค.

๋”ฐ๋ผ์„œ ๊ตญ๊ฐ€์•ˆ๋ณด์™€ ๊ฐ™์€ ํŠน์ˆ˜ํ•œ ๊ฒฝ์šฐ๋ฅผ ์ œ์™ธํ•˜

๊ณ ๋Š” ์ •๋ณด๋ฅผ ์ œ๊ณตํ•˜๋Š” ๋ถ€์ฒ˜์—์„œ๋Š” ํƒ€ ๋ถ€์ฒ˜์—์„œ ํ™œ

์šฉ๋  ๊ฐ€๋Šฅ์„ฑ์ด ๋†’์€ ๋ฐ์ดํ„ฐ๋ฅผ ๋ฌธ์„œ ํ˜•ํƒœ๋กœ ์ œ๊ณตํ•˜

๋Š” ์‹  ๋ฐ์ดํ„ฐ ๊ณ„์ธต์—์„œ ์ง์ ‘ ์ ‘๊ทผํ•  ์ˆ˜ ์žˆ๋„๋ก

ํ•˜์—ฌ ์ •์ฑ…์„ ์ง‘ํ–‰ํ•˜๋Š” ๋ถ€์„œ์—์„œ ์ •์ฑ…์„ ๊ฐœ๋ฐœํ•  ์ˆ˜

์žˆ๋„๋ก ์ •๋ถ€ ๋‚ด์˜ ๊ณต๊ณต ๋ฐ์ดํ„ฐ๋ฅผ ๊ฐœ๋ฐฉํ•˜๋Š” ๊ฒƒ์ด

๋ฐ”๋žŒ์งํ•˜๋‹ค. [๊ทธ๋ฆผ 10]์˜ (a)๋Š” ํ˜„ ์ •๋ถ€์˜ ๋ถ€์ฒ˜ ๊ฐ„

์ •๋ณด ๊ต๋ฅ˜ ๋ฐฉ์‹์„ ํ‘œ์‹œํ•˜๊ณ  ์žˆ๋‹ค. ํŠน๋ณ„ํ•œ ํ†ตํ•ฉ ์ ˆ

์ฐจ๋ฅผ ํ†ตํ•˜์ง€ ์•Š๋Š” ๊ฒฝ์šฐ ์™„์„ฑ๋œ ๋ณด๊ณ ์„œ ํ˜•ํƒœ์˜ ํ”„

๋ฆฌ์  ํ…Œ์ด์…˜ ํ˜•ํƒœ์˜ ์ธํ„ฐ๋ž™์…˜๋งŒ์ด ๊ฐ€๋Šฅํ•˜๋‹ค. ์ •๋ถ€

์˜ ๋ถ„์„๊ธฐ๋Šฅ์„ ๊ฐ•ํ™”ํ•˜๊ธฐ ์œ„ํ•ด์„œ๋Š” ์›์‹œ ๋ฐ์ดํ„ฐ๋‚˜

๋ถ„์„ ๊ฒฐ๊ณผ์™€ ์ง์ ‘ ์—ฐ๊ฒฐ๋˜๋Š” [๊ทธ๋ฆผ 10]์˜ (b)์™€ ๊ฐ™

์€ ์ธํ„ฐํŽ˜์ด์Šค๊ฐ€ ํ•„์ˆ˜์ ์ด๋‹ค. ์•ž์„œ ์„ค๋ช…ํ•œ ๋งํฌ๋“œ

๋ฐ์ดํ„ฐ๋Š” ์ด๋Ÿฌํ•œ ์ธํ„ฐํŽ˜์ด์Šค์˜ ํ•œ ๋ฐฉ์‹์œผ๋กœ ๋ณผ ์ˆ˜

์žˆ๋‹ค.

๋ถ€์ฒ˜ ๊ฐ„์— ๋ฐ์ดํ„ฐ๋ฅผ ๊ต๋ฅ˜ํ•˜๊ธฐ ์œ„ํ•ด์„œ๋Š” ์„ ๊ฒฐํ•˜

์—ฌ์•ผ ํ•  ๋ฌธ์ œ๊ฐ€ ์žˆ๋‹ค. ์ •๋ถ€ ๋ถ€์ฒ˜๊ฐ€ ์ˆ˜์ง‘ํ•˜์—ฌ ์‚ฌ์šฉ

ํ•˜๋Š” ๋ฐ์ดํ„ฐ์—๋Š” ๊ฐœ์ธ์ •๋ณด๊ฐ€ ํฌํ•จ๋˜์–ด ์žˆ๋‹ค. ๊ฐœ์ธ

์ •๋ณด๊ฐ€ ํฌํ•จ๋œ ๋‚ด์šฉ์„ ๊ผญ ํ•„์š”ํ•˜์ง€ ์•Š์€ ๋‹ค๋ฅธ ๋ถ€์ฒ˜

์— ์ œ๊ณตํ•  ๊ฒฝ์šฐ ๊ฐœ์ธ์ •๋ณด์˜ ๋ˆ„์ถœ ๊ฐ€๋Šฅ์„ฑ์„ ๋†’์ผ ์ˆ˜

์žˆ๊ธฐ์— ๋ฐ์ดํ„ฐ ์ œ๊ณต์— ์žˆ์–ด์„œ๋Š” ๊ฐœ์ธ์ •๋ณด์˜ ์ต๋ช…

์ฒ˜๋ฆฌ(anonymisation)๋‚˜ ๊ทธ๋ฃน์ฒ˜๋ฆฌ(aggregation)

๊ฐ€ ํ•„์š”ํ•˜๋‹ค.

๊ณต๊ณต ๋ฐ์ดํ„ฐ๋Š” ๊ฐ€๊ธ‰์  ๋ฏผ๊ฐ„์—๊ฒŒ ๊ฐœ๋ฐฉ๋˜์–ด์•ผ ํ•˜

๋Š” ๊ฒƒ์ด ์›์น™์ด๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ๋ฏผ๊ฐ„ ๊ฐœ๋ฐฉ์— ๋”ฐ๋ฅธ ๋ฌธ์ œ

๊ฐ€ ํ•ด๊ฒฐ๋˜์ง€ ์•Š์•„ ๋งํฌ๋“œ ๋ฐ์ดํ„ฐ๋กœ์˜ ์ „ํ™˜์ด ๋Šฆ์–ด

์ง„๋‹ค๋ฉด ์ตœ์†Œํ•œ ๊ณต๊ณต๊ธฐ๊ด€๊ฐ„์˜ ๋ฐ์ดํ„ฐ ์—ฐ๊ณ„๋งŒ์ด๋ผ

๋„ ์šฐ์„ ์ ์œผ๋กœ ์‹œํ–‰ํ•˜์—ฌ ๊ตญ๋ฏผ ์„œ๋น„์Šค๋ฅผ ๊ฐœ์„ ํ•˜

๋Š” ๊ฒƒ์ด ๋ฐ”๋žŒ์งํ•˜๋‹ค. ๋น… ๋ฐ์ดํ„ฐ์— ํ•ด๋‹น๋˜๋Š” ๊ทœ

๋ชจ์˜ ๊ณต๊ณต ๋ฐ์ดํ„ฐ ์ฒ˜๋ฆฌ๋Š” ์šฐ์„ ์ ์œผ๋กœ ๋น„๊ต์  ์ฒ˜๋ฆฌ

๊ฐ€ ์‰ฌ์šด ์ •ํ˜• ๋ฐ์ดํ„ฐ ์ฒ˜๋ฆฌ๋กœ๋ถ€ํ„ฐ ์‹œ์ž‘ํ•  ์ˆ˜ ์žˆ๋‹ค.

๊ทธ๋Ÿฌ๋‚˜ ์ด๋ฏธ ๋ฏผ๊ฐ„์—์„œ ์‚ฌ์šฉ๋˜๊ณ  ์žˆ๋Š” SNS(Social

Network Service)๋ฅผ ํ†ตํ•ด ์–ป์–ด์ง€๋Š” ๋ฐ์ดํ„ฐ๋ฅผ

ํ™œ์šฉํ•œ๋‹ค๋ฉด ์ผ๋ถ€ ์‚ฌ๋žŒ์ด ๊ฐ์ง€ํ•œ ๊ฑด์ถ•๋ฌผ ๋ถ•๊ดด, ๋ณต

์ง€ ์‚ฌ๊ฐ์ง€ ์— ์žˆ๋Š” ๋นˆ๋ฏผ์ธต ๋ณดํ˜ธ์™€ ๊ฐ™์€ ์„œ๋น„์Šค์—

ํ™œ์šฉํ•  ์ˆ˜ ์žˆ๋‹ค.

์ง€๊ธˆ๊นŒ์ง€ ์ •๋ณด์˜ ๊ธ‰๊ฒฉํ•œ ์ฆ๊ฐ€๋ฌธ์ œ๋Š” ์ •๋ณด์ฒ˜๋ฆฌ

๋ถ„์•ผ์—์„œ๋งŒ ๋ฐœ์ƒํ•˜๋Š” ๊ฒƒ์ด ์•„๋‹ˆ๋ผ ๊ณผํ•™๊ธฐ์ˆ  ๋ถ„์•ผ

์˜ ์ œ4 ํŒจ๋Ÿฌ๋‹ค์ž„, ๊ตญ๊ฐ€ ์•ˆ๋ณด ๋ถ„์•ผ์˜ ๋น„์ฃผ์–ผ ์• ๋„

๋ฆฌํ‹ฑ์Šค์™€ ๊ฐ™์ด ์ƒˆ๋กœ์šด ์ ‘๊ทผ๋ฐฉ๋ฒ•์„ ํ•„์š”๋กœ ํ•˜๋Š” ํŒจ

๋Ÿฌ๋‹ค์ž„์˜ ๋ณ€ํ™”๋ฅผ ์š”๊ตฌํ•˜๊ณ  ์žˆ๋‹ค๋Š” ๊ฒƒ์„ ์‚ดํŽด๋ณด์•˜

๋‹ค. ๊ธฐ์—…๊ณผ ๊ณต๊ณต๊ธฐ๊ด€์˜ ๊ฒฝ์šฐ ์ด๋Š” ๋น… ๋ฐ์ดํ„ฐ๋ผ๋Š”

์ด์Šˆ๋กœ ๊ท€๊ฒฐ๋˜๋ฉฐ ์ƒˆ๋กœ์šด ๋„์ „๋ถ„์•ผ ๋˜๋Š” ๊ธฐํšŒ๋ผ๊ณ 

์ œ ๊ถŒ ์ œ ํ˜ธ

62 ๋…„ ์›”

[๊ทธ๋ฆผ 10] ๊ณต๊ณต ๋ฐ์ดํ„ฐ ์ ‘๊ทผ๋ฐฉ๋ฒ• ๊ฐœ์„ 

Page 64: nternet I Security - BIGBOOK

๋ณผ ์ˆ˜ ์žˆ๋‹ค. ์ด๋ฅผ ์ œ ๋กœ ํ™œ์šฉํ•  ๊ฒฝ์šฐ ๊ตญ๊ฐ€๋‚˜ ๊ธฐ๊ด€

์˜ ๊ฒฝ์Ÿ๋ ฅ์„ ํ™•๋ณดํ•  ์ˆ˜ ์žˆ๋Š” ์ข‹์€ ์ˆ˜๋‹จ์ž„์„ ํ™•์ธ

ํ•  ์ˆ˜ ์žˆ์—ˆ๋‹ค. ๋น… ๋ฐ์ดํ„ฐ ์ค‘ ๋น„์ •ํ˜• ๋ฐ์ดํ„ฐ์˜ ๊ฒฝ์šฐ

์—๋Š” ์ด๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•œ ๋งŽ์€ ๊ธฐ์ˆ  ๊ฐœ๋ฐœ์ด ํ•„์š”

ํ•˜๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์ •๋ถ€๊ฐ€ ์ƒ์‚ฐํ•˜๋Š” ๋น… ๋ฐ์ดํ„ฐ๋Š” ๋ถ€

๋ถ„ ๋น„๊ต์  ์ฒ˜๋ฆฌ๊ฐ€ ์šฉ์ดํ•œ ์ •ํ˜• ๋ฐ์ดํ„ฐ์ด๋ฉฐ ๊ธฐ๊ด€๊ฐ„

์˜ ๋ฒฝ์„ ํ—ˆ๋ฌผ ์ˆ˜ ์žˆ๋‹ค๋ฉด ๋ฐ”๋กœ ํ™œ์šฉ์ด ๊ฐ€๋Šฅํ•œ ๋ฐ์ด

ํ„ฐ์ด๋‹ค. ํŒ€ ๋ฒ„๋„ˆ์Šค๋ฆฌ๊ฐ€ ์ œ์•ˆํ•œ ๋งํฌ๋“œ ๋ฐ์ดํ„ฐ๋Š”

์ด๋Ÿฌํ•œ ๋ฌธ์ œ์— ํ•œ ํ•ด๋‹ต์ด ๋  ์ˆ˜ ์žˆ๋‹ค. ๊ตญ๊ฐ€ ์ฐจ์›

์—์„œ ์ตœ์†Œํ•œ ๊ณต๊ณต๊ธฐ๊ด€ ๊ฐ„์— ๋ณด์œ ํ•œ ๋ฐ์ดํ„ฐ๋ฅผ ๋งํฌ

๋“œ ๋ฐ์ดํ„ฐ ๋˜๋Š” ์—ฐ๊ณ„๊ฐ€ ๊ฐ€๋Šฅํ•œ ์ ์ ˆํ•œ ๋ฐฉ์‹์œผ๋กœ

์ œ๊ณตํ•˜๋„๋ก ํ•˜๊ณ  ์ด๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ๋ฐ์ดํ„ฐ๋ฅผ ๋ถ„์„ ๋‚ด

์ง€ ์‹œ๊ฐํ™”ํ•˜๋Š” ๋„๊ตฌ๋ฅผ ์ œ๊ณตํ•˜์—ฌ ๊ตญ๋ฏผ ์„œ๋น„์Šค๋ฅผ

ํ•œ ์ฐจ์› ๋†’์ธ๋‹ค๋ฉด ํ˜„์žฌ ์šฐ๋ฆฌ๊ฐ€ ์ž๋ž‘ํ•˜๋Š” ์ „์ž์ •๋ถ€

๋ฅผ ๋น… ๋ฐ์ดํ„ฐ ๊ธฐ๋Šฅ์„ ์ œ ๋กœ ํ™œ์šฉํ•˜๋Š” ์ƒˆ๋กœ์šด ํ˜•

ํƒœ์˜ ์ „์ž์ •๋ถ€๋กœ ๊ฒฉ์ƒ์‹œํ‚ฌ ์ˆ˜ ์žˆ์„ ๊ฒƒ์ด๋‹ค.

โ–ถ ์ฐธ๊ณ ๋ฌธํ—Œ

๊ตญ๊ฐ€์ •๋ณดํ™”์ „๋žต์œ„์›ํšŒ (2011). ใ€Ž๋น… ๋ฐ์ดํ„ฐ๋ฅผ ํ™œ์šฉํ•œ

์Šค๋งˆํŠธ ์ •๋ถ€ ๊ตฌํ˜„ใ€. ์„œ์šธ: ๊ตญ๊ฐ€์ •๋ณดํ™”์ „๋žต์œ„์›ํšŒ.

์ตœํ˜„์ˆ˜ (2009. 12. 22). ์‚ฌํšŒ๋ณต์ง€ํ†ตํ•ฉ๊ด€๋ฆฌ๋ง์˜ ๊ตฌ์ถ•

๊ณผ ํ†ตํ•ฉ์กฐ์‚ฌ๊ด€๋ฆฌ. ใ€Ž์‚ฌํšŒ๋ณต์ง€ํ†ตํ•ฉ๊ด€๋ฆฌ๋ง ์šด ์—

๋”ฐ๋ฅธ ๊ธฐ ํšจ๊ณผ์™€ ๊ณผ์ œ ์ •์ฑ…ํ† ๋ก ํšŒ ์ž๋ฃŒ์ง‘ใ€,

42-73.

Berners-Lee, T. (2009). Linked data. Retrieved from

http://www.w3.org/DesignIssues/LinkedData.html

Bizer, C., Heath, T., & Berners-Lee, T. (2009). Linked

data: The story so far. International Journal on

Semantic Web and Information Systems, 5(3), 1-22.

Borja, E. C. (2008). Brief documentary history of the

department of homeland security: 2001-2008.

Washington, DC: Department of Homeland

Security.

Dohrmann, T., & Pinshaw, G. (2009). The road to

improved compliance. New York: McKinsey &

Company.

Gantz, J., Boyd, A., & Dowling, S. (2009). Cutting the

clutter: Tackling information overload at the

source (IDC White Paper). Framingham, MA:

International Data Corporation.

Gantz, J. F., Chute, C., Manfrediz, A., Minton, S.,

Reinsel, D., Schlichting, W., & Toncheva, A.

(2008). The diverse and exploding digital universe

(IDC White Paper). Framingham, MA:

International Data Corporation.

Gartner (2011, June 27). Gartner says solving โ€˜big

dataโ€™ challenge involves more than just managing

volumes of data. Gartner Press Release. Retrieved

from http://www.gartner.com/it/page.jsp?id

=1731916

Heath, T., & Bizer, C. (2011). Linked data: Evolving

the web into a global data space. San Rafael,

CA: Morgan & Claypool.

Hey, T., Tansley, S., & Tolle, K. (2009). Jim Gray on

eScience: A transformed scientific method, the

fourth paradigm. Redmond, WA: Microsoft

Research.

Hilbert, M., & Lopez, P. (2011). The world's

technological capacity to store, communicate,

and compute information. Science, 332(6025),

60-65.

Kitsuregawa, M. (2007). Challenge for info-plosion.

Proceedings of the 10th International Conference

on Discovery Science, 1-8.

Kitsuregawa, M., & Nishida, T. (2010). Preface:

Special issue on information explosion. New

Generation Computing, 28(3), 207-215.

Lavigne, V., & Goulin, D. (2011). Applicability of

๋น… ๋ฐ์ดํ„ฐ์™€ ๊ณต๊ณต ๋ฐ์ดํ„ฐ ํ™œ์šฉ

Internet and Information Security 63

Page 65: nternet I Security - BIGBOOK

visual analytics to defense and security operations.

Proceedings of the 16th International Command

and Control Research and Technology Symposium.

Lesk, M. (2007). How much information is there in the

world? Retrieved from http://www.lesk.com/

mlesk/ksg97/ksg.html

Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs,

R., Roxburgh, C., & Byers, A. H. (2011). Big

data: The next frontier for innovation, competition

and productivity. New York: McKinsey &

Company.

Robinson, D. G., Yu, H., Zeller, W. P., & Felten, E. W.

(2009). Government data and the invisible hand.

Yale Journal of Law & Technology, 11, 160-175.

Thomas, J. J., & Cook, K. A. (2005). Illuminating the

path: The research and development agenda for

visual analytics. IEEE CS Press. Retrieved from

http://nvac.pnl.gov/agenda.stm

์ œ ๊ถŒ ์ œ ํ˜ธ

64 ๋…„ ์›”

Page 66: nternet I Security - BIGBOOK

Internet and Information Security ์ œ ๊ถŒ ์ œ ํ˜ธ( ๋…„ ์›”) pp. 65~89

Internet and Information Security 65

์ „ ์„ธ๊ณ„ ์ธํ„ฐ๋„ท์˜ ์ •๋ณด์œ ํ†ต๋Ÿ‰์ด 2010๋…„ 1.3์ œํƒ€๋ฐ”์ดํŠธ๋ฅผ ๋„˜์–ด์„œ ๊ธฐํ•˜๊ธ‰์ˆ˜์ ์œผ๋กœ ์ฆ๊ฐ€ํ•˜๊ณ  ์žˆ๋‹ค. ์ตœ๊ทผ ํญ

๋ฐœ์ ์ธ ๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ ์ฆ๊ฐ€ ํ˜„์ƒ์€ ๊ฐ€๊ฒฉ ๋น„ ์ €์žฅ๋งค์ฒด ์šฉ๋Ÿ‰์˜ ๋น ๋ฅธ ๋ฐœ์ „ ์†๋„์™€ ์Šค๋งˆํŠธํฐ์„ ํ•„๋‘๋กœ ํ•˜๋Š” ๊ฐœ์ธ ๋ชจ๋ฐ”

์ผ ์ปดํ“จํŒ… ํ™˜๊ฒฝ ๋ณ€ํ™”์— ๊ธฐ์ธํ•œ๋‹ค. ๋””์ง€ํ„ธ ์นด๋ฉ”๋ผ๋ฅผ ์ด์šฉํ•˜์—ฌ ๊ฐœ์ธ๋“ค์ด ๊ณ ํ•ด์ƒ๋„ ์‚ฌ์ง„๊ณผ ๋™ ์ƒ ํŒŒ์ผ ๋“ฑ์„ ์ƒ์„ฑํ•˜์—ฌ

๊ฐœ์ธํ˜• ์ €์žฅ์žฅ์น˜์™€ ๊ทœ๋ชจ ๋ฐ์ดํ„ฐ์„ผํ„ฐ์— ์ €์žฅํ•˜๋ฉด์„œ ๊ธ‰์†ํ•˜๊ฒŒ ๋ฐ์ดํ„ฐ์–‘์ด ์ฆ๊ฐ€ํ•˜๊ณ  ์žˆ๋‹ค. ํŠนํžˆ, ์œ ๋ฌด์„  ์ธํ„ฐ๋„ท ๋ฐ

์ด๋™ํ†ต์‹ ๊ธฐ์ˆ ์˜ ๋ฐœ์ „์œผ๋กœ ๊ทœ๋ชจ ๋ฐ์ดํ„ฐ์˜ ๋น ๋ฅธ ์ด๋™์„ ์‰ฝ๊ฒŒ ํ•˜์—ฌ ๋งŽ์€ ๋ฐ์ดํ„ฐ์˜ ์œ ํ†ต๊ณผ ์ €์žฅ์ด ๊ฐ€๋Šฅํ•˜๊ฒŒ ๋˜์—ˆ๋‹ค.

๋ฐ์ดํ„ฐ ํญ์ฆํ˜„์ƒ์€ ์ €์žฅ์žฅ์น˜์— ๋น„ํ•ด ๋ฐœ์ „ ์†๋„๊ฐ€ ๋Š๋ฆฐ ๋„คํŠธ์›Œํฌ์˜ ๋ณ‘๋ชฉํ˜„์ƒ์„ ๋ถ€๊ฐ์‹œํ‚ค๋ฉฐ, ๋„คํŠธ์›Œํฌ์—์„œ์˜ ๋ฌธ์ œํ•ด

๊ฒฐ์— ๋งŽ์€ ํˆฌ์ž๋ฅผ ์š”๊ตฌํ•˜๊ณ  ์žˆ๋‹ค. ๋ฐ์ดํ„ฐ ํญ์ฆํ˜„์ƒ์€ ์œ ๋ฌด์„  ์•ก์„ธ์Šค ๋„คํŠธ์›Œํฌ์˜ ์šฉ๋Ÿ‰ ํ™•์žฅ์ด๋‚˜ ์ฃผ์š” ๋ฐฑ๋ณธ ์Šค์œ„์น˜โˆ™

๋ผ์šฐํ„ฐ์˜ ์šฉ๋Ÿ‰ ์ฆ์„ค๊ณผ ๊ฐ™์€ ๋‹จ์ˆœํ•œ ํ•ด๊ฒฐ๋ฐฉ๋ฒ•์ด ์•„๋‹ˆ๋ผ ์ƒˆ๋กœ์šด ์ธํ„ฐ๋„ท ๊ตฌ์กฐ์— ํ•œ ํ˜์‹ ์„ ์š”๊ตฌํ•˜๊ณ  ์žˆ๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—

์„œ๋Š” ๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ ํญ์ฆํ˜„์ƒ์— ํ•ด์„œ ๊ณ ์ฐฐํ•˜๊ณ  ์ด๋ฅผ ํ˜„์žฌ ์ธํ„ฐ๋„ท์—์„œ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•œ CDN, ๋ฐ์ดํ„ฐ์„ผํ„ฐ, ALTO,

NGSON ๋“ฑ์˜ ๋ฐฉ๋ฒ•๊ณผ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท ๊ธฐ์ˆ ์ธ ์ฝ˜ํ…์ธ  ์ค‘์‹ฌ ๋„คํŠธ์›Œํ‚น(CCN)์— ํ•ด์„œ ์‚ดํŽด๋ณธ๋‹ค.

The amount of worldwide digital information traffic has grown exponentially, and was

estimated as 1.3 Zetabytes (ZB) in 2010. The recent explosion in data traffic is rooted in the

development of cost-effective large storage systems, as well as changes in the personal computing

environment, such as the rise of smartphones. For example, by generating high-resolution picture or

movie files using their digital cameras, people are contributing to the rapid growth of the digital

universe. Due to the recent progress of high-speed wired/wireless access networks and mobile

computing technologies, we can exchange or store large files easily. In particular, this data explosion has

revealed the relative bottleneck of networking technology development compared with the growth of cheap

and large storage systems, and indicates that there are networking issues that require more than simple

solutions such as increasing the capacity of switches/routers/link bandwidth. This study reviews the data

traffic explosion phenomenon and its evolutionary solutions such as CDN, data center, ALTO, and NGSON

in the current Internet, and also explains a revolutionary technology called Content-Centric Networking

(CCN) in the Future Internet.

์ฃผ์ œ์–ด: ๋ฐ์ดํ„ฐํญ์ฆ, ์ฝ˜ํ…์ธ  ์ค‘์‹ฌ ๋„คํŠธ์›Œํ‚น, ํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ…, ์ฝ˜ํ…์ธ  ์ „์†ก ๋„คํŠธ์›Œํฌ, ๋น… ๋ฐ์ดํ„ฐ ๋ถ„์„

Keywords: data explosion, content-centric networking, cloud computing, content delivery network,ALTO, big data analysis

์ดˆ๋ก

Abstract

๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ ํญ์ฆํ˜„์ƒ๊ณผ ์ฝ˜ํ…์ธ  ์ค‘์‹ฌ ๋„คํŠธ์›Œํ‚น ๊ธฐ์ˆ 

์ด ์„๏ฟฝ

Young-Seok Lee

Data Traffic Explosion and Content-Centric Networking Technologies

๏ฟฝ๏ฟฝ๏ฟฝ ์ถฉ๋‚จ ํ•™๊ต ์ปดํ“จํ„ฐ๊ณตํ•™๊ณผ ๋ถ€๊ต์ˆ˜

(Associate Professor, Dept. of Computer Engineering, Chungnam National University, [email protected])

Page 67: nternet I Security - BIGBOOK

1. ๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ ์ฆ๊ฐ€

์ตœ๊ทผ EMC ํ›„์› ํ•˜์— ์‹œ์žฅ ์กฐ์‚ฌ ์—…์ฒด์ธ IDC๊ฐ€

๋ฐœํ‘œํ•œโ€˜๋””์ง€ํ„ธ ์œ ๋‹ˆ๋ฒ„์Šค ์Šคํ„ฐ๋””โ€™(Gantz &

Reinsel, 2011)์— ๋”ฐ๋ฅธ ๋””์ง€ํ„ธ ์ •๋ณด๋Ÿ‰์€ [๊ทธ๋ฆผ 1]

๊ณผ ๊ฐ™๋‹ค.

[๊ทธ๋ฆผ 1]์—์„œ์™€ ๊ฐ™์ด ๋””์ง€ํ„ธ ์œ ๋‹ˆ๋ฒ„์Šค๋Š” 2005

๋…„์—๋Š” 130์—‘์‚ฌ๋ฐ”์ดํŠธ(EB),1) 2010๋…„์—๋Š”

1,227EB(1.3์ œํƒ€๋ฐ”์ดํŠธ: ZB), 2015๋…„๊ฒฝ์—๋Š”

7910EB์— ์ด๋ฅผ ๊ฒƒ์ด๋ผ ์ „๋ง๋œ๋‹ค. 2010๋…„๋„์—

์ด๋ฏธ 1ZB๋ฅผ ๋„˜์–ด์„ฐ๊ณ , 2011๋…„๋„์—๋Š” 1.8ZB์— ์ด

๋ฅผ ๊ฒƒ์ด๋ผ๊ณ  ์ „๋ง๋œ๋‹ค. ์ด๋Š” 5๋…„ ๋งŒ์— 9๋ฐฐ ์ฆ๊ฐ€ํ•œ

๊ฒƒ์ด๋‹ค. ํŒŒ์ผ ๊ฐœ์ˆ˜๋Š” ์ •๋ณด๋Ÿ‰๋ณด๋‹ค ํ›จ์”ฌ ๋นจ๋ฆฌ ์ฆ๊ฐ€

ํ•˜๊ณ  ์žˆ๋Š”๋ฐ, ์•ž์œผ๋กœ 5๋…„ ๋™์•ˆ 8๋ฐฐ ์ด์ƒ, ๋‹ค์Œ 10

๋…„ ๋™์•ˆ์— 75๋ฐฐ ์ฆ๊ฐ€ํ•  ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ๋‹ค. ํ•œํŽธ,

์ •๋ณด์˜ 1/3 ์ •๋„๋งŒ์ด ์ตœ์†Œํ•œ์˜ ๋ณด์•ˆ๊ธฐ๋Šฅ์„ ํƒ‘์žฌ

ํ•  ๊ฒƒ์œผ๋กœ ์ „๋ง๋˜์–ด ๋ณด์•ˆ๋ฌธ์ œ๊ฐ€ ์ง€์†์ ์œผ๋กœ ๋ฐœ์ƒ

ํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋œ๋‹ค. ํ˜„์žฌ 500์ฟผ๋“œ๋ฆด๋ฆฌ์–ธ

(quadrillion: 100๋งŒ์˜ 4์ œ๊ณฑ, 1,000์กฐ) ๊ฐœ์˜

ํŒŒ์ผ๋“ค๊ณผ 1.8ํŠธ๋ฆด๋ฆฌ์–ธ(trillion: 100๋งŒ์˜ ์ œ๊ณฑ, 1

์กฐ) GB๋กœ ์ด๋ฃจ์–ด์ง„ ๋””์ง€ํ„ธ ์œ ๋‹ˆ๋ฒ„์Šค๋Š” 2๋…„๋งˆ๋‹ค 2

๋ฐฐ ์ด์ƒ์”ฉ ์ฆ๊ฐ€ํ•œ๋‹ค๊ณ  ํ•œ๋‹ค.

๊ธฐ์กด ์กฐ์‚ฌ์— ์˜ํ•˜๋ฉด ์ธํ„ฐ๋„ท ํŠธ๋ž˜ํ”ฝ ๊ด€์ ์—์„œ๋Š”

2004๋…„๋„์— ์›” ๋กœ๋ฒŒ ํŠธ๋ž˜ํ”ฝ์–‘์ด ์ตœ์ดˆ๋กœ 1EB๋ฅผ

์ดˆ๊ณผํ•˜ ๋‹ค๊ณ  ํ•˜๋ฉฐ, 2010๋…„ 3์›”์—๋Š” ์›” 21EB์—

์ด๋ฅธ๋‹ค๊ณ  ํ•œ๋‹ค(Warrior, 2010). 2007๋…„ 1์›”

Discovery Institute์˜ Bret Swanson์€โ€˜์—‘์‚ฌ

ํ”Œ๋Ÿฌ๋“œ(exaflood)โ€™๋ผ๋Š” ์šฉ์–ด๋ฅผ ์ด์šฉํ•˜์—ฌ ์—‘์‚ฌ๋ฐ”

์ดํŠธ๊ธ‰์˜ ๊ทœ๋ชจ ํŠธ๋ž˜ํ”ฝ์œผ๋กœ ์ธํ•˜์—ฌ ์ธํ„ฐ๋„ท์€ ํ˜ผ

์žก ๋ถ•๊ดด ํ˜„์ƒ(congestive collapse)์„ ๋‹ค์‹œ ๊ฒช์„

์ง€๋„ ๋ชจ๋ฅธ๋‹ค๊ณ  ๊ฒฝ๊ณ ํ•˜๊ณ  ์žˆ๋‹ค. Cisco(2011a)์—

์˜ํ•˜๋ฉด 2013๋…„๊ฒฝ์—๋Š” ์—ฐ๊ฐ„ ํŠธ๋ž˜ํ”ฝ์ด 2/3ZB ์ฆ‰,

667EB์— ์ด๋ฅผ ๊ฒƒ์œผ๋กœ ์ „๋งํ•˜๊ณ  ์žˆ์œผ๋ฉฐ, ํŠนํžˆ ์ธ

ํ„ฐ๋„ท ๋น„๋””์˜ค๋Š” 2013๋…„์— ๋งค์›” 18EB๊ธ‰์˜ ๋ฐ์ดํ„ฐ

๊ฐ€ ์ƒ์‚ฐ๋  ๊ฒƒ์œผ๋กœ ์˜ˆ์ธกํ•˜๊ณ  ์žˆ๋‹ค. ๋กœ๋ฒŒ ์ด๋™ ๋ฐ

์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ์€ 2008๋…„์—์„œ 2013๋…„๊นŒ์ง€ 131%์˜

์ œ ๊ถŒ ์ œ ํ˜ธ

66 ๋…„ ์›”

1) 1์—‘์‚ฌ๋ฐ”์ดํŠธ(EB: exabyte)=1,000ํŽ˜ํƒ€๋ฐ”์ดํŠธ(PB: petabyte)=1018๋ฐ”์ดํŠธ, 1์ œํƒ€๋ฐ”์ดํŠธ(ZB: zettabyte)=1,000EB=1021๋ฐ”์ดํŠธ, 1์š”ํƒ€๋ฐ”์ดํŠธ(YB:yottabyte)=1,000ZB=1024๋ฐ”์ดํŠธ

[๊ทธ๋ฆผ 1] ๋””์ง€ํ„ธ ์œ ๋‹ˆ๋ฒ„์Šค ์ €์žฅ์šฉ๋Ÿ‰์˜ ํ™•

*์ถœ์ฒ˜: Gantz & Reinsel(2011)

Page 68: nternet I Security - BIGBOOK

์—ฐํ‰๊ท  ์„ฑ์žฅ๋ฅ ์„ ์œ ์ง€ํ•  ๊ฒƒ์œผ๋กœ ์ „๋ง๋˜๋ฉฐ, 2013

๋…„์—๋Š” ๋งค์›” 2EB๋ฅผ ์ดˆ๊ณผํ•  ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ๋‹ค.

์ด๋Ÿฌํ•œ ๋ฐ์ดํ„ฐ ์ฆ๊ฐ€ ํ˜„์ƒ์˜ ๊ทผ๋ณธ์ ์ธ ์ด์œ ๋Š”

[๊ทธ๋ฆผ 2]์™€ ๊ฐ™์ด ๋ฐ์ดํ„ฐ ์ƒ์„ฑ, ์บก์ฒ˜, ๊ด€๋ฆฌ ๋ฐ ์ €์žฅ

์— ๊ด€๋ จ๋œ ๊ธฐ์ˆ ๋“ค์˜ ๋ฐœ์ „์— ๋”ฐ๋ฅธ ๊ฒƒ์ด๋‹ค. 2005๋…„

๋„์˜ ๋™์ผํ•œ ๊ธฐ์ˆ ๋“ค์— ๋น„๊ตํ•˜๋ฉด 2011๋…„๋„์˜ ๋ฐ์ด

ํ„ฐ ๊ด€๋ จ ๊ธฐ์ˆ ๋“ค์˜ ๋น„์šฉ์€ 1/6์— ๋ถˆ๊ณผํ•˜๋‹ค. ๋˜ํ•œ,

๊ธฐ์—…๋“ค์˜ ํˆฌ์ž ์ฆ๊ฐ€์™€ ํ•˜๋“œ์›จ์–ด, ์†Œํ”„ํŠธ์›จ์–ด ๋ฐ

์ธ๋ ฅ๋“ค ๋˜ํ•œ ๋””์ง€ํ„ธ ์œ ๋‹ˆ๋ฒ„์Šค์˜ ์ฆ๊ฐ€์— ์ด๋ฐ”์ง€ํ•˜

๋‹ค. ์ด๋ฏธ ๊ฐœ์ธ ์ปดํ“จํ„ฐ์—์„œ ๋ฉ€ํ‹ฐ ํ…Œ๋ผ๋ฐ”์ดํŠธ ํ•˜

๋“œ๋””์Šคํฌ ์‚ฌ์šฉ์ด ๋ณดํŽธํ™”๋˜๊ณ  ์žˆ์œผ๋ฉฐ, 2011๋…„ ํ˜„

์žฌ 2TB ํ•˜๋“œ๋””์Šคํฌ ๊ฐ€๊ฒฉ์ด 10๋งŒ์› ์ดํ•˜๋กœ ์œ ์ง€๋˜

๊ณ  ์žˆ๋Š” ์‚ฌ์‹ค์€ ๋”์šฑ๋” ๋น ๋ฅธ ๋””์ง€ํ„ธ ์ •๋ณด์˜ ์–‘ ํ™•

์— ๊ธฐ์—ฌํ•  ๊ฒƒ์ด๋‹ค.

ํ–ฅํ›„ 10๋…„ ๋™์•ˆ ์„œ๋ฒ„์˜ ์ˆ˜ ๋˜ํ•œ 10๋ฐฐ ์ด์ƒ์œผ๋กœ

์ฆ๊ฐ€ํ•˜๊ณ , ๋ฐ์ดํ„ฐ์„ผํ„ฐ์— ์˜ํ•ด์„œ ์ฒ˜๋ฆฌ๋˜๋Š” ์ •๋ณด์˜

์–‘๋„ 50๋ฐฐ ์ด์ƒ, ๋ฐ์ดํ„ฐ์„ผํ„ฐ์˜ ํŒŒ์ผ๋“ค ๋˜ํ•œ 75๋ฐฐ

์ด์ƒ ์ฆ๊ฐ€ํ•  ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ๋‹ค. ์ด๋Ÿฌํ•œ ๋ฐ์ดํ„ฐ์„ผํ„ฐ

๊ธฐ๋ฐ˜์˜ ์ปดํ“จํŒ… ํ™˜๊ฒฝ์€ ํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ…์œผ๋กœ ๋ถˆ๋ฆฌ

๋ฉฐ [๊ทธ๋ฆผ 3]๊ณผ ๊ฐ™์ด ํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ…์— ์˜ํ•œ ์ •๋ณด

์ฒ˜๋ฆฌ๊ฐ€ 2015๋…„์—๋Š” 20%๊นŒ์ง€ ์ฆ๊ฐ€ํ•  ๊ฒƒ์œผ๋กœ ์ „๋ง

๋œ๋‹ค. ํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ…์€ ๊ฐ€์ƒํ™”์™€ ํ•จ๊ป˜ ์ •๋ณด์ฒ˜๋ฆฌ

ํ”„๋ ˆ์ž„์›Œํฌ๋กœ ๋น ๋ฅด๊ฒŒ ๋ฐœ์ „ํ•˜๊ณ  ์žˆ๋‹ค. ํ•˜์ง€๋งŒ, ํด

๋ผ์šฐ๋“œ ์ปดํ“จํŒ…์—์„œ๋Š” ๋ฐ์ดํ„ฐ ํฌ๋งท ๋ณ€ํ™˜, ํ†ตํ•ฉ์ ์ธ

๊ด€๋ฆฌ, ์„œ๋น„์Šค์ˆ˜์ค€ ๋ณด์žฅ, ๋ณด์•ˆ, ๋ฐฑ์—…, ์žฌ๋‚œ๊ด€๋ฆฌ, ๋ฐ

์ดํ„ฐ์ „์†ก, ํ˜ธํ™˜์„ฑ ๋ฐ ์ •์ฑ… ๋“ฑ์˜ ๋งŽ์€ ์‚ฐ์žฌํ•œ ๋ฌธ์ œ

์ ์ด ๋‚จ์•„์žˆ๋‹ค.

Internet Security(2010)์— ์˜ํ•˜๋ฉด ๋งŽ์€ ๊ธฐ๊ด€

์˜ ํŠธ๋ž˜ํ”ฝ ์„ฑ์žฅ๋ฅ ์€ <ํ‘œ 1>์—์„œ์™€ ๊ฐ™์ด ์—ฐํ‰๊ท 

40๏ฟฝ50%๋กœ ๊ด€์ธก๋˜๊ณ  ์žˆ๋‹ค. ๋ฏธ๋„ค์†Œํƒ€ ์ธํ„ฐ๋„ท ํŠธ

๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ ํญ์ฆํ˜„์ƒ๊ณผ ์ฝ˜ํ…์ธ  ์ค‘์‹ฌ ๋„คํŠธ์›Œํ‚น ๊ธฐ์ˆ 

Internet and Information Security 67

[๊ทธ๋ฆผ 3] ํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ…์— ์˜ํ•œ ์ •๋ณด์ฒ˜๋ฆฌ

*์ถœ์ฒ˜: Gantz & Reinsel(2011)

[๊ทธ๋ฆผ 2] ๋””์ง€ํ„ธ ์ •๋ณด๋น„์šฉ๊ณผ ํˆฌ์ž๋น„์šฉ: ๊ธฐ๊ฐ€๋ฐ”์ดํŠธ๋‹น ์†Œ์š”๋น„์šฉ

*์ถœ์ฒ˜: Gantz & Reinsel(2011)

Page 69: nternet I Security - BIGBOOK

๋ž˜ํ”ฝ ์—ฐ๊ตฌ(MINTS: Minnesota Internet

Traffic Studies) ํ”„๋กœ์ ํŠธ์—์„œ๋Š” ๋งŽ์€ ๊ณต๊ณต๊ธฐ

๊ด€์˜ ๊ฐ€์šฉ ๋ฐ์ดํ„ฐ๋“ค์„ ์ด์šฉํ•˜์—ฌ 2009๋…„ ์ดํ›„ ์—ฐ

ํ‰๊ท  ์ธํ„ฐ๋„ท ํŠธ๋ž˜ํ”ฝ ์„ฑ์žฅ๋ฅ ์ด 40๏ฟฝ50%๋กœ ๊ด€์ฐฐ๋œ

๋‹ค๊ณ  ํ•˜ ๊ณ , ๋ฐ์ดํ„ฐ๋Š” ๋งค์›” 7.5๏ฟฝ12EB ์ˆ˜์ค€์œผ๋กœ

์ „๋งํ•˜ ๋‹ค. Cisco(2011a)์—์„œ๋Š” ๋งค์›” 11EB์˜

๋กœ๋ฒŒ IP ํŠธ๋ž˜ํ”ฝ๊ณผ 40%์˜ ์—ฐํ‰๊ท  ์„ฑ์žฅ๋ฅ ์„ ์˜ˆ์ƒ

ํ•˜ ๋‹ค. ์ผ๋ณธ IIJ(Internet Initiative Japan)์˜

Kenjiro Cho๋Š” ์ผ๋ณธ ๋‚ด 7๊ฐœ ISP๋“ค์˜ ํ˜‘์กฐ๋ฅผ ํ†ต

ํ•ด ์‹ค์ œ ์ธํ„ฐ๋„ท๋ง์˜ ํŠธ๋ž˜ํ”ฝ์„ ๋ชจ๋‹ˆํ„ฐ๋งํ•œ ๊ฒฐ๊ณผ

2005๋…„๋ถ€ํ„ฐ ๋งค๋…„ 40%์˜ ์ธํ„ฐ๋„ท ํŠธ๋ž˜ํ”ฝ ์„ฑ์žฅ๋ฅ ์„

๋ฐœํ‘œํ•˜ ๋‹ค. ๋˜ํ•œ, Arbor Networks, Metri

Networks ๋ฐ ๋ฏธ์‹œ๊ฐ„ ํ•™๊ต ๋“ฑ์˜ ๊ณต๋™์—ฐ๊ตฌ์ธ

Labovitz et al.(2010)์€ ์—ฐํ‰๊ท  45%์˜ ์„ฑ์žฅ๋ฅ ๊ณผ

์ œ ๊ถŒ ์ œ ํ˜ธ

68 ๋…„ ์›”

Study Name Traffic Volume (exabytes/month) Annual Growth Rate

MINTS 7.5-12 40-50%

Cisco VNI 11 40%

Cho et al. 0.7 (Japanese domestic) 40%

ATLAS 9 40%

<ํ‘œ 1> ๋‹ค์–‘ํ•œ ๊ธฐ๊ด€๋“ค์˜ ์ธํ„ฐ๋„ท ํŠธ๋ž˜ํ”ฝ ์„ฑ์žฅ๋ฅ ๊ณผ ๋งค์›” ํŠธ๋ž˜ํ”ฝ์–‘์˜ ๊ด€์ฐฐ๊ฒฐ๊ณผ

*์ถœ์ฒ˜: Internet Security(2010)

IP Traffic, 2010-2015

Year 2010 2011 2012 2013 2014 2015CAGR

2010-2015

By Type (PB per Month)

Fixed Internet 14,955 20,650 27,434 35,879 46,290 59,354 32%

Managed IP 4,989 6,839 9,014 11,352 13,189 14,848 24%

Mobile data 237 546 1,163 2,198 3,806 6,254 92%

By Segment (PB per Month)

Consumer 16,221 23,130 31,592 42,063 54,270 70,045 34%

Business 3,930 4,894 6,011 7,357 8,997 10,410 22%

By Geography (PB per Month)

North America 6,998 9,947 12,978 16,116 18,848 22,274 26%

Western Europe 4,776 6,496 8,819 11,774 15,187 18,858 32%

Asia Pacific 5,368 7,317 9,847 13,341 18,060 24,150 35%

Japan 1,414 1,923 2,540 3,283 4,019 4,762 27%

Latin America 665 993 1,465 2,158 3,238 4,681 48%

Central and Eastern Europe 708 1,004 1,413 1,955 2,700 3,713 39%

Middle East and Africa 253 366 550 802 1,235 2,019 52%

Total (PB per Month)

Total IP traffic 20,151 28,023 37,603 49,420 63,267 80,456 32%

<ํ‘œ 2> ์ „ ์„ธ๊ณ„ IP ํŠธ๋ž˜ํ”ฝ ์„ฑ์žฅ์— ํ•œ ์˜ˆ์ƒ

*์ถœ์ฒ˜: Cisco(2011a)

Page 70: nternet I Security - BIGBOOK

๋งค์›” 9EB์˜ ํŠธ๋ž˜ํ”ฝ์–‘์„ ๋ณด๊ณ ํ•˜ ๋‹ค.

Cisco(2011a)๋Š” <ํ‘œ 2>์™€ ๊ฐ™์ด 2010๏ฟฝ2015๋…„

๋„ ์ „ ์„ธ๊ณ„ ์ธํ„ฐ๋„ท ํŠธ๋ž˜ํ”ฝ์€ ์—ฐํ‰๊ท  32%, ๋ชจ๋ฐ”์ผ

๋ฐ์ดํ„ฐ๋Š” ์—ฐํ‰๊ท  92%์˜ ์„ฑ์žฅ์„ ๋ณด์ด๋ฉฐ, 2015๋…„

๋„์—๋Š” 1ZB์— ์ด๋ฅผ ๊ฒƒ์œผ๋กœ ์ „๋งํ–ˆ๋‹ค. 2015๋…„๋„

์—๋Š” IP ๋„คํŠธ์›Œํฌ์— ์—ฐ๊ฒฐ๋˜๋Š” ์žฅ๋น„๊ฐ€ ์ „ ์„ธ๊ณ„ ์ธ

๊ตฌ์˜ 2๋ฐฐ๊ฐ€ ๋  ๊ฒƒ์ด๋ฉฐ, PC๊ฐ€ ์•„๋‹Œ ์žฅ๋น„์˜ ํŠธ๋ž˜ํ”ฝ

์ด 2010๋…„๋„ 3%์—์„œ 2015๋…„๋„์—๋Š” 15%๊นŒ์ง€

์ฆ๊ฐ€ํ•  ๊ฒƒ์œผ๋กœ ์ „๋งํ–ˆ๋‹ค. ํŠนํžˆ, PC ํŠธ๋ž˜ํ”ฝ์˜ ์ฆ

๊ฐ€์œจ์€ ์—ฐํ‰๊ท  33% ์ •๋„์ง€๋งŒ, TV, ํƒœ๋ธ”๋ฆฟ, ์Šค๋งˆ

ํŠธํฐ ๊ทธ๋ฆฌ๊ณ  ์‚ฌ๋ฌผ์ง€๋Šฅํ†ต์‹ (M2M: Machine-

to-Machine) ํŠธ๋ž˜ํ”ฝ์€ ๊ฐ๊ฐ 101%, 216%,

144% ๋ฐ 258%์˜ ์ฆ๊ฐ€์œจ์„ ๋ณด์ผ ๊ฒƒ์œผ๋กœ ์ „๋งํ•˜

๊ณ  ์žˆ๋‹ค.

์†Œ๋น„์ž ์ธํ„ฐ๋„ท ํŠธ๋ž˜ํ”ฝ ํญ์ฆ์˜ ์ฃผ๋œ ์š”์ธ์€

<ํ‘œ 3>์—์„œ์™€ ๊ฐ™์ด ๋ชจ๋ฐ”์ผ ๋ฐ์ดํ„ฐ์™€ ํŒŒ์ผ ๊ณต์œ 

๋ฐ ๋น„๋””์˜ค ์‘์šฉ์— ์˜ํ•œ ๊ฒƒ์ด๋‹ค. ์†Œ๋น„์ž ๋ถ€๋ฌธ์—์„œ

๋ชจ๋ฐ”์ผ ๋ฐ์ดํ„ฐ๋Š” 95%, ์ธํ„ฐ๋„ท ๋น„๋””์˜ค์™€ ๋น„๋””์˜ค

ํšŒ์˜ ๋“ฑ์ด ๊ฐ๊ฐ 48%์™€ 41%์˜ ์—ฐํ‰๊ท  ์„ฑ์žฅ๋ฅ ์„

๋ณด์—ฌ์ฃผ๊ณ  ์žˆ๋‹ค. ํŠนํžˆ, ๋น„ํŠธํ† ๋ ŒํŠธ(BitTorrent)

์™€ ๊ฐ™์€ P2P ๋˜๋Š” ์›น ๊ธฐ๋ฐ˜์˜ ํŒŒ์ผ๊ณต์œ ์— ์˜ํ•œ ํŠธ

๋ž˜ํ”ฝ์€ ์—ฐํ‰๊ท  23% ์ฆ๊ฐ€์œจ์„ ๋ณด์ด์ง€๋งŒ, ํŠธ๋ž˜ํ”ฝ

์–‘์œผ๋กœ ๋ณด๋ฉด 2015๋…„๊ฒฝ์—๋Š” 1.4EB์— ์ด๋ฅผ ๊ฒƒ์œผ

๋กœ ์ „๋ง๋œ๋‹ค.

๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ ํญ์ฆํ˜„์ƒ๊ณผ ์ฝ˜ํ…์ธ  ์ค‘์‹ฌ ๋„คํŠธ์›Œํ‚น ๊ธฐ์ˆ 

Internet and Information Security 69

*์ถœ์ฒ˜: Cisco(2011a)

Consumer Internet Traffic, 2010-2015

Year 2010 2011 2012 2013 2014 2015CAGR

2010-2015

By Network (PB per Month)

Fixed 12,355 17,467 23,618 31,318 40,842 53,282 34%

Mobile 174 399 858 1,654 2,930 4,931 95%

By Subsegment (PB per Month)

File sharing 4,968 6,017 7,277 8,867 11,040 13,797 23%

Internet video 4,672 8,079 12,146 17,583 24,357 33,620 48%

Web, email, and date 2,393 3,113 4,146 5,325 6,769 8,592 29%

Video calling 308 442 659 905 1,251 1,736 41%

Online gaming 49 68 95 133 187 290 43%

Voice over IP (VoIP) 138 147 153 157 160 168 4%

Oter 0 1 1 3 8 11 132%

By Geography (PB per Month)

North America 3,301 5,000 6,579 8,305 10,012 12,537 31%

Western Europe 3,147 4,360 6,075 8,224 10,841 13,896 35%

Asia Pacific 4,403 6,006 8,142 11,129 15,249 20,758 36%

Japan 638 932 1,317 1,807 2,344 2,968 36%

Latin America 482 735 1,106 1,667 2,577 3,850 52%

Central and Eastern Europe 454 667 971 1,381 1,963 2,805 44%

Middle East and Africa 103 166 286 459 784 1,399 68%

Total (PB per Month)

Consumer Internet traffic 12,528 17,866 24,476 32,973 43,771 58,214 36%

<ํ‘œ 3> ์‘์šฉ๋ณ„ ์ „ ์„ธ๊ณ„ ์†Œ๋น„์ž IP ํŠธ๋ž˜ํ”ฝ ์„ฑ์žฅ์— ํ•œ ์˜ˆ์ƒ

Page 71: nternet I Security - BIGBOOK

2. ์ธํ„ฐ๋„ท ๋ฐฑ๋ณธ ์ฝ”์–ด๋ง์˜ ํŒจ๋Ÿฌ๋‹ค์ž„ ๋ณ€ํ™”

Arbor Networks์‚ฌ๋Š” ATLAS Internet

Observatory ํ”„๋กœ์ ํŠธ๋ฅผ ํ†ตํ•˜์—ฌ 2007๋…„์—์„œ

2009๋…„ ์‚ฌ์ด ์ „ ์„ธ๊ณ„ ์ฃผ์š” 110๊ฐœ ์ด์ƒ์˜ ISP์—

ํ•œ ํŠธ๋ž˜ํ”ฝ์„ ๋ชจ๋‹ˆํ„ฐ๋ง ํ•œ ๊ฒฐ๊ณผ๋ฅผ NANOG47

๋ฏธํŒ…๊ณผ ACM SIGCOMM(Labovitz et al., 2010)

์—์„œ ๋ฐœํ‘œํ•˜ ๋‹ค. ์ฃผ์š” ๋‚ด์šฉ์€ ๋น„๋””์˜ค ํŠธ๋ž˜ํ”ฝ์˜ ์ฆ

๊ฐ€, ์ธํ„ฐ๋„ท ๊ตฌ์กฐ๊ฐ€ ํ‰ํ™œํ•ด์ง€๋Š” ์ ๊ณผ ๊ตฌ ํŠธ๋ž˜ํ”ฝ์˜

๋„์•ฝ ๋“ฑ์œผ๋กœ ์š”์•ฝ๋œ๋‹ค. ํ‘œ์ ์œผ๋กœ 2007๋…„๊ณผ 2009

๋…„๋„ Top 10 ISP์˜ ์ธํ„ฐ๋„ท ํŠธ๋ž˜ํ”ฝ ์œ ํ†ต๋Ÿ‰์„ ๋น„๊ต

ํ•œ ๊ฒฐ๊ณผ <ํ‘œ 4>์—์„œ์™€ ๊ฐ™์ด Google๊ณผ Comcast

๊ฐ€ ์ฃผ์š” ํŠธ๋ž˜ํ”ฝ ์ œ๊ณต์—…์ฒด๋กœ ๋“ฑ์žฅํ•œ ์ ์ด๋‹ค.

Google์€ ์ „ ์„ธ๊ณ„ ์ธํ„ฐ๋„ท ํŠธ๋ž˜ํ”ฝ์˜ 6% ์ •๋„๋ฅผ

๋‹ด๋‹นํ•˜๊ณ  ์žˆ๊ณ , ๋งค๋…„ ๋น ๋ฅธ ์†๋„๋กœ ์„ฑ์žฅํ•˜๊ณ  ์žˆ๋‹ค.

[๊ทธ๋ฆผ 4]์™€ ๊ฐ™์ด 2007๋…„ ์ด์ „๊นŒ์ง€ ์ปดํ“จํ„ฐ ๋„คํŠธ์›Œ

ํฌ์˜ ๊ตฌ์กฐ๋Š” Tier-1 ISP(Sprint, MCI, AGIS,

UUnet, PSINet ๋“ฑ) ์ค‘์‹ฌ์˜ ๊ณ„์ธต์ ์ธ ๋ชจ์Šต์„ ๋ณด

์—ฌ์™”๋‹ค. ํ•˜์ง€๋งŒ, Arbor Networks์—์„œ ์‹ค์ œ ์ฃผ์š”

์ธํ„ฐ๋„ท ์ฝ”์–ด ํŠธ๋ž˜ํ”ฝ์„ ๊ด€์ฐฐํ•œ ๊ฒฐ๊ณผ ๋กœ๋ฒŒ Tier-

1 ISP๋“ค๋งŒ์ด ์ธํ„ฐ๋„ท ๋ฐฑ๋ณธ์˜ ์ฃผ์š” ์ฝ”์–ด ์—ญํ• ์„ ํ•˜

๋Š” ๊ฒƒ์€ ์•„๋‹ˆ๋ผ๋Š” ์‚ฌ์‹ค์ด ๋ฐํ˜€์กŒ๋‹ค. ์ฆ‰, [๊ทธ๋ฆผ 5]

์™€ ๊ฐ™์ด ์ฝ˜ํ…์ธ  ์ค‘์‹ฌ์˜ Google๊ณผ ๋ธŒ๋กœ๋“œ๋ฐด๋“œ ๊ฐ€

์ž…์ž๋ง์ธ Comcast๊ฐ€ Tier-1 ๋ฐฑ๋ณธ์˜ ์œ„์น˜์— ํฌํ•จ

๋˜์–ด์•ผ ํ•œ๋‹ค๋Š” ๊ฒƒ์ด๋‹ค.

๋˜ํ•œ, ์ด์—ฐ๊ตฌ์—์„œ๋Š”150์—ฌ๊ฐœ์˜AS(Autonomous

System)๊ฐ€ ์ „์ฒด ์ธํ„ฐ๋„ท ํŠธ๋ž˜ํ”ฝ์˜ 50% ์ •๋„๋ฅผ ๋‹ด

๋‹นํ•˜๊ณ  ์žˆ์œผ๋ฉฐ, Akamai์™€ LimeLight ๋“ฑ์˜ CDN

์—…์ฒด๋“ค์ด 10%์˜ ํŠธ๋ž˜ํ”ฝ์„ ์œ ํ†ตํ•˜๊ณ  ์žˆ๋Š” ๊ฒƒ์œผ๋กœ

๋‚˜ํƒ€๋‚ฌ๋‹ค. ์ด๋Ÿฌํ•œ ๊ฒฐ๊ณผ๋Š”โ€˜์ฝ˜ํ…์ธ โ€™๊ฐ€ ํ•ต์‹ฌ์ ์ธ ํŠธ

๋ž˜ํ”ฝ์˜ ๊ทผ๊ฐ„์— ์žˆ๋‹ค๋Š” ๊ฒƒ์„ ๋ณผ ์ˆ˜ ์žˆ๋‹ค. Google์€

์ฝ˜ํ…์ธ ์— ํ•œ ๊ด‘๊ณ ๋ฅผ ํ†ตํ•ด ๊ฒ€์ƒ‰์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜

๊ณ  ์žˆ์œผ๋ฉฐ, ์ด๋Ÿฌํ•œ ์ฝ˜ํ…์ธ  ์œ ํ†ต์„ ์ „๋‹ดํ•˜๋Š” CDN

์˜ ์ค‘์š”์„ฑ์ด ๋ถ€๊ฐ๋˜๊ณ  ์žˆ๋Š” ๊ฒƒ์ด๋‹ค. ๋˜ํ•œ, ๋ธŒ๋กœ๋“œ

๋ฐด๋“œ ๋„คํŠธ์›Œํฌ๋ฅผ ํ†ตํ•ด ๋งŽ์€ ํŠธ๋ž˜ํ”ฝ์ด ์œ ํ†ต๋˜๊ณ  ์žˆ

๊ธฐ ๋•Œ๋ฌธ์— Comcast์™€ ๊ฐ™์€ ๊ฐ€์ž…์ž ๋„คํŠธ์›Œํฌ์˜ ์ค‘

์š”์„ฑ๋„ ํ•จ๊ป˜ ๋ณผ ์ˆ˜ ์žˆ๋‹ค. ๊ทธ๋ฆฌ๊ณ  <ํ‘œ 5>์—์„œ ์ธํ„ฐ๋„ท

์‘์šฉ์˜ ๋ณ€ํ™”๋ฅผ ๋ณด์—ฌ์ฃผ๊ณ  ์žˆ๋Š”๋ฐ, Web ํŠธ๋ž˜ํ”ฝ์ด

2009๋…„ 52%์˜ ์ ์œ ์œจ์„ ๋ณด์—ฌ์ฃผ๊ณ  ์žˆ๋‹ค. ์ด๋Š”

YouTube์™€ ๊ฐ™์ด HTTP ํ”„๋กœํ† ์ฝœ์„ ์ด์šฉํ•˜์—ฌ ์ „

์ œ ๊ถŒ ์ œ ํ˜ธ

70 ๋…„ ์›”

(a) Top Ten 2007

Rank Provider Percentage

1 Level(3) 9.41

2 Global Crossing 5.7

3 Google 5.2

4

5

6 Comcast 3.12

7

8

9

10

(b) Top Ten 2009

Rank Provider Percentage

1 Level(3) 5.77

2 Global Crossing 4.55

3 ATT 3.35

4 Sprint 3.2

5 NTT 2.6

6 Cogent 2.77

7 Verizon 2.24

8 TeliaSonera 1.82

9 Savvis 1.35

10 AboveNet 1.23

<ํ‘œ 4> Arbor Networks์˜ ์ธํ„ฐ๋„ท ํŠธ๋ž˜ํ”ฝ ๊ด€์ฐฐ๊ฒฐ๊ณผ: Top 10 ISP

*์ถœ์ฒ˜: Labovitz et al.(2010)

Page 72: nternet I Security - BIGBOOK

์†ก๋˜๋Š” ๋น„๋””์˜ค ํŠธ๋ž˜ํ”ฝ์ด ํฌํ•จ๋˜์—ˆ๊ธฐ ๋•Œ๋ฌธ์ธ๋ฐ, ๋…

๋ฆฝ์ ์ธ Video ์‘์šฉ ํŠธ๋ž˜ํ”ฝ๊ณผ P2P ํŒŒ์ผ ๊ณต์œ  ๋“ฑ์„

ํฌํ•จํ•˜๋ฉด, ๋น„๋””์˜ค ๊ด€๋ จ ํŠธ๋ž˜ํ”ฝ์ด ์ „์ฒด ์ธํ„ฐ๋„ท ํŠธ๋ž˜

ํ”ฝ์˜ 60% ๊ฐ€๊นŒ์ด ์ฐจ์ง€ํ•˜๊ณ  ์žˆ์Œ์„ ์•Œ ์ˆ˜ ์žˆ๋‹ค.

๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ ํญ์ฆํ˜„์ƒ๊ณผ ์ฝ˜ํ…์ธ  ์ค‘์‹ฌ ๋„คํŠธ์›Œํ‚น ๊ธฐ์ˆ 

Internet and Information Security 71

[๊ทธ๋ฆผ 4] ์ „ํ†ต์ ์ธ ์ธํ„ฐ๋„ท ๊ตฌ์กฐ*์ถœ์ฒ˜: Labovitz et al.(2010)

[๊ทธ๋ฆผ 5] Arbor Networks์˜ ๊ด€์ฐฐ๊ฒฐ๊ณผ: ์ƒˆ๋กœ์šด ์ธํ„ฐ๋„ท ๊ตฌ์กฐ

*์ถœ์ฒ˜: Labovitz et al.(2010)

*์ถœ์ฒ˜: Labovitz et al.(2010)

Rank Application 2007 2009 Change

3 VPN 1.04 1.41 +0.38

4 Email 1.41 1.38 -0.03

5 News 1.75 0.97 -0.78

6 P2P 2.96 0.85* -2.11

7 Games 0.38 0.49 +0.12

8 SSH 0.19 0.28 -0.08

9 DNS 0.20 0.17 -0.04

10 FTP 0.21 0.14 -0.07

Other 2.56 2.67 +0.11

Unclassified 46.03 37.00 -9.03

Rank Application 2007 2009 Change

1 Web 41.68 52.00 +10.31

2 Video 1.58 2.64 +1.05

<ํ‘œ 5> Arbor Networks์˜ ๊ด€์ฐฐ๊ฒฐ๊ณผ: ์ธํ„ฐ๋„ท ์‘์šฉ

์ ์œ ์œจ ๋ณ€ํ™”

Page 73: nternet I Security - BIGBOOK

3. ๋ชจ๋ฐ”์ผ ํŠธ๋ž˜ํ”ฝ ์ฆ๊ฐ€

ํ•œํŽธ, ๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ์˜ ์ฃผ์š” ์š”์ธ ์ค‘ ํ•˜๋‚˜๋Š” ์Šค

๋งˆํŠธํฐ์ด๋‚˜ ํƒœ๋ธ”๋ฆฟ๊ณผ ๊ฐ™์€ ๋ชจ๋ฐ”์ผ ๋‹จ๋ง๊ธฐ์˜ ๊ธ‰์ฆ

์œผ๋กœ ์ธํ•œ ํ˜„์ƒ์ด๋‹ค. [๊ทธ๋ฆผ 6]์— ์˜ํ•˜๋ฉด, 2010๋…„

์—์„œ 2015๋…„ ์‚ฌ์ด ์—ฐํ‰๊ท  ์„ฑ์žฅ๋ฅ ์ด 92%๊ฐ€ ๋˜๋ฉฐ,

2015๋…„ 6.3EB๋กœ ์ „๋ง๋œ๋‹ค.

๊ตญ๋‚ด์œ ๋ฌด์„ ์ธํ„ฐ๋„ท์‚ฌ์šฉ์ž์˜์ฆ๊ฐํ˜„ํ™ฉ์€[๊ทธ๋ฆผ7]

์—์„œ ์‚ดํŽด๋ณผ ์ˆ˜ ์žˆ๋Š”๋ฐ, ์‹œ๋‚ด์ „ํ™”์™€ ์ธํ„ฐ๋„ท ๊ฐ€์ž…์ž

์™€ ๋‹ฌ๋ฆฌ ์ด๋™ํ†ต์‹  ๊ฐ€์ž…์ž ์ˆ˜๊ฐ€ ๊พธ์ค€ํžˆ ์ฆ๊ฐ€ํ•˜๊ณ  ์žˆ

์Œ์„ ์•Œ ์ˆ˜ ์žˆ๋‹ค. ํŠนํžˆ, ์•„์ดํฐ๊ณผ ๊ฐ™์€ ์Šค๋งˆํŠธํฐ์˜

์ธ๊ธฐ๋กœ ์ธํ•˜์—ฌ 2011๋…„ 7์›” ํ˜„์žฌ 1,500๋งŒ ๋ช…์˜ ์Šค๋งˆ

ํŠธํฐ ๊ฐ€์ž…์ž๋“ค์ด ๋ฐœ์ƒํ•˜ ๋Š”๋ฐ, 2011๋…„ ๋‚ด๋กœ 2,000

๋งŒ ๋ช…์˜ ์Šค๋งˆํŠธํฐ ๊ฐ€์ž…์ž ์ˆ˜๋ฅผ ์˜ˆ์ธกํ•˜๊ณ  ์žˆ๋‹ค.

ํŠธ์œ„ํ„ฐ, ํŽ˜์ด์Šค๋ถ ๋ฐ ์นด์นด์˜คํ†ก ๋“ฑ์˜ ์†Œ์…œ๋„คํŠธ์›Œ

ํฌ์„œ๋น„์Šค(SNS) ์‘์šฉ์˜ ์ธ๊ธฐ์™€ ๋”๋ถˆ์–ด ์Šค๋งˆํŠธํฐ

์ œ ๊ถŒ ์ œ ํ˜ธ

72 ๋…„ ์›”

*์ถœ์ฒ˜: Cisco(2011b)

[๊ทธ๋ฆผ 7] ๊ตญ๋‚ด ์œ ๋ฌด์„  ์„œ๋น„์Šค ๊ฐ€์ž…์ž ์ˆ˜ ๋ณ€ํ™”

*์ถœ์ฒ˜: ๋ฐฉ์†กํ†ต์‹ ์œ„์›ํšŒโˆ™ํ•œ๊ตญ์ •๋ณดํ†ต์‹ ์ง„ํฅํ˜‘ํšŒ(2011)

[๊ทธ๋ฆผ 6] ๋ชจ๋ฐ”์ผ ๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ ์ฆ๊ฐ€ ์˜ˆ์ธก

Page 74: nternet I Security - BIGBOOK

๊ฐ€์ž…์ž ์ˆ˜๊ฐ€ ๊ธ‰์†ํžˆ ๋Š˜๊ณ  ์žˆ์œผ๋ฉฐ, ์ด๋กœ ์ธํ•˜์—ฌ ์šฐ

๋ฆฌ๋‚˜๋ผ ๋ฌด์„  ๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ์–‘์ด ๊ธ‰์ฆํ•˜๊ณ  ์žˆ๋‹ค.

[๊ทธ๋ฆผ 8]์—์„œ์™€ ๊ฐ™์ด 2011๋…„ 1์›” SKํ…”๋ ˆ์ฝค, KT,

LG ์œ ํ”Œ๋Ÿฌ์Šค ํ†ต์‹  3์‚ฌ์˜ ๋ฌด์„  ๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ์€

์ด 5,467TB ๋Š”๋ฐ 6์›”์—๋Š” 10,116TB๋กœ ์ฆ๊ฐ€ํ–ˆ

๋‹ค. ๋ฌด์„  ๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ์€ ๋™ ์ƒ ์ŠคํŠธ๋ฆฌ๋ฐ, ํด๋ผ

์šฐ๋“œ ์„œ๋น„์Šค, SNS ์‘์šฉ ๋“ฑ์„ ์†์‰ฝ๊ฒŒ ์‚ฌ์šฉํ•  ์ˆ˜

์žˆ๋Š” ์Šค๋งˆํŠธํฐ์˜ ์ธ๊ธฐ์™€ ํ•จ๊ป˜ ํญ์ฆํ•˜๊ณ  ์žˆ๋Š”๋ฐ,

ํŠนํžˆ ๊ตญ๋‚ด์—์„œ๋Š” ๋ฌด์ œํ•œ ๋ฐ์ดํ„ฐ ์š”๊ธˆ์ œ๋ฅผ ์‹ค์‹œํ•˜

์—ฌ ํ…Œ๋”๋ง์„ ํ†ตํ•œ ๋…ธํŠธ๋ถ์˜ ํŠธ๋ž˜ํ”ฝ๋„ ํฌํ•จ๋˜์–ด ๋”

์šฑ ๋งŽ์€ ์ฆ๊ฐ€๋Ÿ‰์„ ๋ณด์ด๊ณ  ์žˆ๋‹ค.

Cisco(2011b)์— ์˜ํ•˜๋ฉด ์ง€๋‚œ 2009๋…„ ์ค‘์ˆœ๋ถ€ํ„ฐ

2010๋…„ ์ค‘์ˆœ๊นŒ์ง€ KT๋Š” 344%, SKํ…”๋ ˆ์ฝค์€

232%, LG ์œ ํ”Œ๋Ÿฌ์Šค๋Š” 114% ๋ชจ๋ฐ”์ผ ๋ฐ์ดํ„ฐ ํŠธ๋ž˜

ํ”ฝ์˜ ์ฆ๊ฐ€๊ฐ€ ๊ด€์ฐฐ๋˜์—ˆ๋‹ค. ํŠนํžˆ, KT๋Š” 2009๋…„๋ถ€

ํ„ฐ 2012๋…„๊นŒ์ง€ 49๋ฐฐ์˜ ๋ชจ๋ฐ”์ผ ๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ ์ฆ

๊ฐ€๊ฐ€ ์˜ˆ์ธก๋˜๊ณ  ์žˆ๋‹ค. [๊ทธ๋ฆผ 9]์—์„œ๋Š” ๋‹จ๋ง๊ธฐ๋ณ„๋กœ

๋ชจ๋ฐ”์ผ ํŠธ๋ž˜ํ”ฝ ์ฆ๊ฐ€ ํŒจํ„ด ์˜ˆ์ธก์„ ๋ณผ ์ˆ˜ ์žˆ๋Š”๋ฐ,

๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ ํญ์ฆํ˜„์ƒ๊ณผ ์ฝ˜ํ…์ธ  ์ค‘์‹ฌ ๋„คํŠธ์›Œํ‚น ๊ธฐ์ˆ 

Internet and Information Security 73

[๊ทธ๋ฆผ 9] ๋ชจ๋ฐ”์ผ ๋‹จ๋ง๊ธฐ๋ณ„ ๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ ์ฆ๊ฐ€*์ถœ์ฒ˜: Cisco(2011b)

*์ถœ์ฒ˜: ๊ฐ•ํฌ์ข…(2011)[๊ทธ๋ฆผ 8] ๊ตญ๋‚ด ์ด๋™ํ†ต์‹  ๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ

Page 75: nternet I Security - BIGBOOK

2015๋…„์—๋Š” ๋…ธํŠธ๋ถ์ด 55.8%๋กœ ์ฃผ๋„ํ•˜๊ณ  ์žˆ๊ณ ,

์Šค๋งˆํŠธํฐ 26.6%, ํ™ˆ๊ฒŒ์ดํŠธ์›จ์ด 4.7%, M2M

3.5%์˜ ์ ์œ ์œจ์„ ์˜ˆ์ƒํ•˜๊ณ  ์žˆ๋‹ค. ๋ชจ๋ฐ”์ผ ์ปดํ“จํŒ…

์—์„œ๋Š” [๊ทธ๋ฆผ 10]์—์„œ์™€ ๊ฐ™์ด ์ผ๋ฐ˜์ „ํ™”๊ธฐ์— ๋น„ํ•ด

๋…ธํŠธ๋ถ์€ 515๋ฐฐ, ํƒœ๋ธ”๋ฆฟ์€ 122๋ฐฐ, ์Šค๋งˆํŠธํฐ์€ 24

๋ฐฐ๋‚˜ ๋งŽ์€ ํŠธ๋ž˜ํ”ฝ์„ ์ƒ์„ฑํ•œ๋‹ค๊ณ  ์•Œ๋ ค์ ธ ์žˆ๋‹ค.

๋ชจ๋ฐ”์ผ ์ปดํ“จํŒ…์—์„œ๋„ <ํ‘œ 6>๊ณผ ๊ฐ™์ด ์—ฌ์ „ํžˆ ๋น„

๋””์˜ค ์‘์šฉ์— ์˜ํ•œ ํŠธ๋ž˜ํ”ฝ ํญ์ฆ์ด ์˜ˆ์ƒ๋˜๋ฉฐ, ์ผ๋ฐ˜

์‘์šฉ์— ์˜ํ•œ ๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ์ด ๊ทธ ๋‹ค์Œ์„ ์ด๋Œ ๊ฒƒ

์œผ๋กœ ๋ณด์ธ๋‹ค. ํ•œํŽธ, ๋ชจ๋ฐ”์ผ ์ปดํ“จํŒ…์—์„œ๋Š” ์‚ฌ๋ฌผํ†ต

์‹ (Internet of things)์— ์˜ํ•œ M2M ํŠธ๋ž˜ํ”ฝ์ด

๊ธ‰์ฆํ•  ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ๋‹ค.

4. ์ธํ„ฐ๋„ท ์‘์šฉ ํ”„๋กœ๊ทธ๋žจ ๋ฐ ํŠธ๋ž˜ํ”ฝ์˜ ํ˜„ํ™ฉ

1) P2P ๋˜๋Š” ํŒŒ์ผ ๊ณต์œ  ์‘์šฉ์˜ ํ˜„ํ™ฉ

์ธํ„ฐ๋„ท ํŠธ๋ž˜ํ”ฝ์˜ ์ฆ๊ฐ€์— ํฌ๊ฒŒ ๊ธฐ์—ฌํ•˜๊ณ  ์žˆ๋‹ค๊ณ 

์•Œ๋ ค์ง„ P2P(Peer-to-Peer) ์‘์šฉ๋“ค์˜ ํŠธ๋ž˜ํ”ฝ์€

์ตœ๊ทผ ๊ด€์ฐฐ๊ฒฐ๊ณผ ๋งŽ์€ ๋ณ€ํ™”๋ฅผ ๊ฒช๊ณ  ์žˆ๋‹ค. [๊ทธ๋ฆผ 11]์—

์„œ์™€ ๊ฐ™์ด ์ž˜ ์•Œ๋ ค์ง„ ํฌํŠธ๋ฒˆํ˜ธ๋ฅผ ์ด์šฉํ•˜์—ฌ ๊ด€์ฐฐํ•œ

P2P ํŠธ๋ž˜ํ”ฝ์€ ์ง€์†์ ์œผ๋กœ ๊ฐ์†Œํ•˜๊ณ  ์žˆ์Œ์„ ์•Œ ์ˆ˜

์žˆ๋‹ค. ํ•˜์ง€๋งŒ, ์ตœ๊ทผ ๋ถ€๋ถ„์˜ P2P ์‘์šฉ๋“ค์€ ์ž„์˜์˜

ํฌํŠธ๋ฒˆํ˜ธ์™€ ์•”ํ˜ธํ™”๋œ ๋ฐฉ์‹์„ ์ด์šฉํ•˜๊ณ  ์žˆ๊ธฐ ๋•Œ๋ฌธ

์—, ํฌํŠธ๋ฒˆํ˜ธ๊ฐ€ ์•„๋‹Œ ํŽ˜์ด๋กœ๋“œ์˜ ์‹œ๊ทธ๋„ˆ์ฒ˜๋ฅผ ์ด์šฉ

ํ•œ ๊ด€์ฐฐ๊ฒฐ๊ณผ๋Š” P2P ์‘์šฉ์ด ์—ฌ์ „ํžˆ ๋งŽ์ด ์‚ฌ์šฉ๋˜๊ณ 

์žˆ๋‹ค๊ณ  ํ•œ๋‹ค. ISP์˜ ํŠธ๋ž˜ํ”ฝ ๊ด€๋ฆฌ, ํ–ฅ์ƒ๋œ P2P ํด

๋ผ์ด์–ธํŠธโˆ™์•Œ๊ณ ๋ฆฌ์ฆ˜ ๋ฐ ๋‹ค๋ฅธ ์‘์šฉ์œผ๋กœ ์ „ํ™˜ ๋“ฑ์˜

์ด์œ ๋กœ P2P ํŠธ๋ž˜ํ”ฝ์˜ ์„ฑ์žฅ๋ฅ ์€ ์ •์ฒด๋˜๊ฑฐ๋‚˜ ์ผ๋ถ€

๊ฐ์†Œํ•˜๊ธฐ ์‹œ์ž‘ํ–ˆ๋‹ค๊ณ  ์•Œ๋ ค์ ธ ์žˆ๋‹ค. ํ•œํŽธ, YouTube

์™€ ๊ฐ™์€ ์ŠคํŠธ๋ฆฌ๋ฐ, CDN ๋ฐ ๋‹ค์ด๋ ‰ํŠธ ๋‹ค์šด๋กœ๋“œ์™€

๊ฐ™์€ ์„œ๋น„์Šค๊ฐ€ P2P ์‘์šฉ์„ ๋น ๋ฅด๊ฒŒ ์ฒดํ•˜๊ณ  ์žˆ๋‹ค.

[๊ทธ๋ฆผ 12]์—์„œ๋Š” Carpathia ํ˜ธ์ŠคํŒ… ์—…์ฒด ํŠธ๋ž˜

ํ”ฝ์˜๋ณ€ํ™”๋Ÿ‰์„๋ณด์—ฌ์ฃผ๊ณ ์žˆ๋‹ค. ์ด์—…์ฒด๋Š”MegaUpload,

MegaErotic ๋“ฑ์˜ ๋‹ค์ด๋ ‰ํŠธ ๋‹ค์šด๋กœ๋“œ(direct

์ œ ๊ถŒ ์ œ ํ˜ธ

74 ๋…„ ์›”

[๊ทธ๋ฆผ 10] ๋ชจ๋ฐ”์ผ ๋‹จ๋ง๊ธฐ๋ณ„ ์›” ํŠธ๋ž˜ํ”ฝ ์‚ฌ์šฉ๋Ÿ‰ ๋น„๊ต

*์ถœ์ฒ˜: Cisco(2011b)

<ํ‘œ 6> ๋ชจ๋ฐ”์ผ ์‘์šฉ๋ณ„ ํŠธ๋ž˜ํ”ฝ ์ฆ๊ฐ€ ์˜ˆ์ธก

*์ถœ์ฒ˜: Cisco(2011b)

Year 2010 2011 2012 2013 2014 2015CAGR

2010-2015

By Application Category (TB per Month)

Data 73,741 160,101 321,036 561,242 893,330 1,407,000 80%

File sharing 33,510 64,186 113,821 176,657 258,727 378,559 62%

Video 117,943 288,405 655,442 1,334,333 2,452,898 4,149,610 104%

VoIP 4,021 6,120 9,067 11,797 14,386 23,282 42%

M2M 7,462 27,234 63,575 113,509 186,603 295,469 109%

Page 76: nternet I Security - BIGBOOK

download) ์—…์ฒด๋“ค์ด ์ด์šฉํ•˜๋Š”๋ฐ ์ „์ฒด ํŠธ๋ž˜ํ”ฝ์˜

0.5%๋ฅผ ์ฐจ์ง€ํ•˜๊ณ  ์žˆ๋‹ค.

P2P ์‘์šฉ์„ ์ฒดํ•˜๋Š” ๋‹ค์ด๋ ‰ํŠธ ๋‹ค์šด๋กœ๋“œ ํŠธ๋ž˜

ํ”ฝ์— ํ•ด์„œ๋Š” Antoniades et al.(2009)์—์„œ

OCH(One-Click Hosting) ์„œ๋น„์Šค๋ผ ์ง€์นญํ•˜์—ฌ

RapidShare์™€ MegaUpload์— ํ•œ ์ • ๋ถ„์„

๊ฒฐ๊ณผ๋ฅผ ๋ณด์—ฌ์ฃผ๊ณ  ์žˆ๋‹ค. ์ด ์—ฐ๊ตฌ๋Š” 2008๋…„ 10,000

๋ช… ์ •๋„์˜ ์—ฐ๊ตฌ๋ง๊ณผ 1,000๋ช… ์ •๋„์˜ ์บ ํผ์Šค๋ง ์‚ฌ

์ด์˜ ํŠธ๋ž˜ํ”ฝ์„ ๊ด€์ฐฐํ•œ ๊ฒฐ๊ณผ, ๋…์ผ์—์„œ ์ฃผ์š” OCH

์„œ๋ฒ„๋“ค์ด ํ˜ธ์ŠคํŒ…๋˜์–ด ์šด ๋˜๋ฉฐ, ์›น ํŠธ๋ž˜ํ”ฝ์˜ ์ƒ๋‹น

๋ถ€๋ถ„์ด ๋‹ค์ด๋ ‰ํŠธ ๋‹ค์šด๋กœ๋“œ ์„œ๋น„์Šค๋“ค์— ์˜ํ•ด์„œ ์‚ฌ

์šฉ๋˜๊ณ  ์žˆ์Œ์„ ๋ฐํ˜”๋‹ค. ์ „์ฒด HTTP ํŠธ๋ž˜ํ”ฝ

(12.5%)์˜ 25%๋ฅผ ์ฐจ์ง€ํ•˜์—ฌ ๋น„ํŠธํ† ๋ ŒํŠธ์˜ 44.5%

๋ณด๋‹ค ์ž‘์ง€๋งŒ ์˜๋ฏธ ์žˆ๋Š” ์ ์œ ์œจ์„ ๋ณด์—ฌ์ฃผ๊ณ  ์žˆ๋‹ค.

ํŠนํžˆ, OCH ํŠธ๋ž˜ํ”ฝ์˜ 80% ์ด์ƒ์„ RapidShare

์—…์ฒด๊ฐ€ ๋ฐœ์ƒ์‹œํ‚ค๊ณ  ์žˆ๋‹ค๊ณ  ํ•˜ ๋‹ค. OCH ํŠธ๋ž˜ํ”ฝ

์˜ ์‹œ๊ฐ„๋‹น ์ „์†ก๋ฅ ์€ 10๏ฟฝ20Mbps๋กœ ๊ด€์ฐฐ๋˜์—ˆ๊ณ 

์žฅ๊ธฐ๊ฐ„์˜ ํ‰๊ท  ์ „์†ก๋ฅ ์€ 1Mbps์ •๋„ ๋‹ค๊ณ  ํ•œ๋‹ค.

๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ ํญ์ฆํ˜„์ƒ๊ณผ ์ฝ˜ํ…์ธ  ์ค‘์‹ฌ ๋„คํŠธ์›Œํ‚น ๊ธฐ์ˆ 

Internet and Information Security 75

[๊ทธ๋ฆผ 11] ์ž˜ ์•Œ๋ ค์ง„ ํฌํŠธ๋ฒˆํ˜ธ๋ฅผ ์ด์šฉํ•˜๋Š” P2P ํŠธ๋ž˜ํ”ฝ ๋ณ€ํ™”

*์ถœ์ฒ˜: Labovitz et al.(2010)

[๊ทธ๋ฆผ 12] ๋‹ค์ด๋ ‰ํŠธ ๋‹ค์šด๋กœ๋“œ ์‘์šฉ ํŠธ๋ž˜ํ”ฝ ๋ณ€ํ™”

*์ถœ์ฒ˜: Labovitz et al.(2010)

Page 77: nternet I Security - BIGBOOK

[๊ทธ๋ฆผ 13]์—์„œ ๋ณด๋ฉด RapidShare ์‘์šฉ ํŠธ๋ž˜ํ”ฝ

์˜ ๋ณ€ํ™”๋Ÿ‰์„ ์•Œ ์ˆ˜ ์žˆ๋Š”๋ฐ, YouTube์™€ Google

Video ์‚ฌ์ดํŠธ์™€ ๋น„๊ต๋ฅผ ํ•œ ๊ฒฐ๊ณผ, ์ง€์  1์—์„œ๋Š”

ํ›จ์”ฌ ๋งŽ์€ ํŠธ๋ž˜ํ”ฝ์„ ์ƒ์„ฑ์‹œํ‚ค๊ณ  ์žˆ๊ณ , ์ง€์  2์—์„œ

๋Š” ๋น„์Šทํ•œ ์–‘์„ ์ƒ์„ฑํ•˜๊ณ  ์žˆ๋‹ค.

2) HTTP ๊ธฐ๋ฐ˜์‘์šฉโˆ™๋ฉ€ํ‹ฐ๋ฏธ๋””์–ดํŠธ๋ž˜ํ”ฝ์˜์ถ”์„ธ

๋ธŒ๋กœ๋“œ๋ฐด๋“œ ๊ฐ€์ž…์ž ๋„คํŠธ์›Œํฌ์—์„œ๋„ ์œ„์—์„œ ์–ธ

๊ธ‰ํ•œ ๋‹ค์ด๋ ‰ํŠธ ๋‹ค์šด๋กœ๋“œ๋กœ ์ธํ•œ HTTP ํŠธ๋ž˜ํ”ฝ์˜

์ฆ๊ฐ€ํŒจํ„ด์„ ๋ถ„์„ํ•œ ๊ฒฐ๊ณผ๊ฐ€ Maier et al.(2009)์—

์„œ ์ œ์‹œ๋˜์—ˆ๋‹ค. ๋…์ผ์—์„œ 20,000๋ช… DSL ๊ฐ€์ž…์ž

ํŠธ๋ž˜ํ”ฝ์„ ๋ถ„์„ํ•œ ๊ฒฐ๊ณผ [๊ทธ๋ฆผ 14]์—์„œ์™€ ๊ฐ™์ด 57%

HTTP ํŠธ๋ž˜ํ”ฝ๊ณผ 14% ์ •๋„์˜ P2P(BitTorrent,

eDonkey, Gnutella) ํŠธ๋ž˜ํ”ฝ ์ ์œ ์œจ์„ ๋ณด์—ฌ์ฃผ๊ณ 

์žˆ๋‹ค.

๋˜ํ•œ HTTP๊ฐ€ ์–ด๋–ค ์‘์šฉ์— ์˜ํ•ด์„œ ์‚ฌ์šฉ๋˜๋Š”์ง€

[๊ทธ๋ฆผ 15]์™€ ๊ฐ™์ด ๋ถ„์„ํ•˜ ๋Š”๋ฐ, ํ”Œ๋ž˜์‹œ ๋น„๋””์˜ค

(YouTube์™€ ๊ฐ™์€ ๋น„๋””์˜ค ์ŠคํŠธ๋ฆฌ๋ฐ ์‘์šฉ)๊ฐ€ 25%

์ฐจ์ง€ํ•˜๊ณ  ์žˆ์œผ๋ฉฐ, RAR ์•„์นด์ด๋ธŒ ํŒŒ์ผ ๊ณต์œ ๊ฐ€

15% ์ฐจ์ง€ํ•˜๊ณ  ์žˆ์Œ์„ ๋ณด์—ฌ์ฃผ๊ณ  ์žˆ๋‹ค.

<ํ‘œ 7>์—์„œ๋Š” ๋„๋ฉ”์ธ๋ณ„ ๋ถ„์„๊ฒฐ๊ณผ๋ฅผ ๋ณด์—ฌ์ฃผ๊ณ 

์žˆ๋Š”๋ฐ, ๋‹ค์ด๋ ‰ํŠธ ๋‹ค์šด๋กœ๋“œ ์—…์ฒด๋“ค์ด 15.3% ๋น„๋””

์˜ค ํฌํ„ธ ์„œ๋น„์Šค๋“ค์ด 14%๋ฅผ ์ฐจ์ง€ํ•˜๊ณ  ์žˆ๋‹ค. ์ฆ‰,

HTTP ํ”„๋กœํ† ์ฝœ์ด ๋งŽ์€ ์–‘์˜ ์ฝ˜ํ…์ธ ๋ฅผ ๋‹ค์šด๋กœ๋“œ

๋ฐ›๋Š”๋ฐ ํ™œ์šฉ๋˜๊ณ  ์žˆ์Œ์„ ์•Œ ์ˆ˜ ์žˆ๋‹ค.

์ œ ๊ถŒ ์ œ ํ˜ธ

76 ๋…„ ์›”

[๊ทธ๋ฆผ 13] ๋‹ค์ด๋ ‰ํŠธ ๋‹ค์šด๋กœ๋“œ ์‘์šฉ์˜ ํ‘œ RapidShare์™€ YouTube, Google Video ํŠธ๋ž˜ํ”ฝ ๋น„๊ต

*์ถœ์ฒ˜: Antoniades et al.(2009)

Jul08 Aug08 Sep08

Date

Mbi

ts/s

ecM

bits

/sec

Oct08

Dec08Nov08Aug08 Sep08

Date

Oct08

Page 78: nternet I Security - BIGBOOK

1. ๋ฐ์ดํ„ฐ ํญ์ฆ์— ์˜ํ•œ ๋„คํŠธ์›Œํฌ ํ–ฅ

๋ฏธ๋ž˜์ธํ„ฐ๋„ท์—์„œ์˜ ์•ˆ์ „์„ฑโˆ™์‹ ๋ขฐ์„ฑ, ๋ณด์•ˆ, ๊ด€๋ฆฌ

๋Šฅ๋ ฅ, ์ด๋™์„ฑ, QoSโˆ™QoE, ์ฝ˜ํ…์ธ  ์ค‘์‹ฌ ๋„คํŠธ์›Œํฌ

๋“ฑ์˜ ๋‹ค์–‘ํ•œ ์ด์Šˆ์— ํ•ด์„œ ์ƒˆ๋กœ์šด ํ•ด๊ฒฐ ๋ฐฉ๋ฒ•์„

๋ชจ์ƒ‰ํ•˜๊ณ  ์žˆ๋‹ค. ๋ณธ ์ ˆ์—์„œ๋Š” ์ด๋™ํ†ต์‹ ๊ณผ ํด๋ผ์šฐ๋“œ

์ปดํ“จํŒ…์˜ ํ™œ์„ฑํ™”์— ๋”ฐ๋ผ ๋ฐ์ดํ„ฐ ํญ์ฆํ˜„์ƒ์ด ๋„คํŠธ

์›Œํฌ์— ํ–ฅ์„ ์ฃผ๋Š” ํ‘œ์ ์ธ ์‚ฌ๋ก€๋ฅผ ์„ค๋ช…ํ•œ๋‹ค.

1) ์ด๋™ํ†ต์‹ ๋ง์˜ ํ˜ผ์žกํ˜„์ƒ ์•…ํ™”

์ธํ„ฐ๋„ท ์‘์šฉ ํŠธ๋ž˜ํ”ฝ์€ ํ”ํžˆ ์ž๊ธฐ์œ ์‚ฌ์„ฑ(self-

similarity)์„ ๊ฐ€์ง€๊ณ  ์žˆ๋Š”๋ฐ, ์ด๋Ÿฌํ•œ ํŠน์ง•์€ ์Šค

์œ„์น˜์—์„œ์˜ ๋ฒ„ํผ ํฌ๊ธฐ ๋˜๋Š” ๋งํฌ ์—ญํญ์˜ ์ดˆ๊ณผํ• 

๋‹น์„ ํ•„์š”๋กœ ํ•˜๊ธฐ ๋•Œ๋ฌธ์— ์ผ์‹œ์ ์œผ๋กœ ๋งŽ์ด ๋ชฐ๋ฆฌ๋Š”

์‘์šฉ ํŠธ๋ž˜ํ”ฝ์— ํ•ด์„œ๋Š” ์†์‹ค ๋ฐ ์ง€์—ฐ์‹œ๊ฐ„์œผ๋กœ ์ธ

ํ•œ ์ •์ฒดํ˜„์ƒ์ด ์ปค์ง€๊ฒŒ ๋œ๋‹ค. ์ธํ„ฐ๋„ท์—์„œ๋Š” 1986

๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ ํญ์ฆํ˜„์ƒ๊ณผ ์ฝ˜ํ…์ธ  ์ค‘์‹ฌ ๋„คํŠธ์›Œํ‚น ๊ธฐ์ˆ 

Internet and Information Security 77

[๊ทธ๋ฆผ 14] DSL ๊ฐ€์ž…์ž ํŠธ๋ž˜ํ”ฝ์˜ ์‘์šฉ ์‚ฌ์šฉํŒจํ„ด

*์ถœ์ฒ˜: Maier et al.(2009)

[๊ทธ๋ฆผ 15] DSL ๊ฐ€์ž…์ž ํŠธ๋ž˜ํ”ฝ์˜ HTTP ์‚ฌ์šฉํŒจํ„ด

*์ถœ์ฒ˜: Maier et al.(2009)

Rank Domain Fraction of Traffic

1 Diret Download Provider 15.3%

2 Video portal 6.1%

3 Video portal 3.3%

4 Video portal 3.2%

5 Software updates 3.0%

6 CDN 2.1%

7 Search engine 1.8%

8 Software company 1.7%

9 Web portal 1.3%

10 Video Portal 1.2%

<ํ‘œ 7> DSL ๊ฐ€์ž…์ž ํŠธ๋ž˜ํ”ฝ์—์„œ HTTP์˜ ์‚ฌ์šฉํŒจํ„ด

*์ถœ์ฒ˜: Maier et al.(2009)

Page 79: nternet I Security - BIGBOOK

๋…„ 10์›” NSFnet ๋ฐฑ๋ณธ์ด 32Kbps์—์„œ 40bps๋กœ

๋–จ์–ด์ง€๋ฉด์„œ ํ˜ผ์žกํ˜„์ƒ์œผ๋กœ ์ธํ•œ ์ธํ„ฐ๋„ท ๋ถ•๊ดด

(congestion collapse) ํ˜„์ƒ์ด ๋ฐœ๊ฒฌ๋˜์—ˆ๊ณ , 1987๋…„

Van Jacobson์— ์˜ํ•ด์„œ ํ˜ผ์žก์ œ์–ด(congestion

control) ๋ฐฉ๋ฒ•์ด ๊ฐœ๋ฐœ๋˜์–ด ํ•ด๊ฒฐ๋˜์—ˆ๋‹ค(Jacobson,

1988). ๋ผ์šฐํ„ฐ๊ฐ€ ๊ฐ๋‹นํ•˜๊ธฐ ์–ด๋ ค์šธ ์ •๋„๋กœ ๋งŽ์€ ํŒจ

ํ‚ท๋“ค์ด ๋„์ฐฉํ•˜๋ฉด, ํŒจํ‚ท๋“ค์„ ํ๊ธฐํ•˜๋ฉด์„œ ๋‹จ๋ง๋“ค์ด

์ „์†ก๋ฅ ์„ ์ค„์ด๋ฉด์„œ ์žฌ์ „์†กํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒํ•œ ๊ฒƒ์ด

๋‹ค. ํ•˜์ง€๋งŒ, ์ดˆ๊ธฐ TCP ์žฌ์ „์†ก์€ ์žฌ์ „์†ก์‹œ ์ดˆ๊ณผ

ํŠธ๋ž˜ํ”ฝ์„ ๋ณด๋‚ด๋ฉด์„œ ํ˜ผ์žกํ˜„์ƒ์„ ๊ฐ€์ค‘์‹œ์ผœ ์ „์ฒด ์ธ

ํ„ฐ๋„ท ์„œ๋น„์Šค๋“ค์„ ๋ง‰๊ฒŒ ํ•œ ๊ฒƒ์ด๋‹ค.

๊ตญ๋‚ด์—์„œ๋Š” 2011๋…„ ์นด์นด์˜คํ†ก์ด๋ผ๋Š” ์Šค๋งˆํŠธํฐ์˜

๋ฉ”์‹œ์ง• ์‘์šฉ์ด ๋งŽ์€ ์ธ๊ธฐ๋ฅผ ๋Œ๋ฉด์„œ SKํ…”๋ ˆ์ฝค์ด๋‚˜

KT์™€ ๊ฐ™์€ ์ด๋™ํ†ต์‹ ์—…์ฒด๋กœ๋ถ€ํ„ฐ ์ง€์†์ ์ธ ํŠธ๋ž˜ํ”ฝ

๊ณผ๋‹คํ˜„์ƒ์œผ๋กœ ์ธํ•œ ๋ถ€๋‹ด์„ ํ† ๋กœํ•˜ ๋‹ค. ํŠนํžˆ, ์ด

๋™ํ†ต์‹ ๋ง์—์„œ ์ „ํ™” ๋˜๋Š” ๋ฌธ์ž๋ฉ”์‹œ์ง€ ์ด์™ธ์— ๋งŽ์€

์ด์šฉ์ž๊ฐ€ ๋™์‹œ์— ์ด์šฉํ•˜๋Š” ์‘์šฉ์œผ๋กœ๋Š” ์นด์นด์˜คํ†ก

์ด ์ตœ์ดˆ๋ผ๊ณ  ๋ณผ ์ˆ˜ ์žˆ๋‹ค. ์นด์นด์˜คํ†ก์€ 2011๋…„ ํ˜„์žฌ

1,500๋งŒ์—ฌ ๋ช…์˜ ๊ฐ€์ž…์ž๊ฐ€ ์ง€์†์ ์œผ๋กœ ์‚ฌ์šฉํ•˜๊ณ 

์žˆ์œผ๋ฉฐ, ๋งŽ์€ ์ˆ˜์˜ ๊ฐ€์ž…์ž๋“ค๋กœ ์ธํ•˜์—ฌ 2011๋…„๋„

์— ์„œ๋น„์Šค๊ฐ€ ๋ถˆํ†ต๋˜๊ฑฐ๋‚˜ ์ง€์—ฐ๋˜๋Š” ํ˜„์ƒ์ด ์ž์ฃผ ๋ฐœ

์ƒํ•˜ ๋Š”๋ฐ, ์ด๋™ํ†ต์‹ ์—…์ฒด๋“ค์€ ์นด์นด์˜คํ†ก ์‘์šฉ ํŠธ

๋ž˜ํ”ฝ ๊ณผ๋‹คํ˜„์ƒ์„ ์ด์œ ๋กœ ์ง€์ ํ•˜ ๋‹ค. ์ด๋™ํ†ต์‹ ๋ง

์—์„œ๋Š” ๊ธฐ๋ณธ์ ์œผ๋กœ ๋ฌด์„ ๋žœ์— ๋น„ํ•ด ์ ˆ ์ ์œผ๋กœ

์—ญํญ์ด ์ž‘๊ธฐ ๋•Œ๋ฌธ์— ๋” ํฐ ํ˜ผ์žกํ˜„์ƒ์„ ๊ฒช์„ ์ˆ˜ ์žˆ

๋‹ค. ์Šค๋งˆํŠธํฐ์˜ ์•ˆ๋“œ๋กœ์ด๋“œ ํ”Œ๋žซํผ์—์„œ๋Š” ํ‘ธ์‹œ ์„œ

๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜์ง€ ์•Š์•„์„œ ์„œ๋น„์Šค ๊ฐœ๋ฐœ์ž๋“ค์ด ์ฃผ๊ธฐ

์ ์œผ๋กœ Keep Alive๋ฅผ ํ•˜๋Š” ํด๋ง ๋ฐฉ์‹์œผ๋กœ ์ฒดํ•˜

๊ณ  ์žˆ๊ณ , ์นด์นด์˜คํ†ก์—์„œ๋„ ํด๋ง ๋ฐฉ์‹์œผ๋กœ ๋ฉ”์‹œ์ง€

์„œ๋น„์Šค๋ฅผ ๊ตฌํ˜„ํ•˜ ๋‹ค. ์ฆ‰, ์‹ค์ œ ๋ฉ”์‹œ์ง€ ์ „์†ก๊ณผ ๋ฌด

๊ด€ํ•˜๊ฒŒ Keep Alive ๋ฉ”์‹œ์ง€๋ฅผ ์ „์†กํ•˜๋Š” ๊ฒƒ์ด๋‹ค.

์นด์นด์˜คํ†ก ์„œ๋ฒ„๋Š” 10๋ถ„ ์ฃผ๊ธฐ๋กœ 280 ๋ฐ”์ดํŠธ์˜ ์‹ ํ˜ธ

๋ฅผ ์†ก์‹ ํ•˜์—ฌ, ๊ฐ€์ž…์ž ์ƒํƒœ ๋“ฑ 4๊ฐœ ์‹ ํ˜ธ๊ฐ€ ์‹œ๊ฐ„๋‹น

6์ฐจ๋ก€, ํ•˜๋ฃจ 24์‹œ๊ฐ„ ์ „์†ก๋œ๋‹ค๊ณ  ํ•œ๋‹ค. ํด๋ง ๋ฐฉ์‹

์—์„œ๋Š” ์„œ๋ฒ„๊ฐ€ ์žฅ์• ๋ฅผ ์ผ์œผํ‚ฌ ๊ฒฝ์šฐ ๋‹จ๋ง์ด ์„œ๋ฒ„๋กœ

๋ถ€ํ„ฐ ์‘๋‹ต์„ ๋ฐ›์„ ๋•Œ๊นŒ์ง€ Keep Alive ๋ฉ”์‹œ์ง€๋ฅผ

์ง€์†์ ์œผ๋กœ ๋ณด๋‚ด๊ฒŒ ๋œ๋‹ค. ์ด๋Ÿฌํ•œ ํ˜„์ƒ์€ ์ดˆ๊ธฐ ์ธํ„ฐ

๋„ท ์‹œ์ ˆ์—์„œ ํ˜ผ์žกํ˜„์ƒ์œผ๋กœ ์ธํ•œ ์ธํ„ฐ๋„ท ๋ถ•๊ดดํ˜„์ƒ

์„ ์œ ์ถ”ํ•˜๊ฒŒ ํ•œ๋‹ค. ํ•œํŽธ์œผ๋กœ๋Š” ์ตœ๊ทผ์— ๋งŽ์ด ๋ฐœ์ƒํ•˜

๊ณ  ์žˆ๋Š” DDoS(Distributed Denial-of-Service)

๊ณต๊ฒฉ๊ณผ ์œ ์‚ฌํ•œ ํ˜•ํƒœ๋ผ๊ณ ๋„ ๋ณผ ์ˆ˜ ์žˆ๋‹ค. ์˜จ๋ผ์ธ์ด

์•„๋‹Œ ๊ฐ€์ž…์ž์—๊ฒŒ ์ „๋‹ฌํ•˜๊ธฐ ์œ„ํ•œ ์„œ๋ฒ„๋กœ๋ถ€ํ„ฐ์˜ ๋ฉ”

์‹œ์ง€ ์žฌ์ „์†ก์— ๋”ฐ๋ฅธ ๋™๊ธฐํ™” ํ˜„์ƒ๋„ ํ˜ผ์žกํ˜„์ƒ์„ ์œ 

๋ฐœํ•˜๊ฒŒ ๋œ๋‹ค. ์ด๋ฅผ ์œ„ํ•ด์„œ ํ˜„์žฌ๋Š” ํ‘ธ์‹œ ์„œ๋ฒ„์˜ ๋ณ„

๋„ ์„ค์น˜์™€ ํ™œ์šฉ ๋ฐฉ๋ฒ•๋“ค์ด ํ† ์˜๋˜๊ณ  ์žˆ๋‹ค.

ํ•œํŽธ, 2011๋…„ 8์›” 2์ผ, 920๋งŒ ๊ฐ€์ž…์ž์˜ LG ์œ 

ํ”Œ๋Ÿฌ์Šค ๋ฌด์„ ์ธํ„ฐ๋„ท์„œ๋น„์Šค๊ฐ€ ์ „๊ตญ์ ์œผ๋กœ 6์‹œ๊ฐ„ ์ด

์ƒ ๋ถˆํ†ต๋œ ์‚ฌ๋ก€๊ฐ€ ๋ฐœ์ƒํ•˜ ๋‹ค. ํ‰์†Œ๋ณด๋‹ค 5๋ฐฐ ์ด์ƒ

์˜ ๋ฌด์„  ํŠธ๋ž˜ํ”ฝ์ด ๋ฐœ์ƒํ•˜ ๋‹ค๊ณ  ํ•˜๊ณ , ์ •ํ™•ํ•œ ์ด

์œ ๋Š” ๋ถ„์„ ์ค‘์— ์žˆ๋‹ค. ๋ฌด์„ ํ†ต์‹ ๋ง์„ ์ด์šฉํ•˜๋Š” ์Šค

๋งˆํŠธํฐ๊ณผ ํƒœ๋ธ”๋ฆฟ ๋ฐ ์‚ฌ๋ฌผํ†ต์‹  ๋“ฑ์ด ํ™•์‚ฐ๋˜๋ฉด์„œ ์•ž

์œผ๋กœ ์ด๋Ÿฌํ•œ ํ˜ผ์žกํ˜„์ƒ๊ณผ ์žฅ์• ๋ฅผ ์ผ์œผํ‚ฌ ๊ฐ€๋Šฅ์„ฑ์ด

๋†’์•„์ง€๊ฒŒ ๋œ๋‹ค.

์นด์นด์˜คํ†ก๊ณผ LG ์œ ํ”Œ๋Ÿฌ์Šค ์‚ฌ๋ก€์—์„œ ์‚ดํŽด๋ณธ ๋ฐ”์™€

๊ฐ™์ด ์ด๋™ํ†ต์‹ ๋ง์ด ์•ž์œผ๋กœ์˜ ์ธํ„ฐ๋„ท์—์„œ ์ค‘์š”ํ•œ

์•ก์„ธ์Šค๋ง์˜ ์—ญํ• ์„ ์ˆ˜ํ–‰ํ•  ๊ฒƒ์ธ๋ฐ, ์ข์€ ์—ญํญ๊ณผ

๋งŽ์€ ์ด์šฉ์ž๋“ค์— ์˜ํ•ด์„œ ๋‹ค์–‘ํ•œ ํ˜ผ์žกํ˜„์ƒ์ด ๋ฐœ์ƒ

ํ•  ๊ฐ€๋Šฅ์„ฑ์ด ํฌ๊ณ , ์ด๋Š” ์ƒˆ๋กœ์šด ๊ตฌ์กฐ์˜ ์ธํ„ฐ๋„ท์ด

ํ•„์š”ํ•˜๋‹ค๋Š” ๊ฒƒ์„ ๊ฐ„์ ‘์ ์œผ๋กœ ๋ณด์—ฌ์ฃผ๊ณ  ์žˆ๋‹ค.

2) ํด๋ผ์šฐ๋“œ์„œ๋น„์Šค์—์„œ์˜๋ฐ์ดํ„ฐ์ด๋™๋ณ‘๋ชฉํ˜„์ƒ

Amazon EC2(Elastic Compute Cloud)๋Š”

์ปดํ“จํ„ฐ๋ฅผ ๊ฐ€์ƒ์œผ๋กœ ์ž„ ํ•˜์—ฌ ์ œ๊ณตํ•˜๋Š” ์„œ๋น„์Šค๋กœ

์‹œ๊ฐ„๋‹น $0.085์—์„œ๋ถ€ํ„ฐ $2.1๊นŒ์ง€ ๋‹ค์–‘ํ•œ ์‚ฌ์–‘์˜

์ปดํ“จํ„ฐ๋ฅผ ๋นŒ๋ฆด ์ˆ˜ ์žˆ๋‹ค. ๋˜ํ•œ, Amazon์—์„œ๋Š”

S3(Simple Storage Service) ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜

์—ฌ ํ•œ ๋‹ฌ 1GB๋‹น $0.14์˜ ๊ณผ๊ธˆ์„ ์‚ฐ์ •ํ•œ๋‹ค. Amazon

EC2/S3์™€ ๊ฐ™์€ ํด๋ผ์šฐ๋“œ ์„œ๋น„์Šค๋Š” Microsoft

์™€ IBM ๋“ฑ์˜ ๊ทœ๋ชจ ๊ธฐ์—…๋ฟ๋งŒ ์•„๋‹ˆ๋ผ Animoto

์„œ๋ฒ„ ์ฆ์„ค ์‚ฌ๋ก€, New York Times์˜ 4TB TIFF

์ œ ๊ถŒ ์ œ ํ˜ธ

78 ๋…„ ์›”

Page 80: nternet I Security - BIGBOOK

์ด๋ฏธ์ง€ ๋ณ€ํ™˜ ์ž‘์—… ๋“ฑ์— ํ™œ์šฉ๋˜์–ด ํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ…

์˜ ํšจ์œจ์„ฑ์„ ์ฆ๋ช…ํ•˜ ๋‹ค.

ํ•˜์ง€๋งŒ, Armbrust et al.(2009)์—์„œ 10 ํด

๋ผ์šฐ๋“œ ์ปดํ“จํŒ… ์žฅ์• ๋ฌผ ์ค‘์˜ ํ•˜๋‚˜๋กœ ๋ฐ์ดํ„ฐ ์ด๋™

๋ณ‘๋ชฉํ˜„์ƒ์— ํ•ด์„œ ์ง€์ ํ•˜๊ณ  ์žˆ๋‹ค. ์˜ˆ๋ฅผ ๋“ค์–ด, ๊ธฐ

์—…์—์„œ Amazon S3 ์„œ๋น„์Šค๋กœ ๋ฐ์ดํ„ฐ๋ฅผ ์ „์†กํ• 

๋•Œ 5๏ฟฝ18Mbps ์ •๋„์˜ ์†๋„๊ฐ€ ์ธก์ •๋œ๋‹ค๊ณ  ํ•œ๋‹ค.

20Mbps์˜ WAN์„ ๊ฐ€์ •ํ•˜๋ฉด, 10TB๋ฅผ UC

Berkeley์—์„œ Seattle์— ์žˆ๋Š” ์•„๋งˆ์กด์œผ๋กœ ์ „๋‹ฌํ•˜

๊ธฐ ์œ„ํ•ด์„œ๋Š” 10ร—1012bytes/(20ร—106bps)= (8ร—

1013)/(2ร—107)์ดˆ=4,000,000์ดˆ, ์ฆ‰ 45์ผ ์ด์ƒ์ด

๊ฑธ๋ฆฐ๋‹ค๊ณ  ํ•œ๋‹ค. Amazon์—์„œ๋Š” $1,000์˜ ๋ฐ์ดํ„ฐ

์ด๋™ ์š”๊ธˆ์„ ๋ณ„๋„๋กœ ๋ถ€๊ณผํ•œ๋‹ค. ํ•˜์ง€๋งŒ, 10๊ฐœ์˜

1TB ํ•˜๋“œ๋””์Šคํฌ๋ฅผ FedEx์‚ฌ์˜ 1์ผ ํƒ๋ฐฐ์™€ ๊ฐ™์€

์šฐํŽธ์ „์†ก์„œ๋น„์Šค๋ฅผ ์ด์šฉํ•˜๊ฒŒ ๋˜๋ฉด 1์ผ ์•ˆ์— 10TB

๋ฅผ $400 ์ •๋„์— ์ „์†กํ•  ์ˆ˜ ์žˆ๋‹ค. ์ด๋ฅผ ๊ณ„์‚ฐํ•˜๋ฉด

1.5Gbps์˜ ์ „์†ก๋ฅ ์ด ๋œ๋‹ค. ๋”ฐ๋ผ์„œ NetFlix๊ฐ€ ์ดˆ

๊ธฐ DVD๋ฅผ ์šฐํŽธ์œผ๋กœ ์ „์†กํ•˜ ๋“ฏ์ด ์šฉ๋Ÿ‰ ๋ฐ์ดํ„ฐ

์ „์†ก์€ ๋ฌผ๋ฅ˜๋ฐฐ์†ก์„ ์ง์ ‘ ์ด์šฉํ•˜๋Š” ๊ฒƒ์ด ๋น ๋ฅด๊ณ  ์ €

๋ ดํ•˜๊ฒŒ ๋œ๋‹ค. ์‹ค์ œ๋กœ Amazon์—์„œ๋Š” Data

Exportโˆ™Import ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜์—ฌ ๋ฌผ๋ฆฌ์ ์ธ

ํ•˜๋“œ๋””์Šคํฌ ์ž…โˆ™์ถœ๋ ฅ์„ ์šฉ๋Ÿ‰ ๋ฐ์ดํ„ฐ ์ฒ˜๋ฆฌ์— ํ™œ

์šฉํ•˜๊ณ  ์žˆ๋‹ค.

์ด๋Š” ํ•˜๋“œ๋””์Šคํฌ์™€ ๊ฐ™์€ ์ €์žฅ์žฅ์น˜์˜ ์šฉ๋Ÿ‰ ๋น„

๊ฐ€๊ฒฉ์ด ๋„คํŠธ์›Œํฌ์˜ ์—ญํญ ๋น„ ๊ฐ€๊ฒฉ์— ๋น„ํ•ด ์•„์ฃผ

๋น ๋ฅด๊ฒŒ ๋ฐœ์ „ํ•˜๊ณ  ์žˆ๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค. ์ฆ‰, <ํ‘œ 8>๊ณผ ๊ฐ™

์ด ๋””์Šคํฌ ์ €์žฅ์žฅ์น˜๋Š” 2003๋…„ ๋น„ 2008๋…„์˜ ๊ฐ€

๊ฒฉ ์„ฑ๋Šฅ์ด 10๋ฐฐ ํ–ฅ์ƒ๋œ ๋ฐ˜๋ฉด, WAN ์—ญํญ์€

2.7๋ฐฐ๋งŒ ์ฆ๊ฐ€ํ•˜ ๋‹ค. ๋”ฐ๋ผ์„œ ๊ฐ€๊ฒฉ ๋น„ ๋„คํŠธ์›Œํฌ

์—ญํญ์˜ ๋Š๋ฆฐ ์ฆ๊ฐ€์†๋„๋Š” ๋ฏธ๋ž˜์ธํ„ฐ๋„ท์˜ ์ฃผ์š” ๋ฌธ

์ œ์  ์ค‘์˜ ํ•˜๋‚˜๊ฐ€ ๋˜์—ˆ๋‹ค. ํŠนํžˆ, ์ด๋™ํ†ต์‹ ์—์„œ๋Š”

3G์—์„œ LTE(Long-Term Evolution)์™€ ๊ฐ™์ด ๊ณ 

์†์œผ๋กœ ๋ฐœ์ „ํ•˜๊ณ  ์žˆ์ง€๋งŒ, ๊ฐ€๊ฒฉ ๋น„ ๋Š๋ฆฐ ์—ญํญ์˜

๋ฌธ์ œ์ ์€ ์—ฌ์ „ํžˆ ์กด์žฌํ•œ๋‹ค. ๊ตญ๋‚ด์—์„œ๋Š” 3G,

WLAN, WiBro ๋“ฑ์„ ๋™์‹œ์— ํ™œ์šฉํ•˜์—ฌ 3G ๋งํฌ์—

์„œ์˜ ํŠธ๋ž˜ํ”ฝ์„ ๋ฌด์„ ๋žœ์ด๋‚˜ ์™€์ด๋ธŒ๋กœ๋กœ ์ „ํ™˜ํ•˜๋Š”

๊ธฐ์ˆ ์ โˆ™์ •์ฑ…์  ๋ฐฉ๋ฒ•์„ ๋งŽ์ด ํ™œ์šฉํ•˜๊ณ  ์žˆ๋‹ค. ํ•˜์ง€

๋งŒ, ํ–ฅํ›„ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท์œผ๋กœ ๋ฐœ์ „ํ•˜๊ธฐ ์œ„ํ•ด์„œ๋Š” ์ด๋Ÿฌ

๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ ํญ์ฆํ˜„์ƒ๊ณผ ์ฝ˜ํ…์ธ  ์ค‘์‹ฌ ๋„คํŠธ์›Œํ‚น ๊ธฐ์ˆ 

Internet and Information Security 79

<ํ‘œ 8> 2003๋…„์—์„œ 2008๋…„ ์‚ฌ์ด ๋„คํŠธ์›Œํฌ, CPU, ์ €์žฅ์žฅ์น˜ ๊ฐ€๊ฒฉ ์„ฑ๋Šฅ๋น„๊ต

*์ถœ์ฒ˜: Armbrust et al.(2009)

WAN bandwidth/mo. CPU hours(all cores) disk storage

Item in 2003 1 Mbps WAN link 2 GHz CPU, 2 GB DRAM200 GB disk, 50 Mb/s

transfer rate

Cost in 2003 $100/mo. $2000 $200

$1 buys in 2003 1 GB 8 CPU hours 1 GB

Item in 2008 100 Mbps WAN link2 GHz, 2 sockets, 4

cores/socket, 4 GB DRAM

1 TB disk, 115 MB/s

sustained transfer

Cost in 2008 $3600/mo. $1000 $100

$1 buys in 2008 2.7 GB 128 CPU hours 10 GB

Cost/performance

improvement2.7x 16x 10x

Cost to rent $1

worth on AWS in 2008

$0.27-$0.40

($0.10-$0.15/GBร—3 GB)

$2.56

(128ร—2 VMโ€™s@$0.10 each)

$1.20-$1.50

($0.12-$0.15/GB-monthร—10 GB)

Page 81: nternet I Security - BIGBOOK

ํ•œ ์—ญํญ๊ณผ ์ €์žฅ์žฅ์น˜ ๋ฐœ์ „์˜ ๋ถˆ๊ท ํ˜• ํ˜„์ƒ์„ ํ•ด์†Œ

์‹œํ‚ค๋Š” ๊ธฐ์ˆ ์— ๊ด€ํ•œ ์—ฐ๊ตฌ๊ฐ€ ์ ˆ์‹คํ•œ ์‹ค์ •์ด๋‹ค.

2. ํ˜„์žฌ์ธํ„ฐ๋„ท์—์„œ์˜๋ฐ์ดํ„ฐํŠธ๋ž˜ํ”ฝํญ์ฆํ˜„์ƒ

ํ•ด๊ฒฐ ๋ฐฉ๋ฒ•

1) CDN(Contents Delivery Network)

ํ˜„์žฌ ์ธํ„ฐ๋„ท์—์„œ ๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ ํญ์ฆํ˜„์ƒ์„ ํ•ด๊ฒฐ

ํ•˜๊ธฐ ์œ„ํ•ด์„œ CDN ์„œ๋น„์Šค๋ฅผ ๋งŽ์ด ์ œ๊ณตํ•˜๊ณ  ์žˆ๋‹ค.

์„ธ๊ณ„์ ์œผ๋กœ๋ณด๋ฉด, Akamai, LimeLight, CDnetworks,

Level3 ๋ฐ Chinacache ๋“ฑ์˜ ํšŒ์‚ฌ๋“ค์ด ๋ถ€๋ถ„์˜

์‹œ์žฅ์„ ์ฐจ์ง€ํ•˜๊ณ  ์žˆ๋‹ค. CDN ๊ธฐ์—…๋“ค์€ ์ผ๋ฐ˜์ ์œผ๋กœ

์ž์ฒด์ ์œผ๋กœ ๊ตฌ์ถ•ํ•œ ์„œ๋ฒ„, ์Šคํ† ๋ฆฌ์ง€, ๋„คํŠธ์›Œํฌ ์ธํ”„

๋ผ์—์„œ ์ฝ˜ํ…์ธ  ์ถœํŒ, ๋™๊ธฐ, ์ „๋‹ฌ, ์บ์‹ฑ, ๋กœ๋“œ ๋ฐธ๋Ÿฐ

์‹ฑ ๋“ฑ์˜ ์†Œํ”„ํŠธ์›จ์–ด ์†”๋ฃจ์…˜์„ ํŠนํ™”ํ•˜์—ฌ ๋™ ์ƒ, ๊ฒŒ

์ž„ ๋ฐ ๊ต์œก ์ฝ˜ํ…์ธ  ๋“ฑ์„ ๋ถ„์‚ฐ์‹œํ‚ค๊ณ  ์žˆ๋‹ค. ํŠนํžˆ ์ตœ

๊ทผ์˜ ์Šค๋งˆํŠธํฐ์˜ ์ธ๊ธฐ์™€ ๋”๋ถˆ์–ด ํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ…

์„œ๋น„์Šค๊ฐ€ ํ™œ์„ฑํ™”๋˜๋ฉด์„œ ํด๋ผ์šฐ๋“œ์™€ CDN ์„œ๋น„์Šค์™€

์˜ ๊ฒฐํ•ฉ์œผ๋กœ ๋ฐœ์ „ํ•˜๊ณ  ์žˆ๋‹ค. 2010๋…„ ๋ฐด์ฟ ๋ฒ„ ๋™๊ณ„

์˜ฌ๋ฆผํ”ฝ, 2010๋…„ ์›”๋“œ์ปต, MBC โ€˜๋‚˜๋Š” ๊ฐ€์ˆ˜๋‹คโ€™๋“ฑ์˜

ํ˜• ์Šคํฌ์ธ ๋‚˜ ์˜ˆ๋Šฅ ์ด๋ฒคํŠธ๋“ค์€ ๋งŽ์€ ์‚ฌ์šฉ์ž๋“ค์˜

๋™์‹œ ์ ‘์†์ž๋“ค๊ณผ ํŠธ๋ž˜ํ”ฝ์„ ์œ ๋„ํ•œ๋‹ค. ์ด๋Ÿฌํ•œ ํŠธ๋ž˜

ํ”ฝ์˜ ํšจ๊ณผ์ ์ธ ๋ถ„์‚ฐํšจ๊ณผ๋ฅผ ์œ„ํ•ด์„œ CDN ์„œ๋น„์Šค๋ฅผ

์‚ฌ์šฉํ•˜๋Š” ๊ฒƒ์ด ์ผ๋ฐ˜ํ™”๋˜์—ˆ๋‹ค.

Akamai์‚ฌ๋Š” ์ „ ์„ธ๊ณ„์ ์œผ๋กœ 61,000 ์˜ ์„œ๋ฒ„

๋ฅผ 70๊ฐœ๊ตญ์— ๊ฑธ์ณ 1,000๊ฐœ์˜ ๋„คํŠธ์›Œํฌ์— ์„ค์น˜ํ•˜

์—ฌ CDN์„ ์šด ํ•˜๊ณ  ์žˆ๋‹ค. Akamai์‚ฌ๋Š” ๋ฐฑ๋ณธ์˜

ํ”ผ์–ด๋ง ํฌ์ธํŠธ, ๋น„ํšจ์œจ์ ์ธ ๋ผ์šฐํŒ… ํ”„๋กœํ† ์ฝœ, ์•ˆ

์ •์„ฑ์ด ๋–จ์–ด์ง€๋Š” ๋„คํŠธ์›Œํฌ, TCP์˜ ์˜ค๋ฒ„ํ—ค๋“œ, ๊ฑฐ

๋ฆฌ์— ๋”ฐ๋ฅธ ์ „์†ก ์˜ค๋ฒ„ํ—ค๋“œ ๋“ฑ์„ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•œ ๋ฐฉ

๋ฒ•์œผ๋กœ CDN์„ ์ตœ์ดˆ๋กœ ์ƒ์šฉํ™”ํ•˜์—ฌ ์„œ๋น„์Šค๋ฅผ ์ œ๊ณต

ํ•˜๊ณ  ์žˆ๋‹ค. [๊ทธ๋ฆผ 16]๊ณผ ๊ฐ™์ด ์ฝ˜ํ…์ธ  ์ „๋‹ฌ ์„œ๋น„์Šค

๋Š” ๊ฐ€์ƒ๋„คํŠธ์›Œํฌ ํ”Œ๋žซํผํ™”๋˜์–ด ์žˆ๋Š”๋ฐ, ์‚ฌ์šฉ์ž์—

๊ฒŒ ์ธ์ ‘ํ•œ ๋„คํŠธ์›Œํฌ์— ์—ฃ์ง€ ์„œ๋ฒ„๊ฐ€ ์กด์žฌํ•˜์—ฌ ์ด๋“ค

์—๊ฒŒ ์ฝ˜ํ…์ธ ๋ฅผ ์บ์‹ฑํ•˜์—ฌ ์„œ๋น„์Šคํ•˜๋Š” ๋ฐฉ์‹์ด๋‹ค. ์ด

๋ฅผ ์œ„ํ•˜์—ฌ DNS, ๋งคํ•‘์‹œ์Šคํ…œ ๋ฐ ํ†ต์‹ โˆ™๊ด€๋ฆฌ์‹œ์Šค

ํ…œ ๋“ฑ์„ ํ™œ์šฉํ•œ๋‹ค. ์—ฃ์ง€ ์„œ๋ฒ„๋Š” ์›๋ž˜ ์„œ๋ฒ„์˜ ์œ„์น˜

๊ด€๋ฆฌ, ์บ์‹œ ์ œ์–ด, ์บ์‹œ ์ธ๋ฑ์‹ฑ, HTTP ํ—ค๋” ์กฐ์ž‘

๋“ฑ์˜ ๊ธฐ๋Šฅ์„ ํฌํ•จํ•˜๊ณ  ์žˆ๊ณ , ๋งคํ•‘ ์‹œ์Šคํ…œ์€ ๋กœ

๋ฒŒ ํŠธ๋ž˜ํ”ฝ ๊ฐ๋…๊ด€ ์—ญํ• ์„ ์ˆ˜ํ–‰ํ•˜์—ฌ ํด๋Ÿฌ์Šคํ„ฐ์™€ ์„œ

๋ฒ„์—๊ฒŒ ์ ์ ˆํ•œ ๋กœ๋“œ ๋ฐธ๋Ÿฐ์‹ฑ ๊ธฐ๋Šฅ์„ ์ˆ˜ํ–‰ํ•œ๋‹ค.

2) ๋ฐ์ดํ„ฐ์„ผํ„ฐ

๊ทœ๋ชจ ๋ฐ์ดํ„ฐ ์ฒ˜๋ฆฌ๋ฅผ ์œ„ํ•ด์„œ๋Š” ๋ฐ์ดํ„ฐ์„ผํ„ฐ์˜

๊ตฌ์ถ•๊ธฐ์ˆ ์ด ํ•„์ˆ˜์ ์ด๋‹ค. ํŠนํžˆ, ๋ชจ๋ฐ”์ผ ์ปดํ“จํŒ…ํ™˜๊ฒฝ

์ด ๊ธ‰์†๋„๋กœ ๋ฐœ์ „ํ•˜๋ฉด์„œ ๋”์šฑ๋” ๋งŽ์€ ์„œ๋ฒ„์˜ ๋ฐ์ด

ํ„ฐ์„ผํ„ฐ๊ฐ€ ํ•„์š”ํ•˜๊ฒŒ ๋˜์—ˆ๋‹ค. ์ธํ…”์— ์˜ํ•˜๋ฉด 600

์˜ ์Šค๋งˆํŠธํฐ๊ณผ 122 ์˜ ํƒœ๋ธ”๋ฆฟ๋งˆ๋‹ค ์‹ ๊ทœ ์„œ๋ฒ„ 1

๊ฐ€ ํ•„์š”ํ•˜๋‹ค๊ณ  ํ•œ๋‹ค. Google, Yahoo!, IBM,

Amazon, Microsoft, Apple, Facebook ๋“ฑ์˜

๋กœ๋ฒŒ ์ธํ„ฐ๋„ท ์„œ๋น„์Šค ์—…์ฒด๋“ค์€ ๊ทœ๋ชจ ๋ฐ์ดํ„ฐ์„ผํ„ฐ

๋ฅผ ๊ตฌ์ถ•ํ•˜์—ฌ ์„œ๋น„์Šค์— ์ ๊ทน์ ์œผ๋กœ ํ™œ์šฉํ•˜๋ฉฐ ๊ด€๋ จ

๊ธฐ์ˆ ๋“ค์„ ์„ ๋„ํ•˜๊ณ  ์žˆ๋‹ค. ํŠนํžˆ, Facebook์‚ฌ์—์„œ

๋Š” Open Compute Project๋ฅผ ํ†ตํ•˜์—ฌ ์„œ๋ฒ„๊ธฐ์ˆ ๊ณผ

๋ฐ์ดํ„ฐ์„ผํ„ฐ๊ธฐ์ˆ ์„ ๊ณต๊ฐœํ•˜์—ฌ ํšจ์œจ์ ์ธ ์ธํ”„๋ผ๋ฅผ ๊ตฌ

์ถ•ํ•˜๊ฒŒ ํ•˜ ๋‹ค.2) ๋ฐ์ดํ„ฐ์„ผํ„ฐ๋Š” ์ „๊ธฐํšจ์œจ๊ด€๋ฆฌ, ์—ด

๊ด€๋ฆฌ ๋ฐ ์žฌ๋‚œ๊ด€๋ฆฌ ๋“ฑ์˜ ๋ฌผ๋ฆฌ์ ์ธ ์ด์Šˆ๋“ค๊ณผ ํ•จ๊ป˜ ๋งŽ

์€ ๋ฐ์ดํ„ฐ๊ด€๋ฆฌ๋ฅผ ์œ„ํ•œ ์„œ๋ฒ„, ๋„คํŠธ์›Œํฌ, ์†Œํ”„ํŠธ์›จ

์–ด, ๋ณด์•ˆ ๊ด€๋ฆฌ ๋“ฑ์˜ ์ด์Šˆ๊ฐ€ ๋ณตํ•ฉ์ ์œผ๋กœ ์กด์žฌํ•œ๋‹ค.

Benson et al.(2010)์˜ ๋ฐ์ดํ„ฐ์„ผํ„ฐ ์—ฐ๊ตฌ๊ฒฐ๊ณผ๋Š”

์˜จ๋ผ์ธ ์„œ๋น„์Šค๋ฅผ ์œ„ํ•œ ์‘์šฉ๋“ค๋ฟ๋งŒ ์•„๋‹ˆ๋ผ ๋งŽ์€ ๋ฐ์ด

ํ„ฐ๋ฅผ ์ฒ˜๋ฆฌํ•˜๋Š” MapReduce ์Šคํƒ€์ผ์˜ ์‘์šฉ๋“ค ๋˜ํ•œ

๋ฐ์ดํ„ฐ์„ผํ„ฐ์˜ ์ฃผ์š” ์‘์šฉ์ด๋ผ๋Š” ๊ฒƒ์„ ๋ณด ๋‹ค. ๋ฐ์ดํ„ฐ

์„ผํ„ฐ ๋‚ด๋ถ€๋Š” [๊ทธ๋ฆผ 17]๊ณผ ๊ฐ™์ด ์ฃผ๋กœ ๊ณ„์ธต์ ์œผ๋กœ ๊ตฌ์„ฑ

๋˜๋Š”๋ฐ, ์ฝ”์–ด ๊ณ„์ธต์˜ ๋งํฌ ์‚ฌ์šฉ๋ฅ ์€ ๋†’์ง€๋งŒ, ์ด๋ฅผ

์ œ์™ธํ•œ ๋ฐ์ดํ„ฐ์„ผํ„ฐ ๋‚ด๋ถ€ ๋งํฌ ์‚ฌ์šฉ๋ฅ ์€ 25%๋ฅผ ์ดˆ๊ณผ

์ œ ๊ถŒ ์ œ ํ˜ธ

80 ๋…„ ์›”

2) Open Compute Project, http://opencompute.org

Page 82: nternet I Security - BIGBOOK

ํ•˜์ง€ ์•Š๋Š”๋‹ค๊ณ  ํ•œ๋‹ค. ๋˜ํ•œ ๋ฐ์ดํ„ฐ์„ผํ„ฐ ๋‚ด๋ถ€์˜ ์ „์†ก

ํšจ์œจ์„๊ฐœ์„ ํ•˜๊ธฐ์œ„ํ•˜์—ฌ๋ฐ์ดํ„ฐ์„ผํ„ฐ์ „์šฉTCP(DCTCP)

๋„ ์ œ์•ˆ๋˜์—ˆ๋‹ค(Alizadeh et al., 2010).

Valancius et al.(2009)์€ ๋ฐ์ดํ„ฐ์„ผํ„ฐ๋ฅผ ์ค‘์•™

์ง‘์ค‘์‹์œผ๋กœ ๊ตฌ์ถ•ํ•˜์ง€ ์•Š๊ณ , ๊ฐœ๋ณ„ ๊ฐ€์ •์˜ ๋ธŒ๋กœ๋“œ๋ฐด

๋“œ ๊ฒŒ์ดํŠธ์›จ์ด์— ์Šคํ† ๋ฆฌ์ง€๋ฅผ ํƒ‘์žฌํ•˜์—ฌ ๊ฐ€์ •์—์„œ

๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ ํญ์ฆํ˜„์ƒ๊ณผ ์ฝ˜ํ…์ธ  ์ค‘์‹ฌ ๋„คํŠธ์›Œํ‚น ๊ธฐ์ˆ 

Internet and Information Security 81

[๊ทธ๋ฆผ 16] Akamai CDN ํ”Œ๋žซํผ์˜ ๊ตฌ์„ฑ์š”์†Œ

*์ถœ์ฒ˜: Nygren et al.(2010)

[๊ทธ๋ฆผ 17] ๊ณ„์ธต์ ์ธ ๋ฐ์ดํ„ฐ์„ผํ„ฐ ๋„คํŠธ์›Œํฌ

*์ถœ์ฒ˜: Benson et al.(2010)

Page 83: nternet I Security - BIGBOOK

์˜ ๋น„๋””์˜ค ์ŠคํŠธ๋ฆฌ๋ฐ ์„œ๋น„์Šค์™€ ๊ฐ™์€ ์‘์šฉ๋“ค์„ ์ฒ˜๋ฆฌ

ํ• ์ˆ˜์žˆ๋Š”๋‚˜๋…ธ๋ฐ์ดํ„ฐ์„ผํ„ฐ(NaDa: Nano Datacenter)

๋ฅผ [๊ทธ๋ฆผ 18]๊ณผ ๊ฐ™์ด ์ œ์•ˆํ•˜ ๋‹ค. ์ด๋ฅผ ํ†ตํ•˜๋ฉด,

20๏ฟฝ30%์˜ ์—๋„ˆ์ง€ ์ ˆ๊ฐํšจ๊ณผ๋ฅผ ๊ธฐ ํ•  ์ˆ˜ ์žˆ๋‹ค๊ณ 

ํ•œ๋‹ค. ๊ตญ๋‚ด์—์„œ๋„ ํด๋ฃจ๋„ท๊ณผ ๊ฐ™์€ CDN ํšŒ์‚ฌ์—์„œ

๋ถ„์‚ฐ์Šคํ† ๋ฆฌ์ง€ ์„œ๋น„์Šค๋ฅผ ์œ„ํ•˜์—ฌ ๊ฐœ๋ณ„ ๊ฐ€์ •์— 650

์—ฌ ์˜ 1TB ํ•˜๋“œ๋””์Šคํฌ๋ฅผ ํƒ‘์žฌํ•œ ์…‹ํ†ฑ๋ฐ•์Šค๋ฅผ ๋ฐฐ

ํฌํ•˜์—ฌ ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜๊ณ  ์žˆ๋Š”๋ฐ, NaDa์™€ ๋น„์Šท

ํ•œ ์•„์ด๋””์–ด๋ฅผ ์ด์šฉํ•˜๊ณ  ์žˆ๋‹ค.

3) IETF ALTO

IETF์—์„œ๋Š” ๋น„ํŠธํ† ๋ ŒํŠธ์™€ ๊ฐ™์€ P2P ์‘์šฉ ํŠธ๋ž˜

ํ”ฝ์˜ ์ฆ๊ฐ€๋กœ ์ธํ•˜์—ฌ ๋„๋ฉ”์ธ ๊ฐ„ ๋งํฌ์˜ ์—ญํญ์ด

๊ณผ๋‹คํ•˜๊ฒŒ ์ ์œ ๋˜๋Š” ํ˜„์ƒ์„ ์™„ํ™”์‹œํ‚ค๊ธฐ ์œ„ํ•˜์—ฌ

ALTO(Application-Layer Traffic Optimization)

์›Œํ‚น๊ทธ๋ฃน์„ ๋งŒ๋“ค์–ด(Seedorf & Burger, 2009)

์ง€์—ญ์  ์ •๋ณด๋ฅผ ์ด์šฉํ•˜์—ฌ P2P ํŒŒ์ผ์ „์†ก๊ณผ ๊ฐ™์€

์—ญํญ์„ ๋งŽ์ด ์ฐจ์ง€ํ•˜๋Š” ์‘์šฉ๋“ค์—๊ฒŒ ๊ฐœ๋ฐฉํ•˜์—ฌ ํŠธ๋ž˜

ํ”ฝ ์ตœ์ ํ™”๋ฅผ ์ด๋ฃจ๊ณ ์ž ํ•˜๊ณ  ์žˆ๋‹ค.

(1) Comcast์‚ฌ์˜ ๊ฒฝ์šฐ

Griffiths et al.(2009)์€ P2P์‘์šฉ ํŠธ๋ž˜ํ”ฝ ๊ฐ

์†Œ๋ฅผ ์œ„ํ•˜์—ฌ iTracker๋ผ๋Š” P4P๊ธฐ์ˆ ์„ ์ด์šฉํ•œ

Comcast์‚ฌ์˜ ์‚ฌ๋ก€๋ฅผ ๋ณด์—ฌ์ฃผ๊ณ  ์žˆ๋‹ค. Pando์‚ฌ์˜

P2P ํด๋ผ์ด์–ธํŠธ๋“ค์„ ์ƒ์œผ๋กœ 1,184๊ฐœ์˜

iTracker๋ฅผ ์ด์šฉํ•œ ์‹คํ—˜(P4P fine grained)๊ณผ

22๊ฐœ iTracker ๋…ธ๋“œ๋ฅผ ์ด์šฉํ•œ ์‹คํ—˜(P4P coarse

grained)์„ ์ˆ˜ํ–‰ํ•œ ๊ฒฐ๊ณผ <ํ‘œ 9>์—์„œ์™€ ๊ฐ™์ด

Comcast์‚ฌ์˜ ๋‹ค์šด๋กœ๋“œ ์„œ๋น„์Šค์—์„œ 57๏ฟฝ85%๊นŒ

์ง€ ํ–ฅ์ƒ๋˜์—ˆ๋‹ค. ์ด๋Š” ๋ฉ€๋ฆฌ ๋–จ์–ด์ ธ์žˆ๋Š” ํ”ผ์–ด์—๊ฒŒ์„œ

ํŒŒ์ผ์„ ๋‹ค์šด๋ฐ›์ง€ ์•Š๊ณ  ์ง€์—ญ์ ์œผ๋กœ ๊ฐ€๊นŒ์šด ๋…ธ๋“œ๋กœ

๋ถ€ํ„ฐ ํŒŒ์ผ์„ ๋‹ค์šด๋ฐ›๊ฒŒ ๋˜์–ด ๋‹ค์šด๋กœ๋“œ ์„œ๋น„์Šค์˜ ์„ฑ

๋Šฅ์ด ํ–ฅ์ƒ๋œ ๊ฒƒ์ด๋‹ค. ์ด์™€ ํ•จ๊ป˜ ๋„๋ฉ”์ธ๊ฐ„์˜ ํŠธ๋ž˜

ํ”ฝ๋„ ์ค„๊ฒŒ ๋˜์—ˆ๋‹ค.

(2) China Telecom์‚ฌ์˜ ๊ฒฝ์šฐ

Lee & Jian(2010)์€ 7๋ฐฑ๋งŒ ๋ธŒ๋กœ๋“œ๋ฐด๋“œ ๊ฐ€์ž…์ž

๋“ค๊ณผ 11๊ฐœ์˜ MAN ๋„คํŠธ์›Œํฌ๋ฅผ ์—ฐ๊ฒฐํ•˜๋Š” China

Telecom์„ ์ƒ์œผ๋กœ ALTO ์‹คํ—˜๊ฒฐ๊ณผ๋ฅผ ์ œ์‹œํ•˜

๋‹ค. Xunlei์‚ฌ๋Š” ์ค‘๊ตญ์˜ P2P ์„œ๋น„์Šค ์ œ๊ณต์—…์ฒด

๋กœ 2009๋…„ ํ˜„์žฌ 1์–ต 2์ฒœ๋งŒ ๊ฐ€์ž…์ž์—๊ฒŒ ์„œ๋น„์Šค๋ฅผ

์ œ๊ณตํ•˜๊ณ  ์žˆ๋‹ค. ์ด ์‹คํ—˜์—์„œ๋Š” P2P ์บ์‹œ๋ฅผ ์ด์šฉ

ํ•œ ์ ์ด Comcast์‚ฌ์™€๋Š” ํฌ๊ฒŒ ๋‹ค๋ฅธ ์ ์ธ๋ฐ, 50๏ฟฝ

55% ํŠธ๋ž˜ํ”ฝ์ด ๊ฐ์†Œํ•˜ ๋‹ค๊ณ  ํ•œ๋‹ค.

์ œ ๊ถŒ ์ œ ํ˜ธ

82 ๋…„ ์›”

[๊ทธ๋ฆผ 18] ๋‚˜๋…ธ ๋ฐ์ดํ„ฐ์„ผํ„ฐ ๊ตฌ์กฐ๋„*์ถœ์ฒ˜: Valancius et al.(2009)

Page 84: nternet I Security - BIGBOOK

4) IEEE NGSON

IEEE(2008)์—์„œ๋Š” ์ฐจ์„ธ ์„œ๋น„์Šค ์˜ค๋ฒ„๋ ˆ์ด ๋„ค

ํŠธ์›Œํฌ(NGSON: Next Generation Service

Overlay Network)์— ๊ด€ํ•œ ํ‘œ์ค€์„ ์ œ์ •ํ•˜๊ณ  ์žˆ๋Š”

๋ฐ, ์ด๋Š” IP ๊ธฐ๋ฐ˜์˜ ์˜ค๋ฒ„๋ ˆ์ด ๋„คํŠธ์›Œํฌ๋ฅผ ๊ตฌ์„ฑํ•˜

์—ฌ ์ปจํ…์ŠคํŠธ(context)์— ๋”ฐ๋ผ QoS, ๋„คํŠธ์›Œํ‚น,

์„œ๋น„์Šค ํƒ€์ž… ๋“ฑ์„ ์œ ์—ฐํ•˜๊ฒŒ ์ œ๊ณตํ•˜๊ณ ์ž ํ•œ๋‹ค. ์ปจ

ํ…์ŠคํŠธ๋Š” ์‚ฌ์šฉ์ž, ๋‹จ๋ง ๋ฐ ๋„คํŠธ์›Œํฌ ์ •๋ณด์— ๋”ฐ๋ผ

๋‹ค์–‘ํ•˜๊ฒŒ ํ™œ์šฉ๋  ์ˆ˜ ์žˆ๋Š”๋ฐ, IETF ALTO์™€ ๊ฐ™์ด

์ง€๋ฆฌ์ ์ธ ๊ฑฐ๋ฆฌ ๋˜๋Š” ๋„คํŠธ์›Œํฌ ํ’ˆ์งˆ์˜ ์ปจํ…์ŠคํŠธ๋„

ํฌํ•จ๋˜์–ด ์„œ๋น„์Šค์— ํ™œ์šฉ๋  ์ˆ˜ ์žˆ๋‹ค. NGSON์€

IT, ํ…”๋ ˆ์ฝค, ๋ฏธ๋””์–ด, ํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ… ๋“ฑ์˜ ์ฐจ์„ธ

์„œ๋น„์Šค๋ฅผ ํฌํ•จํ•˜์—ฌ ๊ฐ€์ƒ์ ์ธ ๋…ผ๋ฆฌ์  ๋งํฌ๋ฅผ ์ด

์šฉํ•˜์—ฌ ๋„คํŠธ์›Œํฌ๋ฅผ ๊ตฌ์„ฑํ•˜๊ฒŒ ํ•œ๋‹ค. NGSON์€

SDP, IMS, NGN, SOA, P2P ๋“ฑ๊ณผ ์ ‘ํ•œ ๊ด€๋ จ

์„ฑ์„ ๋ณด์ด๋ฉฐ, ์ค‘๊ตญ์˜ Huawei์‚ฌ์˜ ์ฃผ๋„ํ•˜์— ํ‘œ์ค€

ํ™”๋˜๊ณ  ์žˆ๋‹ค.

3. ๋ฐ์ดํ„ฐ ํญ์ฆํ˜„์ƒ์„ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•œ ๋ฏธ๋ž˜

์ธํ„ฐ๋„ท

1) ๋ฏธ๋ž˜์ธํ„ฐ๋„ท์˜ ์ฃผ์š” ์—ฐ๊ตฌ ์ฃผ์ œ

Pan et al.(2011)์€ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท์˜ ์ฃผ์š” ์—ฐ๊ตฌ ์ฃผ

์ œ๋ฅผ ๋‹ค์Œ๊ณผ ๊ฐ™์€ ๋‹ค์„ฏ ๊ฐ€์ง€๋กœ ์š”์•ฝํ•˜๊ณ  ์žˆ๋‹ค.

(1) ์ฝ˜ํ…์ธ  ๋˜๋Š” ๋ฐ์ดํ„ฐ ์ค‘์‹ฌ์˜ ํŒจ๋Ÿฌ๋‹ค์ž„

40๋…„ ์ด์ƒ ์ง€์†๋œ ์˜ค๋Š˜๋‚ ์˜ ์ธํ„ฐ๋„ท์€ IP ๊ณ„์ธต

์„ ์ค‘์‹ฌ์œผ๋กœ ๋‹ค์–‘ํ•œ ํ•˜์œ„ ๊ณ„์ธต๋ฟ๋งŒ ์•„๋‹ˆ๋ผ ์ƒ์œ„

๊ณ„์ธต ํ”„๋กœํ† ์ฝœ์„ ์ง€์›ํ•˜๋Š” ๋ฐฉ์‹์ด๋‹ค. ์ดˆ๊ธฐ ์ด๋ฉ”

์ผ, ํ…”๋„ท ๋ฐ ํŒŒ์ผ ์ „์†ก์—์„œ๋ถ€ํ„ฐ VoIP, ๋น„๋””์˜ค ์Šค

ํŠธ๋ฆฌ๋ฐ ๋ฐ P2P ๋“ฑ๊ณผ ๊ฐ™์€ ์‘์šฉ์˜ ๋ฐœ์ „์„ IP ๊ธฐ

๋ฐ˜์œผ๋กœ ์ด๋ฃจ์—ˆ์œผ๋ฉฐ, xDSL, T1, T3, ATM,

1๏ฟฝ10Gbps ์ด๋”๋„ท, SONET/SDH, WDM,

WLAN, CDMA ๋ฐ GSM ๋“ฑ์˜ ๋‹ค์–‘ํ•œ ๋งํฌ ๊ณ„์ธต

๋“ค๋„ IP ๊ณ„์ธต์„ ํ†ตํ•ด์„œ ๊ฒฐํ•ฉ์ด ๋˜์—ˆ๋‹ค. ํ•˜์ง€๋งŒ,

IP ๊ณ„์ธต ๋•Œ๋ฌธ์— ๋ฏธ๋ž˜์ธํ„ฐ๋„ท์˜ ์ถ”๊ฐ€์ ์ธ ์š”๊ตฌ์‚ฌ

ํ•ญ์ด ํ˜„์žฌ ์ธํ„ฐ๋„ท์— ๊ตฌํ˜„๋˜๊ธฐ๊ฐ€ ํž˜๋“ค๋‹ค. ํ˜„์žฌ์˜

์ธํ„ฐ๋„ท์€ ํ˜ธ์ŠคํŠธ-ํ˜ธ์ŠคํŠธ ํ†ต์‹ ์„ ์ง€์›ํ•˜๊ธฐ ์œ„ํ•ด

์„œ ๋งŒ๋“ค์–ด์กŒ๊ธฐ ๋•Œ๋ฌธ์— ์ฝ˜ํ…์ธ  ๋˜๋Š” ๋ฐ์ดํ„ฐ ์ค‘์‹ฌ

์˜ ์•„ํ‚คํ…์ฒ˜๋ฅผ ๋งŒ๋“ค๊ธฐ ์œ„ํ•ด์„œ๋Š” ํ˜„์žฌ์˜ IP ๊ณ„์ธต

๊ธฐ๋ฐ˜ ๊ตฌ์กฐ๋ฅผ ๋ฐ”๊พธ์–ด์•ผ ํ•œ๋‹ค. ์ฝ˜ํ…์ธ  ์ค‘์‹ฌ์˜ ํŒจ๋Ÿฌ

๋‹ค์ž„์œผ๋กœ ์ธํ•˜์—ฌ ์ฝ˜ํ…์ธ  ๋ณด์•ˆ, ํ”„๋ผ์ด๋ฒ„์‹œ, ๊ทœ๋ชจ

ํ™•์žฅ์„ฑ ๋ฐ ํ˜ธํ™˜์„ฑ ๋“ฑ์— ํ•œ ์ถ”๊ฐ€ ์š”๊ตฌ ์‚ฌํ•ญ์ด

๊ณ ๋ ค๋˜๊ณ  ์žˆ๋‹ค.

(2) ์ด๋™์„ฑ๊ณผ ์œ ๋น„์ฟผํ„ฐ์Šค ์•ก์„ธ์Šค

PC ๊ธฐ๋ฐ˜์˜ ํ˜„์žฌ ์ธํ„ฐ๋„ท์€ ๋ชจ๋ฐ”์ผ ์ปดํ“จํŒ… ์ค‘์‹ฌ์œผ

๋กœ ์ด๋™๋˜๊ณ  ์žˆ๋‹ค. ๋”ฐ๋ผ์„œ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท์—์„œ๋Š” ์ด๋™

์„ฑ์€ ํ•„์ˆ˜์ ์ธ ํ‚ค์›Œ๋“œ์ด๋‹ค. ์ด๋™์ „ํ™” ๋„คํŠธ์›Œํฌ, IP,

๋ฌด์„  ์• ๋“œํ˜น, ์„ผ์„œ ๋„คํŠธ์›Œํฌ ๋“ฑ์˜ ๊ฒฐํ•ฉ์— ํ•œ ์š”๊ตฌ

์‚ฌํ•ญ์€ ์ง€์†์ ์œผ๋กœ ์ฆ๊ฐ€ํ•˜๊ณ  ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ๋‹ค์–‘ํ•œ

๋„คํŠธ์›Œํฌ๊ฐ€ ์ด๋™์„ฑ์„ ํšจ์œจ์ ์œผ๋กœ ์ง€์›ํ•˜๊ฒŒ ๋˜๋ฉด ์ฐฝ

์กฐ์ ์ธ ์ƒˆ๋กœ์šด ์‘์šฉ์ด๋‚˜ ์„œ๋น„์Šค๊ฐ€ ๋“ฑ์žฅํ•  ์ˆ˜ ์žˆ์„

๊ฒƒ์ด๋‹ค. ๊ทœ๋ชจ ํ™•์žฅ์„ฑ(scalability)์„ ์ง€์›ํ•˜๋Š” ์ด๋™

๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ ํญ์ฆํ˜„์ƒ๊ณผ ์ฝ˜ํ…์ธ  ์ค‘์‹ฌ ๋„คํŠธ์›Œํ‚น ๊ธฐ์ˆ 

Internet and Information Security 83

*์ถœ์ฒ˜: Griffiths et al.(2009)

Swarm Global Average B/s change Comcast Average B/s change

Random Peer Assignment 144,045 254,671

P4P Fine Grained 162,344 +13% 402,043 +57%

P4P Generic Weight Matrix 163,205 +13% 463,782 +82%

P4P Coarse Grained 166,273 +15% 471,218 +85%

<ํ‘œ 9> Comcast์‚ฌ์˜ P4P ์‚ฌ๋ก€

Page 85: nternet I Security - BIGBOOK

์„ฑ, ์ด๋™ ์‚ฌ์šฉ์ž๋“ค์˜ ๋ณด์•ˆ, ์ž์› ์ตœ์ ํ™” ๋“ฑ์˜ ์ถ”๊ฐ€

์ ์ธ ์—ฐ๊ตฌ์ฃผ์ œ์— ํ•œ ํ•„์š”์„ฑ์ด ์ œ๊ธฐ๋˜๊ณ  ์žˆ๋‹ค.

(3) ํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ… ๊ธฐ๋ฐ˜์˜ ์•„ํ‚คํ…์ฒ˜

ํด๋ผ์šฐ๋“œ๋Š” ํ˜„์žฌ ์Šคํ† ๋ฆฌ์ง€ ์ค‘์‹ฌ์œผ๋กœ ํ™•์‚ฐ๋˜๊ณ 

์žˆ์ง€๋งŒโ€˜์ปดํ“จํŒ… ์œ ํ‹ธ๋ฆฌํ‹ฐโ€™๋ผ๋Š” ๊ด€์ ์˜ ์žฌ์ฐฝ์กฐ๋œ

์„œ๋น„์Šค๋ผ๊ณ  ๋ณผ ์ˆ˜ ์žˆ๋‹ค. ๋กœ๋ฒŒ ๊ธฐ์—… ์ค‘์‹ฌ์˜ ์„œ๋น„

์Šค ๋•๋ถ„์—โ€˜์œ ํ‹ธ๋ฆฌํ‹ฐโ€™๋ฅผ ์ ์ ˆํ•˜๊ฒŒ ์ œ๊ณตํ•˜๊ธฐ ์œ„ํ•ด

์„œ ๋กœ๋ฒŒ ์ž์› ํ”„๋กœ๋น„์ €๋‹(provisioning)์—

ํ•œ ์ƒˆ๋กœ์šด ๋ฌธ์ œ๊ฐ€ ์ œ๊ธฐ๋˜์—ˆ๋‹ค. ํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ…์—

์„œ ๋ฐ์ดํ„ฐ์„ผํ„ฐ๋Š” ํ•ต์‹ฌ์ ์ธ ์—ญํ• ์„ ์ˆ˜ํ–‰ํ•˜๊ณ  ์žˆ๋‹ค.

๋ฐ์ดํ„ฐ์„ผํ„ฐ๋Š” ๋ฐ์ดํ„ฐ๋ฅผ ์ƒํ˜ธ์—ฐ๊ฒฐํ•˜๋ฉด์„œ ๋ณด์•ˆ๊ณผ

ํ™•์žฅ์„ฑ ๋ฐ ์‹ ๋ขฐ์„ฑ์„ ํ•จ๊ป˜ ์ œ๊ณตํ•ด์•ผ ํ•œ๋‹ค. ๋˜ํ•œ ๋ฐ

์ดํ„ฐ์„ผํ„ฐ์˜ ์ œ์–ด์™€ ๊ด€๋ฆฌ ํ”Œ๋ ˆ์ธ ๋˜ํ•œ ์ค‘์š”ํ•œ ์ฃผ์ œ

์ด๋‹ค. ๊ทธ๋ฆฐ ์ปดํ“จํŒ…, ์ง€์†๊ฐ€๋Šฅํ•œ ์„œ๋น„์Šค ๊ฐ€์šฉ์„ฑ๊ณผ

ํ•จ๊ป˜ ์‹ ๋ขฐ์„ฑ์— ํ•œ ์š”๊ตฌ์‚ฌํ•ญ์ด ์ตœ๊ทผ ์ด์Šˆ์ด๋‹ค.

(4) ๋ณด์•ˆ

์ธํ„ฐ๋„ท์ด ๋งŒ๋“ค์–ด์ง€๊ณ  ๋‚œ ํ›„ ๋ณด์•ˆ์— ๊ด€ํ•œ ์—ฌ๋Ÿฌ

๊ฐ€์ง€ ๊ธฐ์ˆ ๋“ค์ด ์ถ”๊ฐ€๋˜์—ˆ๋‹ค. ๋”ฐ๋ผ์„œ ์ธํ„ฐ๋„ท์ด ๋ณธ์งˆ

์ ์œผ๋กœ ๋ณด์•ˆ์ด ๊ณ ๋ ค๋˜์ง€ ์•Š์€ ์ƒํƒœ์—์„œ ์—ฌ๋Ÿฌ ๊ฐ€์ง€

์˜ค๋ฒ„๋ ˆ์ด ํ˜•ํƒœ์˜ ๋ณด์•ˆ ๊ธฐ์ˆ ๋“ค์ด ์ถ”๊ฐ€๋˜์—ˆ๊ธฐ ๋•Œ๋ฌธ

์— ๊ทผ๋ณธ์ ์ธ ๋ณด์•ˆ์— ํ•œ ์š”๊ตฌ์‚ฌํ•ญ์„ ๋งŒ์กฑ์‹œํ‚ฌ ์ˆ˜

์—†๋‹ค. ๋ฏธ๋ž˜์ธํ„ฐ๋„ท์—์„œ๋Š” ๋ณด์•ˆ์„ ๋‚ด์žฌํ•œ ์ƒํƒœ์—์„œ

์„ค๊ณ„๋˜์–ด์•ผ ํ•˜๋Š”๋ฐ, ๊ธฐ์ˆ ์ ์œผ๋กœ ์•”ํ˜ธํ™”, ์ธ์ฆ ๋ฐ

๊ถŒํ•œ ๋“ฑ์— ํ•œ ๋‹ค์–‘ํ•œ ์ˆ˜์ค€์„ ์ง€์›ํ•˜๊ณ  ํ™•์žฅ๊ฐ€๋Šฅ

์„ฑ์„ ๊ณ ๋ คํ•ด์•ผ ํ•œ๋‹ค.

(5) ํ…Œ์ŠคํŠธ๋ฒ ๋“œ

์ƒˆ๋กœ์šด ์ธํ„ฐ๋„ท ์•„ํ‚คํ…์ฒ˜๋ฅผ ๊ฐœ๋ฐœํ•˜๊ธฐ ์œ„ํ•ด์„œ๋Š”

๊ทœ๋ชจ ํ…Œ์ŠคํŠธ๋ฒ ๋“œ๊ฐ€ ํ•„์š”ํ•˜๋‹ค. ๋‹ค์–‘ํ•œ ๊ฐ€์ƒํ™” ๊ธฐ์ˆ ๋“ค

์„ ์‚ฌ์šฉํ•œ ํ…Œ์ŠคํŠธ๋ฒ ๋“œ๊ฐ€ ๋“ฑ์žฅํ•˜๊ธฐ ์‹œ์ž‘ํ•˜ ๊ธฐ ๋•Œ๋ฌธ

์— ์ด๋“ค์„ ์—ฐํ•ฉ์‹œํ‚ฌ ํ•„์š”๊ฐ€ ์žˆ๋‹ค. ๋ฏธ๊ตญ, ์œ ๋Ÿฝ ๋ฐ ์•„

์‹œ์•„ ์ง€์—ญ ๊ตญ๊ฐ€์—์„œ ํ…Œ์ŠคํŠธ๋ฒ ๋“œ๊ฐ€ ์ด๋ฏธ ์‹œ์ž‘๋˜์—ˆ๊ณ 

์ด๋“ค ๊ฐ„์˜ ์ƒํ˜ธํ˜‘๋ ฅ๊ด€๊ณ„๋ฅผ ์„ค๋ฆฝํ•˜๋Š” ๊ฒŒ ํ•„์š”ํ•˜๋‹ค.

2) CCN

Jacobson et al.(2009)์€ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท์˜ ๊ทผ๊ฐ„์œผ

๋กœ ์ฃผ๋ชฉ๋ฐ›๊ณ  ์žˆ๋Š” CCN(Content-Centric

Networking)์— ํ•œ ์•„์ด๋””์–ด์™€ ๊ตฌ์ฒด์ ์ธ ํ”„๋กœํ† 

ํƒ€์ž… ๊ตฌํ˜„ ์‚ฌ๋ก€๋ฅผ ์ œ์‹œํ•˜ ๋‹ค. ์ด ๋…ผ๋ฌธ์—์„œ๋Š” ๊ธฐ์กด

์˜ ๋„คํŠธ์›Œํ‚น ๋ฐฉ์‹์ด ํด๋ผ์ด์–ธํŠธ-์„œ๋ฒ„ ๋ฐฉ์‹์˜ ์—ฐ๊ฒฐ

์— ์ดˆ์ ์„ ๋‘์—ˆ๊ธฐ ๋•Œ๋ฌธ์— ์ฝ˜ํ…์ธ  ์ค‘์‹ฌ์˜ ์ƒ๊ฐ์œผ๋กœ

์ „ํ™˜ํ•ด์•ผ ํ•œ๋‹ค๋Š” ๊ฒƒ์„ ์ œ์•ˆํ•˜ ๋‹ค. ์ฆ‰, ๋ฐœํ–‰๋œ ์ฝ˜

ํ…์ธ ๊ฐ€ ๋งŽ์€ ์‚ฌ์šฉ์ž๋“ค์— ์˜ํ•ด์„œ ์†Œ๋น„๋˜๋Š”๋ฐ, ๋™์ผ

ํ•œ ์ฝ˜ํ…์ธ ๋ฅผ ํด๋ผ์ด์–ธํŠธ๋งˆ๋‹ค ๋ฐ˜๋ณต์ ์œผ๋กœ ์ „์†กํ•˜๋˜

๊ธฐ์กด์˜ ํด๋ผ์ด์–ธํŠธ-์„œ๋ฒ„ ๋ฐฉ์‹์ด ๋น„ํšจ์œจ์ ์ด๊ธฐ ๋•Œ

๋ฌธ์— 1๊ฐœ์˜ ์ฝ˜ํ…์ธ ๊ฐ€ ๋ฐœํ–‰๋œ ํ›„ ๋ผ์šฐํ„ฐ๋“ค์˜ ์ฝ˜ํ…์ธ 

์Šคํ† ์–ด(contents store)๊ฐ€ ์ฝ˜ํ…์ธ ์˜ ์บ์‹œ ์—ญํ• ์„

์ˆ˜ํ–‰ํ•˜์—ฌ ์ค‘๋ณต๋œ ์ „๋‹ฌ์„ ๋ฐฉ์ง€ํ•˜๊ณ  ์บ์‹œ ๋ฐ์ดํ„ฐ๋กœ

๋ถ€ํ„ฐ ์ˆ˜์‹ ํ•˜์—ฌ ์ „์ฒด์ ์ธ ํŠธ๋ž˜ํ”ฝ์–‘์„ ์ค„์ผ ์ˆ˜ ์žˆ๋‹ค

๋Š” ๊ฒƒ์ด๋‹ค. [๊ทธ๋ฆผ 19]์—์„œ ๋ณด๋ฉด ๊ธฐ์กด์˜ TCP/IP ๋„ค

ํŠธ์›Œํฌ์˜ ์ค‘์‹ฌ์ธ IP๋ฅผ ์ฝ˜ํ…์ธ ๊ฐ€ ์ฒดํ•˜๋Š” ๊ฒƒ์„ ๋ณผ

์ˆ˜ ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ์ฝ˜ํ…์ธ ์— ํ•œ ์š”์ฒญ์€ Interest

ํŒจํ‚ท์— ์˜ํ•ด์„œ ์ฒ˜๋ฆฌ๋˜์–ด ๋ผ์šฐํ„ฐ์— ์บ์‹œ๊ฐ€ ์—†์„ ๊ฒฝ

์šฐ ์›๋ž˜์˜ ์ฝ˜ํ…์ธ  ๋ฐœํ–‰์ง€์—๊ฒŒ ์ „๋‹ฌ๋œ๋‹ค. ์ดํ›„ ๋™์ผ

ํ•œ ์ฝ˜ํ…์ธ  ์š”์ฒญ์— ํ•ด์„œ๋Š” ๋ผ์šฐํ„ฐ์˜ ์บ์‹œ์— ์ €์žฅ

๋˜์–ด ์žˆ์„ ๊ฒฝ์šฐ Data ํŒจํ‚ท์œผ๋กœ ์ „๋‹ฌ๋œ๋‹ค.

ํ˜„์žฌ IP๋ง์—์„œ๋„ ์˜ค๋ฒ„๋ ˆ์ด๋กœ ๊ตฌํ˜„๋  ์ˆ˜ ์žˆ๊ฒŒ ํ”„

๋กœํ† ํƒ€์ž… ๊ฒฐ๊ณผ๋ฅผ ์ œ์‹œํ•˜ ๋Š”๋ฐ, [๊ทธ๋ฆผ 20]๊ณผ ๊ฐ™์ด

๋™์ผํ•œ ์ฝ˜ํ…์ธ ์˜ ์š”์ฒญ์ด CCN์—์„œ๋Š” ํด๋ผ์ด์–ธํŠธ

์ˆ˜๊ฐ€ ์ฆ๊ฐ€ํ•˜๋”๋ผ๋„ ๋™์ผํ•œ ๋‹ค์šด๋กœ๋“œ ์‹œ๊ฐ„์„ ๋ณด์ธ

๋ฐ˜๋ฉด, ๊ธฐ์กด์˜ TCP๋ฅผ ์—ฐ๊ฒฐํ•œ ๋ฐฉ์‹์—์„œ๋Š” ํด๋ผ์ด์–ธ

ํŠธ ์ˆ˜๊ฐ€ ์ฆ๊ฐ€ํ• ์ˆ˜๋ก ๋‹ค์šด๋กœ๋“œ ์‹œ๊ฐ„์ด ์„ ํ˜•์ ์œผ๋กœ

์ฆ๊ฐ€ํ•จ์„ ๋ณผ ์ˆ˜ ์žˆ๋‹ค.

ํ•œํŽธ, CCN์™€ ๊ด€๋ จํ•˜์—ฌ Named Data

Networking(http://www.named-data.net),

ANR Connect(http://www.anr-connect.org),

Convergence(http://www.ict-convergence.eu),

SAIL(http://www.sail-project.eu),

PURSUIT(http://www.fp7-pursuit.eu),

์ œ ๊ถŒ ์ œ ํ˜ธ

84 ๋…„ ์›”

Page 86: nternet I Security - BIGBOOK

COMNET(http://www.comet-project.org)

๋“ฑ์˜ ์—ฐ๊ตฌ๋“ค์ด ์ง„ํ–‰๋˜๊ณ  ์žˆ๋‹ค.

CCN ๊ธฐ์ˆ ์˜ ์‹คํ˜„๊ฐ€๋Šฅ์„ฑ์— ํ•˜์—ฌ Perino &

Varvello(2011)์—์„œ ์ž์„ธํžˆ ๋ถ„์„ํ•˜๊ณ  ์žˆ๋Š”๋ฐ, 10

์–ต ๊ฐœ ์ •๋„์˜ IP ์ฃผ์†Œ๋ฅผ ์ฒ˜๋ฆฌํ•˜๋Š” ํ˜„์žฌ์˜ ๋ผ์šฐํ„ฐ

๊ฐ€ 1์กฐ ๊ฐœ ์ •๋„์˜ ์ด๋ฆ„์„ ์ฒ˜๋ฆฌํ•˜๊ธฐ ์œ„ํ•œ ๋น„์šฉ์„

๊ณ ๋ คํ•˜๊ณ , ์ด๋ฆ„์„ ๊ธฐ๋ฐ˜์œผ๋กœ ํ•˜๋Š” ํŒจํ‚ทํฌ์›Œ๋”ฉ๊ณผ ํŒจ

ํ‚ท๋‹จ์œ„์˜ ์บ์‹ฑ์„ ์œ„ํ•œ ๊ณ ์† ํ•˜๋“œ์›จ์–ด์™€ ์†Œํ”„ํŠธ์›จ

์–ด ๊ธฐ์ˆ  ์ˆ˜์ค€์„ ๋ณด๋ฉด CDN์ด๋‚˜ ISP ์ •๋„์˜ ๊ทœ๋ชจ

์—์„œ๋Š” ์ ํ•ฉํ•˜์ง€๋งŒ, ๋กœ๋ฒŒ ๋ผ์šฐํ„ฐ์—๋Š” ๊ณ ๋น„์šฉ์„

์ดˆ๋ž˜ํ•œ๋‹ค๊ณ  ํ•œ๋‹ค.

3) ๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ ํญ์ฆํ˜„์ƒ์˜ ๊ธฐํšŒ

(1) ๋น… ๋ฐ์ดํ„ฐ ์ „๋‹ฌ ์„œ๋น„์Šค

์ฆ๊ฐ€ํ•˜๊ณ  ์žˆ๋Š” ๋ฐ์ดํ„ฐ์–‘๊ณผ ์ €์žฅ์žฅ์น˜์— ๋น„ํ•ด์„œ

๋„คํŠธ์›Œํฌ ์—ญํญ์˜ ๋ฐœ์ „ ์†๋„๋Š” ๋Š๋ฆฌ๋‹ค. ์Šค๋งˆํŠธ

ํฐ์˜ ์ธ๊ธฐ์™€ ๋”๋ถˆ์–ด ์ด๋™ํ†ต์‹ ์˜ ๋ณด๊ธ‰์ด ๋”์šฑ ๊ด‘

๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ ํญ์ฆํ˜„์ƒ๊ณผ ์ฝ˜ํ…์ธ  ์ค‘์‹ฌ ๋„คํŠธ์›Œํ‚น ๊ธฐ์ˆ 

Internet and Information Security 85

email๏ฟฝWWW๏ฟฝphone...

Individual๏ฟฝapps

Every๏ฟฝnode

Individual๏ฟฝlinks

SMTP๏ฟฝHTTP๏ฟฝRTP...

TCP๏ฟฝUDP...

IP

ethernet๏ฟฝPPP...

CSMA๏ฟฝasync๏ฟฝsonet...

copper๏ฟฝfiber๏ฟฝradio...

browser๏ฟฝchat...

File๏ฟฝStream...

Security

Contentchunks

Strategy

IP๏ฟฝUDP๏ฟฝP2P๏ฟฝBCast...

copper๏ฟฝfiber๏ฟฝradio...

[๊ทธ๋ฆผ 19] CCN ๊ตฌ์กฐ*์ถœ์ฒ˜: Jacobson et al.(2009)

[๊ทธ๋ฆผ 20] CCN ์‹คํ—˜๊ฒฐ๊ณผ(CCN vs TCP)*์ถœ์ฒ˜: Jacobson et al.(2009)

Page 87: nternet I Security - BIGBOOK

๋ฒ”์œ„ํ•ด์ง€๋ฉด์„œ ๋„คํŠธ์›Œํฌ ์—ญํญ์˜ ์ฆ๊ฐ€์†๋„ ๋ฌธ์ œ

์ ์ด ๊ณ„์†ํ•˜์—ฌ ์ง€์ ๋˜๊ณ  ์žˆ๋‹ค. ํŠนํžˆ, ๋ธŒ๋กœ๋“œ๋ฐด๋“œ

์•ก์„ธ์Šค ๋„คํŠธ์›Œํฌ๋Š” ๋งŽ์€ ISP๋“ค์ด ํˆฌ์ž์ˆ˜์ต(ROI:

Return on Invest)์„ ์–ป๊ณ  ์žˆ์ง€ ์•Š๊ธฐ ๋•Œ๋ฌธ์— ์ง€

์†์ ์ธ ๋„คํŠธ์›Œํฌ ์—ญํญ ์ฆ๊ฐ€๋ฅผ ์˜ˆ์ƒํ•  ์ˆ˜ ์—†๋‹ค.

ํ•˜์ง€๋งŒ, ๋งŽ์€ ์–‘์˜ ์ •๋ณด๊ฐ€ ์ƒ์‚ฐ๋˜๊ณ  ์ด๋“ค์ด ์—ฌ

๋Ÿฌ ๊ฐœ์˜ ๊ฐœ์ธ ๋‹จ๋ง๊ธฐ์™€ ํด๋ผ์šฐ๋“œ์— ํ˜ผ์žฌ๋˜์–ด์žˆ๋Š”

์ƒํ™ฉ์ด ์ฆ๊ฐ€ํ•˜๊ณ  ์žˆ๊ธฐ ๋•Œ๋ฌธ์— ์ด๋“ค์„ ๋น ๋ฅด๊ฒŒ ์ „๋‹ฌ

ํ•˜๋ฉด์„œ ๋™๊ธฐํ™”ํ•˜๋Š” ๊ธฐ์ˆ ๋“ค์€ ํ•„์ˆ˜์ ์ด๋‹ค. KT

uCloud, ๋„ค์ด๋ฒ„ N๋“œ๋ผ์ด๋ธŒ, ๋‹ค์Œ ํด๋ผ์šฐ๋“œ,

Dropbox, Box.net, Microsoft Skydrive/Live

Mesh, Apple iCloud ๋“ฑ์ด ์ด๋Ÿฌํ•œ ์„œ๋น„์Šค๋ฅผ ์ œ๊ณต

ํ•˜๊ณ  ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ๊ฐœ์ธ์˜ ํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ์—์„œ์˜

์ €์žฅ์†Œ์—๋Š” ๋‹ค์–‘ํ•œ ์ข…๋ฅ˜์˜ ๋ฐ์ดํ„ฐ๊ฐ€ ์žˆ๋‹ค. ์˜ˆ๋ฅผ

๋“ค์–ด ๋น„๋””์˜ค์™€ ์Œ์•…๊ณผ ๊ฐ™์€ ์ŠคํŠธ๋ฆฌ๋ฐ ์„œ๋น„์Šค๊ฐ€ ํ•„

์š”ํ•œ ๊ฒฝ์šฐ๋„ ์žˆ๊ณ , e-book ๋ฐ ํŒŒ์ผ๊ณผ ๊ฐ™์ด ์ ์ ˆ

ํ•œ ์ฒ˜๋ฆฌ์œจ์„ ์š”๊ตฌํ•˜๋Š” ๊ฒฝ์šฐ๋„ ์žˆ๋‹ค.

๋งŽ์€ ์–‘์˜ ์ •๋ณด๋ฅผ ๋™๊ธฐํ™”๋œ ์ƒํƒœ์—์„œ ๋น ๋ฅด๊ฒŒ ์ „

๋‹ฌํ•˜๊ธฐ ์œ„ํ•œ ์ข…ํ•ฉ์ ์ธ ์ฝ˜ํ…์ธ  ๊ด€๋ฆฌ ๋ฐ ์ „๋‹ฌ์„œ๋น„์Šค

๋ฅผ ์ œ๊ณตํ•˜๋Š” ๊ฒƒ์ด ISP์˜ ์ฃผ๋œ ์—ญํ• ์ด ๋  ๊ฒƒ์œผ๋กœ

์ „๋ง๋œ๋‹ค. ์ด๋ฅผ ์œ„ํ•˜์—ฌ ๊ฐ€์ž…์ž์—๊ฒŒ ํ˜„์žฌ์˜ ์ธํ„ฐ

๋„ท ์„œ๋น„์Šค์™€ ๊ฐ™์ด ๋‹จ์ˆœํ•œ ๋ฐ์ดํ„ฐ ์ „๋‹ฌ ์„œ๋น„์Šค๋งŒ์„

์ œ๊ณตํ•˜๋Š” ๊ฒƒ์ด ์•„๋‹ˆ๋ผ, ์ฝ˜ํ…์ธ ์˜ ์ธ๊ธฐ๋„, ์ข…๋ฅ˜,

์ด๋™์„ฑ, ๋ณด์•ˆ, n-screen ๋“ฑ์˜ ์†์„ฑ ๋“ฑ์„ ๊ณ ๋ คํ•˜

์—ฌ ์ฐจ๋ณ„ํ™”๋˜๊ณ  ๊ฐ€์ƒํ™”๋œ ๋„คํŠธ์›Œํฌ ์„œ๋น„์Šค๊ฐ€ ํ•„์š”

ํ•  ๊ฒƒ์ด๋‹ค. ํŠนํžˆ, ํญ์ฆํ•˜๋Š” ๋ฐ์ดํ„ฐ์–‘์— ๋น„๋ก€ํ•œ ๋„ค

ํŠธ์›Œํฌ ์ž์›์— ํˆฌ์žํ•˜๊ธฐ ์–ด๋ ค์šด ISP์˜ ํ˜„์‹ค์€ ์ตœ

์ ํ™”๋œ ํŠธ๋ž˜ํ”ฝ ๊ด€๋ฆฌ ๊ธฐ๋ฒ•์„ ์š”๊ตฌํ•  ๊ฒƒ์ด๋‹ค. ๋˜ํ•œ,

Google, Amazon, Microsoft, IBM, Apple ๋“ฑ

์˜ ๊ธฐ์—…๋“ค์€ ๊ทœ๋ชจ ๋ฐ์ดํ„ฐ์„ผํ„ฐ๋ฅผ ์ „ ์„ธ๊ณ„์ ์œผ๋กœ

๊ตฌ์ถ•ํ•˜์—ฌ ๊ทœ๋ชจ ๋ฐ์ดํ„ฐ ์ €์žฅ๊ณผ ํ•จ๊ป˜ ๋น ๋ฅธ ์ ‘์†

์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜๊ณ  ์žˆ๋Š”๋ฐ, ๋งŽ์€ ์–‘์˜ ์ •๋ณด์™€ ๋น 

๋ฅธ ๋„คํŠธ์›Œํฌ ์„œ๋น„์Šค๊ฐ€ ์ฐจ๋ณ„ํ™”๋œ ๋ฐ์ดํ„ฐ์„ผํ„ฐ๋ฅผ ์ œ

๊ณตํ•  ์ˆ˜ ์žˆ์„ ๊ฒƒ์ด๋‹ค. ๊ตญ๋‚ด์—์„œ๋Š” ์ž‘์€ ์‹œ์žฅ ๊ทœ๋ชจ

๋กœ ์ธํ•˜์—ฌ ๋ฐ์ดํ„ฐ์„ผํ„ฐ์— ํ•œ ๊ธฐ์ˆ  ๊ฐœ๋ฐœ์ด ๋Š๋ฆฌ์ง€

๋งŒ, ์ผ๋ณธ Softbank์‚ฌ ๋ฐ์ดํ„ฐ๋ฅผ ๊ตญ๋‚ด ๊น€ํ•ด ๋ฐ์ด

ํ„ฐ์„ผํ„ฐ์— ์ด์ „ํ•˜๋Š” ๊ฒƒ์„ ๊ณ„๊ธฐ๋กœ ๋ฐ์ดํ„ฐ์„ผํ„ฐ ๊ธฐ์ˆ 

์— ํ•œ ๋…ผ์˜๊ฐ€ ์‹œ์ž‘๋˜๊ณ  ์žˆ๋‹ค. ๋„คํŠธ์›Œํฌ ๋ถ„์•ผ์—

์„œ๋„ ๋ฐ์ดํ„ฐ์„ผํ„ฐ์˜ ์„ฑ๋Šฅํ–ฅ์ƒ์„ ์œ„ํ•œ ๋‹ค์–‘ํ•œ ์—ฐ๊ตฌ

๊ฐ€ ์ˆ˜ํ–‰๋˜๊ณ  ์žˆ๋Š”๋ฐ, ACM SIGCOMM 2011์—์„œ

์ด 11๊ฐœ ์„ธ์…˜ ์ค‘ 3๊ฐœ์˜ ์„ธ์…˜์—์„œ ๋ฐ์ดํ„ฐ์„ผํ„ฐ์˜

๊ตฌ์กฐ ์„ค๊ณ„, ์„ฑ๋Šฅ ๋ฐ ๋„คํŠธ์›Œํ‚น์— ๊ด€๋ จ๋œ ๋…ผ๋ฌธ๋“ค์ด

๋ฐœํ‘œ๋˜์—ˆ๋‹ค.

(2) ๋น… ๋ฐ์ดํ„ฐ ๋ถ„์„(Big Data Analysis)

๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ ํญ์ฆํ˜„์ƒ์€ ๋„คํŠธ์›Œํฌ ์—”์ง€๋‹ˆ์–ด

์—๊ฒŒ ๊ณ ๋ฏผ๊ฑฐ๋ฆฌ๋ฅผ ๋งŒ๋“ค์–ด ์ฃผ์—ˆ๋‹ค. ์ฆ‰, ๋งŽ์€ ๊ฐ€์ž…์ž

๋“ค๊ณผ ์ƒˆ๋กœ์šด ๋‹จ๋ง๋“ค์ด ์ธํ„ฐ๋„ท์— ์—ฐ๊ฒฐ๋˜์–ด ๋น„๋””์˜ค

์ŠคํŠธ๋ฆฌ๋ฐ๊ณผ ๊ฐ™์€ ๋งŽ์€ ๋ฐ์ดํ„ฐ๋ฅผ ์‚ฌ์šฉํ•˜๋Š” ์‘์šฉ๋“ค

์ด ํ™œ์„ฑํ™”๋˜๋ฉด์„œ ์ด๋™์„ฑ, ๋ณด์•ˆ ๋ฐ ์„œ๋น„์Šค ํ’ˆ์งˆ ๋“ฑ

๊ณผ ๊ฐ™์€ ๋ฌธ์ œ์ ๋“ค์ด ๋„์ถœ๋˜์–ด ๋ฏธ๋ž˜์ธํ„ฐ๋„ท์— ํ•œ

์—ฐ๊ตฌ๊ฐ€ ํ™œ์„ฑํ™”๋˜๊ณ  ์žˆ๋‹ค.

ํ•œํŽธ์œผ๋กœ, ํญ๋ฐœ์ ์œผ๋กœ ์ฆ๊ฐ€ํ•œ ๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ ์ž

์ฒด์— ํ•ด์„œ๋Š” ๊ธฐ์กด์˜ ๋ฐ์ดํ„ฐ๋งˆ์ด๋‹๊ณผ ๋ฐ์ดํ„ฐ ์›จ

์–ดํ•˜์šฐ์Šค ๋“ฑ์—์„œ ์‚ฌ์šฉ๋œ ๋ถ„์„๊ธฐ๋ฒ•๋“ค์ด ๋ถ„์‚ฐ๋ณ‘๋ ฌ

์ฒ˜๋ฆฌ ํ”Œ๋žซํผ์„ ํ†ตํ•ด ์ƒˆ๋กœ์šด ๋ถ€๊ฐ€๊ฐ€์น˜๋ฅผ ์ฐฝ์ถœํ•˜๊ณ 

์žˆ๋‹ค. ํ‘œ์ ์œผ๋กœ Google์—์„œ๋Š” MapReduce๋ผ

๋Š” ์†Œํ”„ํŠธ์›จ์–ด ํ”„๋ ˆ์ž„์›Œํฌ๋ฅผ ๊ฐœ๋ฐœํ•˜์—ฌ ์›น ํŽ˜์ด์ง€

๋ฅผ ์ˆ˜์ง‘ํ•˜๊ณ  ํ‚ค์›Œ๋“œ์— ๋”ฐ๋ฅธ ์šฐ์„ ์ˆœ์œ„๋ฅผ ๋งค๊ธฐ๋Š”

PageRank๋ผ๋Š” ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ๋งŒ๋“ค์—ˆ๊ณ , ๊ธฐ์กด์˜ ๊ฒ€

์ƒ‰์—”์ง„๋“ค์„ ์–ด๋‚ด๊ณ  1์œ„๋กœ ์„ฑ์žฅํ•˜๊ฒŒ ๋˜์—ˆ๋‹ค.

Google์€ ์„ธ๊ณ„ ์—ฌ๋Ÿฌ ์ง€์—ญ์— ๋ฐ์ดํ„ฐ์„ผํ„ฐ๋ฅผ ๊ตฌ์ถ•

ํ•˜์—ฌ ๋‹ค์–‘ํ•œ ํด๋ผ์šฐ๋“œ ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜๊ณ  ์žˆ๋‹ค.

ํŠนํžˆ, ํŽ˜ํƒ€๋ฐ”์ดํŠธ ์ด์ƒ์˜ ๋ฐ์ดํ„ฐ๋ฅผ ์ˆ˜์ง‘ํ•˜๊ณ  ๋ถ„

์„ํ•˜๋Š” ๊ธฐ์ˆ ์ธ MapReduce๋Š” 2004๋…„ OSDI

(Dean & Ghemawat, 2004)์—์„œ ์†Œ๊ฐœ๋œ ์ดํ›„

Yahoo!์—์„œ Hadoop ํ”„๋กœ์ ํŠธ(www.hadoop.

org)๋ฅผ ํ›„์›ํ•˜๋ฉด์„œ ๊ด€๋ จ ๋ฐ์ดํ„ฐ๋ถ„์„ ์‹œ์žฅ์ด ๊ธ‰์„ฑ

์žฅํ•˜๊ธฐ ์‹œ์ž‘ํ–ˆ๋‹ค. Yahoo!๋Š” 2011๋…„ Hortonworks

๋ผ๋Š” Hadoop ๋ฒค์ฒ˜ํšŒ์‚ฌ๋ฅผ ๋ถ„์‚ฌ์‹œํ‚ค๊ธฐ๋„ ํ•˜ ๋‹ค.

์ œ ๊ถŒ ์ œ ํ˜ธ

86 ๋…„ ์›”

Page 88: nternet I Security - BIGBOOK

์ตœ๊ทผ ๋น… ๋ฐ์ดํ„ฐ์˜ ์‹ค์‹œ๊ฐ„ ๋ถ„์„์„ ํ†ตํ•ด ๊ณ ๊ฐ์˜ ์ทจ

ํ–ฅ, ํ–‰๋™ ๋“ฑ์„ ์‹ค์‹œ๊ฐ„์œผ๋กœ ์•Œ ์ˆ˜ ์žˆ๊ฒŒ ํ•ด ๋น ๋ฅธ ์˜

์‚ฌ๊ฒฐ์ •์„ ๋‚ด๋ฆฌ๊ฒŒ ๋„์™€์ค€๋‹ค. ์˜ˆ๋ฅผ ๋“ค๋ฉด, ์†Œ์…œ๋„คํŠธ

์›Œํฌ ์‹ค์‹œ๊ฐ„ ๋ถ„์„์„ ํ†ตํ•ด ํŠน์ • ์‹œ๊ฐ„์— ์–ด๋–ค ์ œํ’ˆ

์ด ์ธ๊ธฐ๋ฅผ ๋„๋Š”์ง€, ์‚ฌ๋žŒ๋“ค์ด ์–ด๋–ค ์ œํ’ˆ์ด ๊ด€์‹ฌ์ด

์žˆ๋Š”์ง€ ํŒŒ์•…ํ•˜์—ฌ ๋งˆ์ผ€ํŒ…์— ํ™œ์šฉํ•˜๋Š” ๋ฐฉ์‹์ด๋‹ค.

MapReduce ๊ธฐ๋ฐ˜์˜ ๋น… ๋ฐ์ดํ„ฐ ๋ถ„์„์€ ๋Ÿ‰์˜ ๋ฐ

์ดํ„ฐ ์ฒ˜๋ฆฌ ์„ฑ๋Šฅ์ด ์‹ค์‹œ๊ฐ„์—๋Š” ๋ฏธ์น˜์ง€ ๋ชปํ•˜๊ณ  ์žˆ์–ด

์„œ ์ด์— ๊ด€ํ•œ ์—ฐ๊ตฌ๊ฐ€ ํ™œ๋ฐœํ•˜๊ฒŒ ์ด๋ฃจ์–ด์ง€๊ณ  ์žˆ์œผ

๋ฉฐ, ๊ทœ๋ชจ ๋ถ„์‚ฐ ์‹œ์Šคํ…œ์˜ ์ƒ์กด์„ฑ ๊ฐ•ํ™”๋ฅผ ์œ„ํ•œ ๊ณ 

๊ฐ€์šฉ์„ฑ ์‹œ์Šคํ…œ ๊ธฐ์ˆ ์— ๊ด€ํ•œ ์—ฐ๊ตฌ ๋˜ํ•œ ์ง‘์ค‘์„ ๋ฐ›

๊ณ  ์žˆ๋‹ค.

ํ˜„์žฌ ์ธํ„ฐ๋„ท์—์„œ ์ผ์–ด๋‚˜๋Š” ๋งŽ์€ ์ฝ˜ํ…์ธ ์™€ ์ด๋“ค

์„ ์ด์šฉํ•˜๋Š” ์‚ฌ์šฉ์ž์˜ ํ–‰๋™์–‘์‹์„ ์ดํ•ดํ•˜๊ณ  ๋ถ„์„

ํ•  ์ˆ˜ ์žˆ๋Š” ๊ธฐ์ˆ ์ด์•ผ๋ง๋กœ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท ๊ด€๋ฆฌ ๋ถ„์•ผ์—

์„œ ์ฃผ์š” ์ฝ˜ํ…์ธ ๊ฐ€ ๋  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋œ๋‹ค. [๊ทธ๋ฆผ 21]

๊ณผ ๊ฐ™์ด IBM์—์„œ 2011๋…„ 1์›” DeepQA ํ”„๋กœ์ ํŠธ

๋ฅผ ์ˆ˜ํ–‰ํ•˜์—ฌ Watson์ด๋ผ๋Š” ์Šˆํผ์ปดํ“จํ„ฐ๋ฅผ ๊ฐœ๋ฐœํ•œ

๊ฒฐ๊ณผ๋ฅผ Jeopardy Show์—์„œ ๊ณต๊ฐœํ•˜ ๋‹ค.

Watson์€ UIMA์™€ Hadoop์˜ ํ”Œ๋žซํผ์—์„œ ์ž์—ฐ

์–ธ์–ด์ฒ˜๋ฆฌ ๋ฐ ์ธ๊ณต์ง€๋Šฅ ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ๊ตฌํ˜„ํ•œ ์งˆ๋ฌธ์—

ํ•˜์—ฌ 3์ดˆ ์ด๋‚ด์— ์‘๋‹ต์„ ์ฒ˜๋ฆฌํ•  ์ˆ˜ ์žˆ๋‹ค. ์ด๋Š”

๋ถ„์‚ฐ๋ณ‘๋ ฌ์ฒ˜๋ฆฌ ์‹œ์Šคํ…œ์„ ๊ทน ํ™”ํ•œ ๊ฒƒ์œผ๋กœ ๋‹จ์ˆœํ•œ

์ง€์‹ DB์—์„œ ์˜๋ฃŒ ๋ฐ ๊ฒ€์ƒ‰ ๋“ฑ์˜ ๋ถ„์•ผ์— ๋‹ค์–‘ํ•˜๊ฒŒ

ํ™œ์šฉ๋  ๊ฐ€๋Šฅ์„ฑ์„ ๋ณด ๋‹ค. ํŠนํžˆ, ๊ทœ๋ชจ ํŠธ๋ž˜ํ”ฝ ์ฆ

๊ฐ€๋ฅผ ๋ฐœ์ƒ์‹œํ‚ค๋Š” ํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ…์ด๋‚˜ ๋ชจ๋ฐ”์ผ ํ™˜

๊ฒฝ์—์„œ ์ด๋Ÿฌํ•œ ์ „๋ฌธ ์ง€์‹ ์„œ๋น„์Šค๋“ค์ด ์œตํ•ฉ๋œ ์„œ๋น„

์Šค๋ฅผ ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•˜๊ธฐ ์œ„ํ•ด์„œ๋Š” ๋„คํŠธ์›Œํฌ ์•ก์„ธ์Šค ๋ง

ํฌ ์†๋„ ํ–ฅ์ƒ๊ณผ ๋ถˆํ•„์š”ํ•œ ํŠธ๋ž˜ํ”ฝ ๊ฐ์†Œ ๋ฐ ์‚ญ์ œ ๋“ฑ

์˜ ๊ธฐ์ˆ ๋“ค์ด ํ˜„์žฌ ์ธํ„ฐ๋„ท๋ฟ๋งŒ ์•„๋‹ˆ๋ผ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท

์—์„œ๋„ ์ ์šฉ๋˜์–ด์•ผ ํ•  ๊ฒƒ์ด๋‹ค.

๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ๋ฐ์ดํ„ฐํญ์ฆ์— ํ•œ ํ˜„ํ™ฉ๊ณผ ์ด๋ฅผ

ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•œ ํ˜„์žฌ ์ธํ„ฐ๋„ท ์—”์ง€๋‹ˆ์–ด๋ง ๋ฐฉ๋ฒ•๋ก ๋“ค

์„ ์‚ดํŽด๋ณด์•˜๋‹ค. ๋น„๋””์˜ค๋ฅผ ์ค‘์‹ฌ์œผ๋กœ ์ฝ˜ํ…์ธ ์˜ ํญ๋ฐœ

์ ์ธ ์ˆ˜์š” ์ฆ๊ฐ€, ์ €์žฅ์žฅ์น˜์˜ ๊ฐ€๊ฒฉ ๋น„ ์„ฑ๋Šฅ์˜ ๋น„

์•ฝ์ ์ธ ๋ฐœ์ „ ๋ฐ ์Šค๋งˆํŠธํฐ์„ ์ค‘์‹ฌ์œผ๋กœ ํ•˜๋Š” ๊ฐœ์ธ

์ด๋™ํ˜• ์ปดํ“จํŒ…์˜ ๋“ฑ์žฅ ๋“ฑ์ด ๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ์„ ํญ๋ฐœ

์ ์œผ๋กœ ์ฆ๊ฐ€์‹œํ‚ค๊ฒŒ ํ•˜ ๋‹ค. ์ด๋Š” ํ˜„์žฌ ์ธํ„ฐ๋„ท์˜

์„ฑ์žฅ์„ ์ด‰์ง„์‹œ์ผฐ์ง€๋งŒ, ํ•œํŽธ์œผ๋กœ ์ธํ„ฐ๋„ท์˜ ์ƒˆ๋กœ์šด

ํ˜์‹ ์— ํ•œ ๋™๊ธฐ๋ถ€์—ฌ๋ฅผ ํ•˜๊ณ  ์žˆ๋‹ค.

์ฆ‰, ๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ ํญ์ฆํ˜„์ƒ์€ ํ˜ธ์ŠคํŠธ-ํ˜ธ์ŠคํŠธ

๊ฐ„์˜ ํ†ต์‹ ์—์„œ ์ฝ˜ํ…์ธ  ์ค‘์‹ฌ์˜ ์ƒˆ๋กœ์šด ์ธํ„ฐ๋„ท ๊ตฌ์กฐ

์— ํ•œ ๋…ผ์˜๋ฅผ ์ด‰๋ฐœ์‹œ์ผฐ๋‹ค. CCN์„ ๊ทผ๊ฐ„์œผ๋กœ ํ•˜

๋Š” ์ƒˆ๋กœ์šด ์ธํ„ฐ๋„ท ๊ตฌ์กฐ๋Š” ์ฝ˜ํ…์ธ ๋ฅผ ์ค‘์‹ฌ์œผ๋กœ ๋ฐ์ด

ํ„ฐ ํ†ต์‹ ์„ ํ•˜๋Š” ๊ธฐ์ˆ ์„ ์ง€ํ–ฅํ•˜๊ณ  ์žˆ๋‹ค. ์ด๋Š” P2P

์˜ ์ฝ˜ํ…์ธ  ์ค‘์‹ฌ ์˜ค๋ฒ„๋ ˆ์ด ๋„คํŠธ์›Œํฌ ๊ตฌ์กฐ์™€ CDN

์ด๋‚˜ ALTO์˜ ์ฝ˜ํ…์ธ  ์ง€์—ญํ™” ๊ธฐ์ˆ  ๋“ฑ์˜ ๊ฐœ๋…์„

๋ฐœ์ „์‹œ์ผฐ๋‹ค๊ณ  ๋ณผ ์ˆ˜ ์žˆ๋‹ค. ํ•˜์ง€๋งŒ, ๋Š์ž„์—†๋Š” ์ƒˆ๋กœ

์šด ์ฝ˜ํ…์ธ ์— ํ•œ ์ƒ์‚ฐโˆ™์ˆ˜์š”์™€ ํ•˜๋“œ์›จ์–ด์˜ ๋ฐœ์ „

์— ํž˜์ž…์€ ๋ฐ์ดํ„ฐ์— ํ•œ ํญ๋ฐœ์ ์ธ ์ˆ˜์š”๋ฅผ ํšจ์œจ์ 

์œผ๋กœ ๊ด€๋ฆฌํ•  ์ˆ˜ ์žˆ๋Š” ๋„คํŠธ์›Œํ‚น ๊ธฐ์ˆ ์€ ์ด์ œ ์ดˆ๊ธฐ

๋‹จ๊ณ„์— ์žˆ๋‹ค๊ณ  ๋ณผ ์ˆ˜ ์žˆ๋‹ค. ํ–ฅํ›„ ์ฝ˜ํ…์ธ  ์ค‘์‹ฌ์˜ ๋ฐ

์ดํ„ฐ ์ „์†ก, ์ œ์–ด, ๊ด€๋ฆฌ ๋ฐ ๋ถ„์„ ๋“ฑ์— ๊ด€ํ•œ ์—ฐ๊ตฌ๊ฐ€

ํ•„์š”ํ•  ๊ฒƒ์ด๋‹ค.

๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ ํญ์ฆํ˜„์ƒ๊ณผ ์ฝ˜ํ…์ธ  ์ค‘์‹ฌ ๋„คํŠธ์›Œํ‚น ๊ธฐ์ˆ 

Internet and Information Security 87

[๊ทธ๋ฆผ 21] IBM Watson ์ปดํ“จํ„ฐ์˜ Jeopardy Show ๋ฐ๋ชจ

Page 89: nternet I Security - BIGBOOK

โ–ถ ์ฐธ๊ณ ๋ฌธํ—Œ

๊ฐ•ํฌ์ข… (2011. 7. 19). ๋ฌด์ œํ•œ ๋ฐ์ดํ„ฐ 1000๋งŒ ๋ŒํŒŒ

๋ˆˆ์•ž. ใ€Ž๋””์ง€ํ„ธํƒ€์ž„์ฆˆใ€.

๋ฐฉ์†กํ†ต์‹ ์œ„์›ํšŒโˆ™ํ•œ๊ตญ์ •๋ณดํ†ต์‹ ์ง„ํฅํ˜‘ํšŒ (2011).

ใ€Ž๋ฐฉ์†กํ†ต์‹ ์‚ฐ์—…ํ†ต๊ณ„์›”๋ณดใ€(2010๋…„ 5์›”ํ˜ธ). ์„œ์šธ:

๋ฐฉ์†กํ†ต์‹ ์œ„์›ํšŒโˆ™ํ•œ๊ตญ์ •๋ณดํ†ต์‹ ์ง„ํฅํ˜‘ํšŒ.

Alizadeh, M., Greenberg, A., Maltz, D. A., Padhye, J.,

Patel, P., Prabhakar, B.,... Sridharan, M. (2010).

Data center TCP(DCTCP). Proceedings of the

ACM Special Interest Group on Data

Communication (SIGCOMM), 63-74.

Antoniades, D., Markatos, E. P., & Dovrolis, C. (2009).

One-click hosting services: A file-sharing hideout.

Proceedings of the 9th ACM SIGCOMM

Conference on Internet Measurement, 223-234.

Armbrust, M., Fox, A., Griffith, R., Joseph, A. D.,

Katz, R. H., Konwinski, A.,... Zaharia, M. (2009).

Above the clouds: A Berkeley view of cloud

computing (Technical Report). Retrieved from

http://www.eecs.berkeley.edu /Pubs/TechRpts/

2009/EECS-2009-28.pdf

Benson, T., Akella, A., & Maltz, D. A. (2010).

Network traffic characteristics of data centers in

the wild. Proceedings of the 10th Annual

Conference on Internet Measurement, 267-280.

Cisco (2011a). Cisco visual networking index: Forecast

and methodology, 2010-2015. Retrieved from

http://www.cisco.com/en/US/solutions/collateral/n

s341/ns525/ns537/ns705/ns827/white_paper_c11-

481360.pdf

Cisco (2011b). Cisco visual networking index: Global

mobile data traffic forecast update, 2010-2015.

Retrieved from http://www.cisco.com/en/US/

solutions/collateral/ns341/ns525/ns537/ns705/ns8

27/white_paper_c11-520862.pdf

Dean, J., & Ghemawat, S. (2004). MapReduce:

Simplified data processing on large clusters.

Paper presented at the 6th Symposium on

Operating System Design and Implementation.

Gantz, J., & Reinsel, D (2011). Extracting value from

chaos. IDC Iview Report. Retrieved from

http://idcdocserv.com/1142

Griffiths, C., Livingood, J., Popkin, L., Woundy, R., &

Yang, Y. (2009). Comcastโ€™s ISP experiences in a

proactive network provider participation for

P2P(P4P) technical trial (IETF RFC 5632).

Fremont, CA: Internet Engineering Task Force.

IEEE (2008). Draft white paper for next generation

service overlay network (IEEE P1903TM/D1).

Retrieved from http://grouper.ieee.org/groups/

ngson/P1903_2008_0026-White_Paper.pdf

Internet Society (2010). Growing pains: Bandwidth on

the Internet. Briefing Paper. Reston, VA: Internet

Society.

Jacobson, V. (1988). Congestion avoidance and

control. Proceedings of SIGCOMM '88

Communications Architectures and Protocols,

314-329.

Jacobson, V., Smetters, D. K., Thornton, J. D., Plass,

M. F., Briggs, N. H., & Braynard, R. L. (2009).

Networking named content. Proceedings of the

5th International Conference on Emerging

Networking Experiments and Technologies, 1-12.

Labovitz, C., Iekel-Johnson, S., McPherson, D.,

Oberheide, J., & Jahanian, F. (2010). Internet

inter-domain traffic. Proceedings of the ACM

Special Interest Group on Data Communication

(SIGCOMM), 76-86.

Lee, K., & Jian, G. (2010). ALTO and DECADE

์ œ ๊ถŒ ์ œ ํ˜ธ

88 ๋…„ ์›”

Page 90: nternet I Security - BIGBOOK

service trial within China Telecom. Working

Documents of the Internet Engineering Task

Force (IETF). Retrieved from http://tools.ietf.org/

pdf/draft-lee-alto-chinatelecom-trial-01.pdf

Maier, G., Feldmann, A., Paxson, V., & Allman, M.

(2009). On dominant characteristics of residential

broadband Internet traffic. Proceedings of the

9th ACM SIGCOMM Conference on Internet

Measurement, 35-48.

Nygren, E., Sitaraman, R. K., & Sun, J. (2010). The

Akamai network: A platform for high-

performance Internet applications. SIGOPS

Operate System Review, 44(3), 2-19.

Pan, J., Paul, S., & Jain, R. (2011). A survey of the

research on Future Internet architectures. IEEE

Communications Magazine, 49(7), 26-36.

Perino, D. & Varvello, M. (2011). A reality check for

content centric networking. Paper presented at

the ACM SIGCOMM 2011 ICN Workshop, 44-49.

Seedorf, J., & Burger, E. (2009). Application-layer

traffic optimization(ALTO) problem statement

(IETF RFC 5693). Fremont, CA: Internet

Engineering Task Force.

Valancius, V., Laoutaris, N., Massouliรฉ, L., Diot, C., &

Rodriguez, P. (2009). Greening the Internet with

nano data centers. Proceedings of the 5th

International Conference on Emerging

Networking Experiments and Technologies, 37-48.

Warrior, P. (2010, March 24). Warrior says all the

data moved over networks has grown from 5

exabytes of data per month in 2007 to 21 exabytes

per month this year. Keynote Speech at CTIA

Wireless 2010. Retrieved from http://www.ctia.

org/media/multimedia/sa/index.cfm/mma/wireless

-2010-padmasree-warrior-global-flow-of-info

๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ ํญ์ฆํ˜„์ƒ๊ณผ ์ฝ˜ํ…์ธ  ์ค‘์‹ฌ ๋„คํŠธ์›Œํ‚น ๊ธฐ์ˆ 

Internet and Information Security 89

Page 91: nternet I Security - BIGBOOK

Internet and Information Security ์ œ ๊ถŒ ์ œ ํ˜ธ( ๋…„ ์›”) pp. 90~112

90 ๋…„ ์›”

์šฐ๋ฆฌ๋‚˜๋ผ์˜ ๋„คํŠธ์›Œํฌ ๊ตฌ์ถ• ๊ณ„ํš์€ ๊ธฐ์ˆ ์  ์‹œ๊ฐ์—์„œ ์†๋„์˜ ๊ฐœ๋…์œผ๋กœ ์ ‘๊ทผํ•ด์˜จ ๊ฒƒ์ด ๊ณผ๊ฑฐ์˜ ์ •์ฑ… ๋ฐฉํ–ฅ์ด์—ˆ

๋‹ค. ํ•˜์ง€๋งŒ ์ด์™€ ๊ฐ™์€ ๋ฐฉ์‹์œผ๋กœ๋Š” ํ–ฅํ›„ ๋‹ค๋ณ€ํ™”ํ•˜๋Š” ์‚ฌํšŒ์™€ ๊ฐœ์ธ์˜ ๊ณตํ†ต ์ธํ”„๋ผ๋กœ์„œ ๋„คํŠธ์›Œํฌ์˜ ์—ญํ• ์„ ํฌ๊ด„ํ•˜๊ธฐ ํž˜

๋“ค์–ด ์ •์ฑ…์  ํ•œ๊ณ„์— ์ง๋ฉดํ•œ ์ƒํ™ฉ์ด๋‹ค. ๋ฏธ๋ž˜์˜ ๋„คํŠธ์›Œํฌ๋Š” ์ธํ„ฐ๋„ท์„ ์ค‘์‹ฌ์œผ๋กœ IT ์ž์ฒด์˜ ์„ฑ์žฅ๋ฟ๋งŒ ์•„๋‹ˆ๋ผ ํƒ€ ์‚ฐ์—…์˜

์ƒ์‚ฐ์š”์†Œ์™€ ์ธํ”„๋ผ๋กœ์„œ ์ •์น˜, ๊ฒฝ์ œ, ์‚ฌํšŒ ๋“ฑ ๋ฒ”๊ตญ๊ฐ€์  ๋ฌธ์ œ ํ•ด๊ฒฐ์— ๊ธฐ์—ฌํ•˜๋Š” ์ธก๋ฉด์ด ๊ฐ•์กฐ๋˜์–ด์•ผ ํ•  ๊ฒƒ์ด๋‹ค. ์ด๋Ÿฌํ•œ

์‹œ๊ฐ์—์„œ ๋ณธ ์—ฐ๊ตฌ๋Š” 2020๋…„์„ ๊ธฐ์ค€์œผ๋กœ IT์˜ ๋ณ€ํ™”์™€ ๊ด€๋ จํ•œ ํ•œ๊ตญ์‚ฌํšŒ์˜ ๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ๋ฅผ ๋„์ถœํ•˜๊ณ , ์ด๋ฅผ ๊ทผ๊ฐ„์œผ๋กœ IT

์˜ ๋ฏธ๋ž˜๋ฅผ ์ „๋งํ•œ๋‹ค. ์˜ˆ์ธกํ•œ ๋ฏธ๋ž˜ ํŠธ๋ Œ๋“œ ๋ณ€ํ™”๊ฐ€ ์ฃผ์–ด์กŒ์„ ๋•Œ ๊ธ์ •์ ์ธ ๋ฐฉํ–ฅ์œผ๋กœ ๋ฏธ๋ž˜์‚ฌํšŒ ์ด์Šˆ๋ฅผ ํ•ด๊ฒฐโˆ™์ง€์›ํ•˜๋Š”

๋ฏธ๋ž˜์ธํ„ฐ๋„ท ๋ฐœ์ „์˜ ์˜ฌ๋ฐ”๋ฅธ ์ •์ฑ… ๋ฐฉํ–ฅ๊ณผ ์‹œ์‚ฌ์  ์ œ๊ณต์„ ๋ณธ ์—ฐ๊ตฌ์˜ ๋ชฉ์ ์œผ๋กœ ํ•œ๋‹ค. ๋ณธ ์—ฐ๊ตฌ์˜ ๊ฒฐ๊ณผ๋ฅผ ํ†  ๋กœ ๋ณด๋‹ค ๊นŠ

์€ ๋…ผ์˜์™€ ์—ฐ๊ตฌ๊ฐ€ ์ด๋ฃจ์–ด์ง„๋‹ค๋ฉด ๋ฏธ๋ž˜์ธํ„ฐ๋„ท ๊ธฐ๋ฐ˜ ICT ์ƒ์œ„ ์ธํ”„๋ผ ์ •์ฑ…์˜ ๋‹น์œ„์„ฑ๊ณผ ์ถ”์ง„๋ ฅ์„ ์ฆ ์‹œํ‚ฌ ์ˆ˜ ์žˆ์„ ๊ฒƒ

์œผ๋กœ ๊ธฐ ๋œ๋‹ค.

In Korea, the main focus of public policy on network enhancement has been broadband speed,

indicating a technically-oriented perspective. But this approach has political limitations in terms of the

networkโ€™s role as a common infrastructure for diversified individuals and societies in the future. It should

be emphasized that the future network centered on the Internet must contribute to solving political,

economic, and social issues at the national level, not only by leading the growth of IT industry, but also

by directing the infrastructure and production inputs of other industries. From this perspective, this paper

derives the meta-trends of Koreaโ€™s future society in relation to IT changes by 2020. Future IT

trends are forecast based on these meta-trends. This paper proposes an appropriate direction and

implications on political decision-making for the โ€˜Future Internetโ€™development plan, which supports

desirable solutions to the future issues of society under the given conditions of the predicted future trends.

Based on the results of this paper and further discussions and research, the validity and drive of ICT

infrastructure policy will be increased.

์ฃผ์ œ์–ด: ๋ฏธ๋ž˜์ธํ„ฐ๋„ท, ICT ์ •์ฑ…, ๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ, ๋ฏธ๋ž˜์ „๋ง, ํƒ์ƒ‰์—ฐ๊ตฌ

Keywords: future internet, ICT policy, meta-trend, future forecasting, exploratory research

์ดˆ๋ก

Abstract

ํ•œ๊ตญ์‚ฌํšŒ ๋ณ€ํ™”์™€ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท ์ •์ฑ…์— ํ•œ ํƒ์ƒ‰์  ์—ฐ๊ตฌ

๊น€์‚ฌํ˜๏ฟฝ ์ตœ์ƒํ›ˆ๏ฟฝ๏ฟฝ

Sa-Hyuk Kim Sang-Hoon Choi

Exploratory Research on the Future Internet Policy

according to the Changes in Korean Society

๏ฟฝ๏ฟฝ๏ฟฝ ์ •๋ณดํ†ต์‹ ์ •์ฑ…์—ฐ๊ตฌ์› ๋ถ€์—ฐ๊ตฌ์œ„์›

(Senior Researcher, Convergence and Future Research Division, Korea Information Society Development Institute,

[email protected])

๏ฟฝ๏ฟฝ๏ฟฝ (์ฃผ)์”จ์—์Šคํ‹ฐ ์‹ค์žฅ

(General Manager, Smart N/W Strategy Division, Communication Systems Technologies Co., Ltd, [email protected])

Page 92: nternet I Security - BIGBOOK

์šฐ๋ฆฌ๋‚˜๋ผ๋Š” ์ดˆ๊ณ ์†์ •๋ณดํ†ต์‹ ๋ง ๊ตฌ์ถ• ๊ณ„ํš์˜ ์„ฑ๊ณต

์ ์ธ ์ถ”์ง„๊ณผ ๊ด‘ ์—ญํ†ตํ•ฉ๋ง(BcN) ๊ตฌ์ถ• ๋ฐ ์ดˆ๊ด‘ ์—ญ

ํ†ตํ•ฉ๋ง(UBcN) ๊ตฌ์ถ• ๊ณ„ํš์˜ ์ง„ํ–‰์„ ํ†ตํ•ด ์„ธ๊ณ„ 1์œ„

์˜ ์ดˆ๊ณ ์†์ธํ„ฐ๋„ท ๊ฐ€๊ตฌ ๋ณด๊ธ‰๋ฅ ์„ ๊ธฐ๋กํ•˜ ๋‹ค. ๋˜ํ•œ

๋ฐฉ์†กํ†ต์‹  ๋ฐ ์ „ํ›„๋ฐฉ ์‚ฐ์—… ์„ฑ์žฅ์— ํฌ๊ฒŒ ๊ธฐ์—ฌํ•˜์—ฌโ€˜๋„ค

ํŠธ์›Œํฌ ๊ฐ•๊ตญโ€™์œผ๋กœ์„œ ์ž๋ฆฌ ์žก๊ณ  ์žˆ๋‹ค. ์šฐ๋ฆฌ๋‚˜๋ผ์˜ ๊ณผ

๊ฑฐ ๋„คํŠธ์›Œํฌ ๊ตฌ์ถ• ๊ณ„ํš์˜ ๋ถ€๋ถ„์€ ๊ธฐ์ˆ ์  ์‹œ๊ฐ์—

์„œ ์†๋„์˜ ๊ฐœ๋…์œผ๋กœ ๊ณต๊ธ‰์ž ์ค‘์‹ฌ์˜ ๊ตฌ์ถ• ์ •์ฑ…์„ ์ถ”

์ง„ํ•˜์—ฌ ์„ฑ๊ณต์„ ๊ฑฐ๋‘์—ˆ๋‹ค. ํ•˜์ง€๋งŒ ์ด์™€ ๊ฐ™์€ ๊ณผ๊ฑฐ์˜

์ •์ฑ…์œผ๋กœ๋Š” ํ–ฅํ›„ ๋‹ค๋ณ€ํ™”ํ•˜๋Š” ์‚ฌํšŒ์™€ ๊ฐœ์ธ์˜ ๊ณตํ†ต

์ธํ”„๋ผ๋กœ์„œ ๋„คํŠธ์›Œํฌ์˜ ์—ญํ• ์„ ํฌ๊ด„ํ•˜๊ธฐ ํž˜๋“ค์–ด ์ •

์ฑ…์  ํ•œ๊ณ„์— ์ง๋ฉดํ•˜ ๋‹ค๋Š” ์ง€์ ์ด ๋‘๋˜๊ณ  ์žˆ๋‹ค.

๋ฏธ๋ž˜์˜ ๋„คํŠธ์›Œํฌ๋Š” ์ธํ„ฐ๋„ท์„ ์ค‘์‹ฌ์œผ๋กœ IT ์ž์ฒด

์„ฑ์žฅ๋ฟ๋งŒ ์•„๋‹ˆ๋ผ ํƒ€ ์‚ฐ์—…์˜ ์ƒ์‚ฐ์š”์†Œ์™€ ์ธํ”„๋ผ๋กœ

์„œ ์ •์น˜, ๊ฒฝ์ œ, ์‚ฌํšŒ ๋“ฑ ๋ฒ”๊ตญ๊ฐ€์  ๋ฌธ์ œ์˜ ํ•ด๊ฒฐ์— ๊ธฐ

์—ฌํ•˜๋Š” ์ธก๋ฉด์ด ๊ฐ•์กฐ๋  ํ•„์š”๊ฐ€ ์žˆ๋‹ค. ์ตœ๊ทผ ์ฃผ์š”๊ตญ์˜

ICT ์ „๋žต์„ ์ „๋ฐ˜์ ์œผ๋กœ ์‚ดํŽด๋ณด๋ฉด, ๋„คํŠธ์›Œํฌ์™€ ๋ธŒ

๋กœ๋“œ๋ฐด๋“œ ์ฐจ์›์—์„œ ๋ณด๋‹ค ๋งŽ์€ ์ ‘๊ทผ์ด ์ด๋ฃจ์–ด์ง€๊ณ 

์žˆ๋Š” ์ค‘์ด๋‹ค. ๋ฏธ๊ตญ, EU, ๊ตญ, ํ”„๋ž‘์Šค, ๋…์ผ, ์ผ๋ณธ

๋“ฑ์˜ ์ตœ๊ทผ ๋””์ง€ํ„ธ ์ „๋žต์€โ€˜์ฐจ์„ธ ์ฒจ๋‹จ ๋„คํŠธ์›Œํฌโ€™

์™€โ€˜๋ธŒ๋กœ๋“œ๋ฐด๋“œ์˜ ํ™•์‚ฐโ€™๋“ฑ ์ •๋ณดํ†ต์‹  ์ธํ”„๋ผ ํ™•์ถฉ

์„ ๊ทผ๊ฐ„์œผ๋กœ ๊ตญ๊ฐ€ ์‹œ์Šคํ…œ ํ˜์‹ ๊ณผ 21์„ธ๊ธฐ ๋„์ „๊ณผ์ œ

ํ•ด๊ฒฐ์„ ํ†ตํ•œ ๊ตญ๊ฐ€๊ฒฝ์Ÿ๋ ฅ ํ™•๋ณด๋ฅผ ์ง€ํ–ฅํ•˜๊ณ  ์žˆ๋‹ค. ๋˜

ํ•œ ๋ธŒ๋กœ๋“œ๋ฐด๋“œ์™€ ๊ด€๋ จํ•˜์—ฌ ํ˜„์žฌ ์ธํ„ฐ๋„ท์˜ ํ•œ๊ณ„๋ฅผ

๊ทน๋ณตํ•˜๊ณ , ์‚ฌํšŒ ์ „๋ฐ˜์˜ ๋ฌธ์ œ ํ•ด๊ฒฐ์— ๊ธฐ์—ฌํ•  ์ˆ˜ ์žˆ

๋Š” ์ง€๋Šฅํ˜• ๋ฏธ๋ž˜ ์ธํ”„๋ผ ํ•˜๋ถ€๊ตฌ์กฐ๋ฅผ ์„ค๊ณ„ํ•˜๊ธฐ ์œ„ํ•ด

๋งŽ์€ ๋…ธ๋ ฅ๊ณผ ํˆฌ์ž๋ฅผ ๊ธฐ์šธ์ด๊ณ  ์žˆ๋‹ค.

๋ฏธ๊ตญ์˜ ์ •๋ณด๊ธฐ์ˆ ํ˜์‹ ์žฌ๋‹จ(ITIF: Information

Technology and Innovation Foundation)์€ ๋ฏธ

๋ž˜์‚ฌํšŒ์˜ ๋„์ „๊ณผ์ œ ํ•ด๊ฒฐ์„ ์œ„ํ•ดโ€˜๋””์ง€ํ„ธ ์ง„๋ณด

(digital progress)โ€™๋ฅผ ์ถ”์ง„ํ•˜๋Š” ์ •์ฑ…์ž…์•ˆ์ž์—๊ฒŒ

10๊ฐ€์ง€ ์ „๋žต ๋ฐฉํ–ฅ์„ ์ œ์‹œํ•˜๋ฉด์„œโ€œIT ์ธํ”„๋ผ ํˆฌ์ž

์— ๋ฐ•์ฐจ๋ฅผ ๊ฐ€ํ•˜๋Š” ๊ฒƒ์€ ๋ฏธ๊ตญ๊ฒฝ์ œ์— ์žˆ์–ด ์ค‘์š”ํ•œ ๋‹จ

๊ธฐ ๋ถ€์–‘์ฑ…์ด ๋  ์ˆ˜ ์žˆ์„ ๋ฟ ์•„๋‹ˆ๋ผ, ์žฅ๊ธฐ์ ์ธ ๊ฒฝ์ œ

์„ฑ์žฅ, ๊ตญ์ œ๊ฒฝ์Ÿ ๋ฐ ์‚ถ์˜ ์งˆ์„ ํš๊ธฐ์ ์œผ๋กœ ํ–ฅ์ƒ์‹œํ‚ค

๋Š” ํ†  ๊ฐ€ ๋  ์ˆ˜ ์žˆ๋‹คโ€๊ณ  ์ฃผ์žฅํ•˜ ๋‹ค(Castro &

Atkinson, 2009). ์ „๋žต ๋ฐฉํ–ฅ์—๋Š” ์‚ถ์˜ ์งˆ ํ–ฅ์ƒ์„

์œ„ํ•ด ๋””์ง€ํ„ธ ์ง„๋ณด๋ฅผ ํ™œ์šฉํ•  ๊ฒƒ, ์ ์ ˆํ•˜๊ณ  ๊ด‘๋ฒ”์œ„ํ•œ

๋””์ง€ํ„ธ ์ธํ”„๋ผ๋ฅผ ๋ณด์žฅํ•  ๊ฒƒ, ์‚ฌํšŒ๋ฌธ์ œ ํ•ด๊ฒฐ์„ ์œ„ํ•œ

์ƒˆ๋กœ์šด ์†”๋ฃจ์…˜์œผ๋กœ IT๋ฅผ ์ ์šฉํ•  ๊ฒƒ์„ ์–ธ๊ธ‰ํ•˜๋ฉด์„œ

์ธํ”„๋ผ ๊ตฌ์ถ•์˜ ์ค‘์š”์„ฑ์„ ์—ญ์„คํ•˜ ๋‹ค. ITIF์˜ ๋ณด๊ณ 

์„œ๋Š” IT ์ธํ”„๋ผ๊ฐ€ ๊ตญ๊ฐ€๊ฒฝ์ œโˆ™์‚ฌํšŒ์— ๋ฏธ์น˜๋Š” ํ–ฅ

์„ ๊ฒฝ์ œ์  ๊ธฐ๋ฒ•์„ ํ™œ์šฉํ•˜์—ฌ ์ •๋Ÿ‰์ ์œผ๋กœ ์ œ์‹œํ•˜๊ณ 

์žˆ๋‹ค๋Š” ์ ์—์„œ ์‹œ์‚ฌํ•˜๋Š” ๋ฐ”๊ฐ€ ํฌ๋‹ค. 2010๋…„ ๋ฏธ๊ตญ

์˜ ์ธํ”„๋ผ ๊ณ„ํš์ธโ€˜Connecting America: The

National Broadband Planโ€™์—์„œ๋Š” ์ด๋Ÿฌํ•œ ์ „๋žต

๋ฐฉํ–ฅ์ด ๋ฐ˜ ๋˜์–ด ์ œ์‹œ๋˜์—ˆ๋‹ค. ๊ณ„ํš์•ˆ์˜ ์ œ3๋ถ€๋Š”

๊ตญ๊ฐ€์  ๋ชฉ์ (national purpose)์„ ๋ช…์‹œํ•˜๊ณ  ์žˆ์œผ

๋ฉฐ, ํ•˜์œ„ 7๊ฐœ์˜ ์žฅ(chapter)์€ ํ—ฌ์Šค์ผ€์–ด, ๊ต์œก, ์—

๋„ˆ์ง€โˆ™ํ™˜๊ฒฝ, ๊ฒฝ์ œ์  ๊ธฐํšŒ(๊ณ ์šฉ, ์ค‘์†Œ๊ธฐ์—… ์ง€์› ๋“ฑ),

์ •๋ถ€ ํšจ์œจ์„ฑ, ์‹œ๋ฏผ์ฐธ์—ฌ, ๊ณต๊ณต์•ˆ์ „์œผ๋กœ ๊ตฌ์„ฑ๋˜์–ด ์žˆ

๋‹ค(FCC, 2010). FCC์˜ ์ „๋žต์€ ๊ด‘ ์—ญ ์„œ๋น„์Šค ์ž

์ฒด๋ฟ๋งŒ ์•„๋‹ˆ๋ผ ์ด๋ฅผ ํ†ตํ•ด ๊ณต๊ณต ์„œ๋น„์Šค์˜ ํšจ์œจ์„ฑ์„

๋†’์ด๋ฉฐ ๋ฏผ๊ฐ„ ํˆฌ์ž ๋ฐ ํ˜์‹  ํ™œ์„ฑํ™” ์œ ๋„ํ•˜๊ธฐ ์œ„ํ•œ

์„œ๋น„์Šค ๋ถ„์•ผ๋ณ„ ์ ์šฉ ๋ฐฉ์•ˆ์„ ์ œ์‹œํ•˜๊ณ  ์žˆ๋‹ค๋Š”๋ฐ ์˜

์˜๊ฐ€ ์žˆ๋‹ค. ์ด์— ์šฐ๋ฆฌ๋‚˜๋ผ๋„ ๊ณต๊ธ‰์ž ์ค‘์‹ฌ์—์„œ ์ด์šฉ

์ž ์ค‘์‹ฌ์œผ๋กœ ๋ฐฉ์†กํ†ต์‹  ์‚ฐ์—…๋ฟ๋งŒ ์•„๋‹ˆ๋ผ ํƒ€ ์‚ฐ์—…์˜

๊ณตํ†ต ์ธํ”„๋ผ๋กœ์„œ ์ œ๋ฐ˜ ์‚ฌํšŒ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ณ  ๋ฏธ๋ž˜

์„ฑ์žฅ์˜ ๊ทผ๊ฐ„์ด ๋  ๊ตญ๊ฐ€ ๊ณตํ†ต์˜ ํ†ตํ•ฉ ์ธํ”„๋ผ ๊ณ„ํš์˜

์ˆ˜๋ฆฝ ๋ฐ ํŒจ๋Ÿฌ๋‹ค์ž„์˜ ์žฌ์„ค์ •์ด ํ•„์š”ํ•˜๋‹ค.

๋ณธ ์—ฐ๊ตฌ๋Š” ์ „์ฒด์ ์œผ๋กœ 2020๋…„์„ ๊ธฐ์ค€์œผ๋กœ IT์˜

๋ณ€ํ™”์™€ ๊ด€๋ จํ•œ ํ•œ๊ตญ์‚ฌํšŒ์˜ ๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ1)๋ฅผ ๋„์ถœํ•œ

ํ•œ๊ตญ์‚ฌํšŒ ๋ณ€ํ™”์™€ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท ์ •์ฑ…์— ํ•œ ํƒ์ƒ‰์  ์—ฐ๊ตฌ

Internet and Information Security 91

1) ๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ์— ํ•œ ์ •ํ™•ํ•œ ์‚ฌ์ „์  ์˜๋ฏธ๊ฐ€ ์กด์žฌํ•˜์ง€ ์•Š๋Š” ์ƒํ™ฉ์—์„œ ๋ณธ ์—ฐ๊ตฌ์— ๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ๋ž€ ์šฉ์–ด๋ฅผ ์‚ฌ์šฉํ•œ ๊ฒƒ์€ meta์˜ ์˜๋ฏธ๊ฐ€ ๋…๋ฆฝ์ , ์„ ํ˜•์ , ์ˆœ์ฐจ์ ์ด๋ผ๊ธฐ๋ณด๋‹ค๋Š” ์ƒํ˜ธ์˜์กด์ , ๋‹ค์ฐจ์›์ , ๋™์‹œ์ ์ธ ๋ณ€ํ™”์ด๋ฉฐ, ๋‹ค์–‘ํ•œ ๊ตญ๊ฐ€, ๊ฒฝ์ œ, ๊ธฐ์ˆ ์—์„œ ๊ด€์ฐฐ๋˜์–ด ์šฐ๋ฆฌ์˜ ์ƒํ™œ์— ํ–ฅ์„ ๋ฏธ์น˜๋Š” ๋ณตํ•ฉ์ ์ธ ์˜๋ฏธ๊ฐ€ ์žˆ๋‹ค๊ณ  ํŒ๋‹จํ•˜ ๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ์— ํ•ด 10๋…„ ์ •๋„์˜ ๋ฏธ๋ž˜๋ฅผ ์ƒ์œผ๋กœ ํ•˜๋Š” ์ƒํ˜ธ์ž‘์šฉ์ , ๋ณตํ•ฉ์  ํŠธ๋ Œ๋“œ๋ผ๊ณ  ์กฐ์ž‘์  ์ •์˜๋ฅผ ๋‚ด๋ฆฐ๋‹ค.

Page 93: nternet I Security - BIGBOOK

๋‹ค. ๋ฏธ๋ž˜ ์‚ฌํšŒ๊ตฌ์กฐ์˜ ๋ณ€ํ™”, ์ƒํ™œโˆ™์—…๋ฌด ์–‘์‹์˜ ๋ณ€

ํ™”, ๊ธฐ์ˆ ํ˜์‹  ๋ฐ ์ง€์†๊ฐ€๋Šฅ ์„ฑ์žฅ์˜ 3๊ฐ€์ง€ ๋ถ„๋ฅ˜์— ๋”ฐ

๋ผ 12๊ฐœ์˜ ๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ๋ฅผ ๋„์ถœํ•˜ ๋‹ค. ๋„์ถœ๋œ ํ•œ๊ตญ

์‚ฌํšŒ์˜ ๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ๋ฅผ ๊ทผ๊ฐ„์œผ๋กœ ์‚ฌํšŒ ๋ณ€ํ™”์— ๋”ฐ๋ฅธ

IT ๋ถ„์•ผ์— ํŠนํ™”๋œ ๋ฏธ๋ž˜๋ฅผ ๊ฒฝ์ œโˆ™์‚ฐ์—…, ์‚ฌํšŒโˆ™๋ฌธ

ํ™”, ์ •์น˜โˆ™๊ณต๊ณต ๋ถ„์•ผ๋กœ ๋‚˜๋ˆ„์–ด ์ด 14๊ฐœ์˜ IT ๋ฏธ๋ž˜

์ „๋ง์„ ์ œ์‹œํ•˜ ๋‹ค. ์ด์–ด์„œ ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ์˜ˆ์ธกํ•œ

๋ฏธ๋ž˜ ํŠธ๋ Œ๋“œ ๋ณ€ํ™”๊ฐ€ ์ฃผ์–ด์กŒ์„ ๋•Œ, ๊ธ์ •์ ์ธ ๋ฐฉํ–ฅ์œผ

๋กœ ๋ฏธ๋ž˜์‚ฌํšŒ ์ด์Šˆ๋ฅผ ํ•ด๊ฒฐํ•˜๊ณ , ์ง€์›ํ•˜๋Š” ๋„คํŠธ์›Œํฌ

๊ตฌ์ถ• ๊ณ„ํš์˜ ์˜ฌ๋ฐ”๋ฅธ ์ •์ฑ… ๋ฐฉํ–ฅ๊ณผ ์‹œ์‚ฌ์ ์„ ๋„์ถœํ•œ

๋‹ค. ์ œ์‹œ๋œ ํ•œ๊ตญ์‚ฌํšŒ ๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ์™€ IT ๋ฏธ๋ž˜์ „๋ง์ด

์–ด๋–ป๊ฒŒ ๋„คํŠธ์›Œํฌ์˜ ๋ฏธ๋ž˜ ์ •์ฑ…๊ณผ ์—ฐ๊ณ„๋ฅผ ๊ฐ€์งˆ ์ˆ˜ ์žˆ

๋Š”์ง€์— ํ•œ ๋…ผ๋ฆฌ๊ตฌ์กฐ๋ฅผ ์„ค๋ช…ํ•˜๊ณ , ๋ฏธ๋ž˜ ๋„คํŠธ์›Œํฌ

๊ตฌ์ถ•์„ ํ†ตํ•œ ํ•œ๊ตญ์‚ฌํšŒ์˜ ๊ธ์ •์ ์ธ ๋ณ€ํ™”๋ฅผ ์„ ๋„ํ•˜

๊ธฐ ์œ„ํ•ด ์š”๊ตฌ๋˜๋Š” ๋ฏธ๋ž˜์ธํ„ฐ๋„ท ์ •์ฑ…์— ํ•ด ํฌ๊ด„์ 

์ธ ๋ฐฉํ–ฅ์„ฑ์„ ์ œ์‹œํ•œ๋‹ค. ๋งˆ์ง€๋ง‰ ์žฅ์—์„œ๋Š” ๋ฏธ๋ž˜ ๋„คํŠธ

์›Œํฌ ๊ตฌ์ถ•๊ณผ ์ธํ„ฐ๋„ท ์ •์ฑ…์˜ ์˜์˜์™€ ํ–ฅํ›„ ์—ฐ๊ตฌ ๋ฐฉํ–ฅ

์„ ๊ฐ„๋žตํžˆ ์ •๋ฆฌํ•œ๋‹ค.

๋ณธ ์—ฐ๊ตฌ์˜ ์ฒซ ๋‹จ๊ณ„๋กœ 2020๋…„์˜ IT์™€ ๊ด€๋ จํ•œ ํ•œ

๊ตญ์‚ฌํšŒ์˜ ๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ๋ฅผ ๋„์ถœํ•˜ ๋‹ค. ๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ๋Š”

ICT๋ฅผ ์ค‘์‹ฌ์œผ๋กœ ์˜๋ฃŒ, ๋„์‹œ, ํ–‰์ •, ์‚ฐ์—…, ๊ธฐ์ˆ  ๋“ฑ

์ด 12๋ช…์˜ ๊ฐ ๋ถ„์•ผ ์ „๋ฌธ๊ฐ€๋“ค์˜ ์˜๊ฒฌ๊ณผ ํšŒ์˜๋ฅผ ํ†ตํ•ด

๋„์ถœโˆ™์ˆ˜์ •๋˜๋Š” ๊ณผ์ •์„ ๊ฑฐ์น˜๋ฉฐ ์‹œ๋‚˜๋ฆฌ์˜ค ๋ฐฉ๋ฒ•๋ก ์„

์ค€์šฉํ•˜ ๋‹ค.2)

ํ‘œ์ ์œผ๋กœ ํ™œ์šฉ๋˜๋Š” ์‹œ๋‚˜๋ฆฌ์˜ค ๋ฐฉ๋ฒ•๋ก ์œผ๋กœ๋Š” ์Šค

์›จ๋ด ๋ฏธ๋ž˜์—ฐ๊ตฌ๊ตญ(Kairos Future)์—์„œ ์ •ํ˜•ํ™”ํ•œ

โ€˜T.A.I.D.A.โ€™๊ธฐ๋ฒ•3)์ด ์žˆ์œผ๋ฉฐ. ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ๋ฏธ

๋ž˜ ๊ตญ๊ฐ€ ์ •๋ณดํ†ต์‹  ์ธํ”„๋ผ ๊ตฌ์ถ•์„ ์œ„ํ•œ ํŒจ๋Ÿฌ๋‹ค์ž„ ์žฌ

์„ค์ •์ด๋ผ๋Š” ์‹œ๋‚˜๋ฆฌ์˜ค ๋ถ„์„ ๋ชฉ์  ํ•˜์—, 2์žฅ์—์„œ IT

๋ฅผ ์ค‘์‹ฌ์œผ๋กœ 2020๋…„ ํ•œ๊ตญ์‚ฌํšŒ์˜ ์ฃผ์š” ๋ณ€ํ™” ๋™์ธ์„

๋ถ„์„(tracking)ํ•˜๊ณ , 3์žฅ์—์„œ ํ˜„์žฌ์˜ IT ๊ธฐ์ˆ  ํ˜„

ํ™ฉ ๋ฐ ๋ฐœ์ „์ถ”์ด๋ฅผ ๊ธฐ์ดˆ๋กœ ํ•œ๊ตญ์‚ฌํšŒ์˜ ๋ณ€ํ™”์— ๋”ฐ๋ฅธ

IT ๋ฏธ๋ž˜์ „๋ง์„ ์ œ์‹œ(analysing)ํ•˜ ๋‹ค. 4์žฅ์—์„œ๋Š”

์ œ์‹œ๋œ ๋ฏธ๋ž˜์ „๋ง๊ณผ ๋„คํŠธ์›Œํฌ ๋ฐœ์ „๋ฐฉํ–ฅ๊ณผ์˜ ์—ฐ๊ด€์„ฑ

์„ ๊ธฐ์ดˆ๋กœ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท์˜ ์ •์ฑ…๋ฐฉํ–ฅ(imaging)์—

ํ•ด ๋…ผ์˜ํ•˜ ๋‹ค. ๋ณธ ์—ฐ๊ตฌ์˜ ๋ชฉ์ ์ด ์ธํ„ฐ๋„ท์„ ๊ธฐ๋ฐ˜์œผ

๋กœ ํ•œ ๋„คํŠธ์›Œํฌ ๊ตฌ์ถ•๊ณ„ํš์˜ ์˜ฌ๋ฐ”๋ฅธ ๋ฐฉํ–ฅ์„ฑ๊ณผ ์‹œ์‚ฌ

์  ์ œ์‹œ๋ผ๋Š” ์ ์„ ๊ฐ์•ˆํ•˜์—ฌ ์‹œ๋‚˜๋ฆฌ์˜ค ๋ถ„์„๊ณผ์ •์—

์„œ ์ œ์•ˆ๋œ ์„ธ๋ถ€์ ์ธ ์ „๋žต(deciding)๊ณผ ์ ์šฉ๋ฐฉ์•ˆ

(acting)์€ ๋…ผ์˜์—์„œ ์ œ์™ธํ•˜ ๋‹ค. ์‹œ๋‚˜๋ฆฌ์˜ค ๋ฐฉ๋ฒ•๋ก 

์€ ICT ์ •์ฑ… ์ˆ˜๋ฆฝ์— ๊ด‘๋ฒ”์œ„ํ•˜๊ฒŒ ์‚ฌ์šฉ๋˜๋Š” ๋ฐฉ๋ฒ•๋ก 

์ด๋ฉฐ, ํ‘œ์ ์œผ๋กœ EU๋Š” ์˜ค๋ž˜ ์ „๋ถ€ํ„ฐ ์‹œ๋‚˜๋ฆฌ์˜ค ๋ฐฉ

๋ฒ•๋ก ์„ ํ™œ์šฉํ•œ ๊ณผํ•™๊ธฐ์ˆ ์˜ˆ์ธก ์—ฐ๊ตฌ๋ฅผ ํ†ตํ•ด ๋‹ค์–‘ํ•œ

๋ฏธ๋ž˜๊ธฐ์ˆ  ์˜ˆ์ธกํ™œ๋™์„ ์ˆ˜ํ–‰ํ•ด ์™”์œผ๋ฉฐ, EU๊ฐ€ ํ•™๊ณ„,

์‚ฐ์—…๊ณ„, ์—ฐ๊ตฌ์†Œ ๋“ฑ์—์„œ ๋ฝ‘์€ ์ „๋ฌธ๊ฐ€ ๋„คํŠธ์›Œํฌ์ธ

FISTERA(Foresight on Information Society

Technologies in the European Research

Area) ๋“ฑ์—์„œ ์ˆ˜ํ–‰๋œ ์ •๋ณดํ†ต์‹  ๋ถ€๋ฌธ์˜ IT ๊ธฐ๋ฐ˜ ๋ฏธ

๋ž˜๊ธฐ์ˆ ์—ฐ๊ตฌ๋ฅผ ํ†ตํ•ด ๋ฏธ๋ž˜์˜ ์ •์ฑ…๋น„์ „์„ ์ˆ˜๋ฆฝํ•ด ์˜จ

๋ฐ”๊ฐ€ ์žˆ๋‹ค(๊น€๋ฐฉ๋ฃก ์™ธ, 2009). ์ด์— ์šฐ๋ฆฌ๋‚˜๋ผ๋„ ์ 

์ฐจ ์‹œ๋‚˜๋ฆฌ์˜ค ๋ฐฉ๋ฒ•๋ก ์„ ํ™œ์šฉํ•œ ICT ์ •์ฑ… ์ˆ˜๋ฆฝ ๋ฐฉ์•ˆ

์— ํ•œ ์—ฐ๊ตฌ๊ฐ€ ์ง„์ „๋˜๊ณ  ์žˆ๋‹ค.

IT์™€ ํ•œ๊ตญ์‚ฌํšŒ์˜ ๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ๋Š” ๋ฏธ๋ž˜ ์‚ฌํšŒ๊ตฌ์กฐ์˜

๋ณ€ํ™”, ์ƒํ™œโˆ™์—…๋ฌด ์–‘์‹์˜ ๋ณ€ํ™”, ๊ธฐ์ˆ ํ˜์‹  ๋ฐ ์ง€์†

๊ฐ€๋Šฅ ์„ฑ์žฅ์˜ 3๊ฐ€์ง€ ๋ถ„๋ฅ˜์— ๋”ฐ๋ผ ์ •๋ฆฌํ•˜ ๋‹ค. ๋„์ถœ

๋œ ํŠธ๋ Œ๋“œ๋Š” ๊ผญ 2020๋…„์„ ๊ธฐ์ค€์œผ๋กœ ๋„๋ž˜ํ•  ๋ฏธ๋ž˜๋Š”

์•„๋‹ˆ๋‹ค. ์–ด๋– ํ•œ ํŠธ๋ Œ๋“œ๋Š” ํ˜„์žฌ ์ง„ํ–‰๋˜๊ณ  ์žˆ์œผ๋ฉฐ ๋‹จ

๊ณ„์ ์œผ๋กœ ๊ณ ๋„ํ™”๋˜๋Š” ๊ฒƒ์„ ์˜๋ฏธํ•  ์ˆ˜๋„ ์žˆ๊ณ , ๋‹ค๋ฅธ

ํŠธ๋ Œ๋“œ๋Š” ์ˆ˜๋…„ ์‚ฌ์ด์— ๋„๋ž˜ํ•˜๊ธฐ๋Š” ํž˜๋“ค์ง€๋งŒ 10๋…„

์ œ ๊ถŒ ์ œ ํ˜ธ

92 ๋…„ ์›”

2) ๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ ์˜ˆ์ธก๊ณผ IT ๋ฏธ๋ž˜ ์ „๋ง์€ 2010๋…„ 11~12์›” ๋‘ ๋‹ฌ๊ฐ„ ๋‹ค์ˆ˜์˜ ํšŒ์˜์™€ ์ž๋ฃŒ ์ž‘์„ฑ์„ ํ†ตํ•ด ๋„์ถœํ•˜ ์œผ๋ฉฐ, ์ด๋ฅผ ์œ„ํ•ด ์ •๋ณดํ†ต์‹ ์ •์ฑ…์—ฐ๊ตฌ์›, ํ•œ๊ตญ์ „์žํ†ต์‹ ์—ฐ๊ตฌ์›,ํ•œ๊ตญ์ •๋ณดํ™”์ง„ํฅ์›, ํ•œ๊ตญ์ธํ„ฐ๋„ท์ง„ํฅ์›, ํ•œ๊ตญํ–‰์ •์—ฐ๊ตฌ์›, ํ•œ๊ตญ์ •๋ณดํ†ต์‹ ์ง„ํฅํ˜‘ํšŒ, u-City๋„์‹œํ˜‘ํšŒ, ์•„์ฃผ ํ•™๊ต, ์˜ตํ‹ฐ๋ฉˆ์ปจ์„คํŒ…, (์ฃผ)CST ์†Œ์† ์‚ฐโˆ™ํ•™โˆ™์—ฐ ์ „๋ฌธ๊ฐ€๋“ค์ด ์ฐธ์—ฌํ•˜ ๋‹ค.

3)โ€˜T.A.I.D.A.โ€™๊ธฐ๋ฒ•์€ ๋ฏธ๋ž˜์— ํ–ฅ์„ ์ฃผ๋Š” ๋ณ€ํ™”๋ฅผ ์ถ”์ ํ•˜๊ณ (tracking), ํŠธ๋ Œ๋“œ์™€ ํ˜„์‹ค์„ ๋ถ„์„ํ•˜์—ฌ ๋ฏธ๋ž˜๋ฅผ ์ดํ•ดํ•˜๋ฉฐ(analysing), ์‹œ๋‚˜๋ฆฌ์˜ค ํ™•๋ณด์™€ ๋น„์ „์„ ๋„์ถœํ•˜๊ณ (imaging), ๋น„์ „์„ ์‹คํ˜„ํ•˜๊ธฐ ์œ„ํ•œ ์ „๋žต๋“ค์„ ๋„์ถœํ•œ ๋’ค(deciding), ๋„์ถœ๋œ ์ „๋žต๋“ค์„ ํ˜„์‹ค์— ์ ์šฉํ•˜๊ธฐ ์œ„ํ•œ ๋ฐฉ์•ˆ(acting)์„ ์ œ์‹œํ•˜๋Š” ์ ˆ์ฐจ๋ฅผ ๊ฐ€์ง„๋‹ค.

Page 94: nternet I Security - BIGBOOK

์ •๋„์˜ ๊ธฐ๊ฐ„ ๋™์•ˆ์—๋Š” ๋„๋ž˜ํ•  ์ˆ˜ ์žˆ๋Š” ๊ฒƒ์œผ๋กœ ๊ทธ

์ง„ํ–‰ ์†๋„์™€ ํŒŒ๊ธ‰ ํšจ๊ณผ๊ฐ€ ๊ฐ๊ฐ ๋‹ค๋ฅด๋‹ค. ๋‹ค๋งŒ ๋ฉ”ํƒ€

ํŠธ๋ Œ๋“œ ๋„์ถœ ์‹œ 10๋…„์˜ ๊ธฐ๊ฐ„์ด ์ง€๋‚œ ํ›„์—๋„ ์ง€์†๋ 

์ˆ˜ ์žˆ๋Š” ํŠธ๋ Œ๋“œ๋ฅผ ๋„์ถœํ•˜๊ธฐ ์œ„ํ•ด ๋…ธ๋ ฅํ•˜ ์œผ๋ฉฐ, IT

๊ฐ€ ๊ธฐ์—ฌํ•˜๋Š” ์ •๋„๋‚˜ ๊ด€๋ จ๋„๊ฐ€ ๋งค์šฐ ์ž‘์€ ํŠธ๋ Œ๋“œ๋Š”

๊ณ ๋ คํ•˜์ง€ ์•Š์•˜๋‹ค. ๋„์ถœ๋œ ํ•œ๊ตญ์‚ฌํšŒ์˜ ๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ

๋Š” <ํ‘œ 1>๊ณผ ๊ฐ™๋‹ค.

1. ๋ฏธ๋ž˜ ์‚ฌํšŒ๊ตฌ์กฐ์˜ ๋ณ€ํ™”

1) ๋กœ๋ฒŒ ๋ฉ”๊ฐ€์‹œํ‹ฐ ๊ฒฝ์Ÿ์˜ ํ™•

๋ฏธ๋ž˜์—๋Š” ๋„์‹ฌ์— ์ธ๊ตฌ๊ฐ€ ์ง‘์ค‘๋˜๊ณ  ๊ด‘์—ญ ํ†ต๊ทผ์ด

์ผ์ƒํ™”๋˜๋Š” ๊ด‘์—ญ๊ฒฝ์ œ๊ถŒ์ธ โ€˜๋ฉ”๊ฐ€์‹œํ‹ฐ ๋ฆฌ์ „

(megacity region)โ€™์ด ์ƒˆ๋กœ์šด ํŠธ๋ Œ๋“œ๋กœ ๋ถ€์ƒํ•  ๊ฐ€

๋Šฅ์„ฑ์ด ๋†’๋‹ค. ๋„์‹œ ์ธ๊ตฌ ์ง‘์ค‘ํ™”, ๊ณ ๋ น์ธ๊ตฌ์˜ ์ฆ

๋ฐ ๋””์ง€ํ„ธ ์„ธ ์˜ ๋“ฑ์žฅ, ์ธํ”„๋ผ ๊ฒฝ์Ÿ์˜ ํ™•์‚ฐ, ๋กœ

๋ฒŒ ๋„์‹œ๊ฒฝ์Ÿ๋ ฅ ์ •์ฑ… ๊ฒฝ์Ÿ ์‹ฌํ™”๋Š” ์ด๋Ÿฌํ•œ ์ „๋ง์˜ ๊ทผ

๊ฑฐ๊ฐ€ ๋œ๋‹ค. ํ˜„ ๋„์‹œํ™”์˜ ํŠน์ง•์ ์ธ ๋ชจ์Šต์€ ํ•˜๋‚˜์˜

๊ฑฐ์  ๋„์‹œ๊ฐ€ ๋งŽ์€ ์‚ฌ๋žŒ๊ณผ ์ž์›์„ ํก์ˆ˜ํ•˜์—ฌ ์ธ๊ตฌ์™€

์—ญ์ด ๊ฑฐ ํ™”๋˜๊ณ  ์žˆ๋‹ค๋Š” ๊ฒƒ์ด๋‹ค. ํŠนํžˆ, ๊ฑฐ์ฃผ์ธ๊ตฌ

๊ฐ€ 1,000๋งŒ ๋ช…์„ ๋„˜๋Š” ๋ฉ”๊ฐ€์‹œํ‹ฐ์˜ ๋น ๋ฅธ ์ฆ๊ฐ€๋Š” ๋ฏธ

๋ž˜ ์„ธ์ƒ์„ ๋ฐ”๊ฟ€ ์ค‘์š”ํ•œ ์‚ฌํšŒ๊ตฌ์กฐ์˜ ๋ณ€ํ™”์ด๋‹ค.4)

๊ฑฐ์ ๋„์‹œ์™€ ์ฃผ๋ณ€๋„์‹œ์˜ ์—ฐ๊ณ„ ๊ฐ•ํ™”, ๋‹ค(ๅคš)์ค‘์‹ฌํ™”,

์นœํ™˜๊ฒฝํ™” ๋“ฑ์„ ์œ„ํ•œ ๊ตํ†ตโˆ™ํ†ต์‹  ์ธํ”„๋ผ ํ™•์ถฉ์œผ๋กœ

๋กœ๋ฒŒ ๋ฉ”๊ฐ€์‹œํ‹ฐ๋Š” ์ง€๋Šฅํ™”๋œ ์นœํ™˜๊ฒฝ ๋„์‹œ(smart &

eco city)๋กœ ์ง„ํ™”ํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋œ๋‹ค. ์ด๋กœ ์ธํ•ด ํ…Œ

๋ผ๋น„ํŠธ ๋„คํŠธ์›Œํฌ(terabit network), ํด๋ผ์šฐ๋“œ ์ปดํ“จ

ํŒ…(cloud computing), ์Šค๋งˆํŠธ ์„ผ์„œ(smart sensor),

์Šค๋งˆํŠธ ๊ทธ๋ฆฌ๋“œ(smart grid), ์ฐจ์„ธ BMS(Building

Management System), ITS(Intelligent

Transport System) ๋“ฑ์„ ํ†ตํ•œ ๋„์‹œ ๊ฐ„ ์—ฐ๊ฒฐ์„ฑ ๊ฐ•ํ™”

๊ฐ€ ํ™œ๋ฐœํžˆ ์ด๋ฃจ์–ด์งˆ ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋œ๋‹ค.

2) ์˜ˆ์ธก๋ถˆ๊ฐ€๋Šฅ์œ„ํ—˜์˜ ์ฆ

๋ฏธ๋ž˜์—๋Š” ๊ณผํ•™๊ธฐ์ˆ  ๋ฐœ์ „, ์‚ฐ์—…ํ™” ๋“ฑ์œผ๋กœ ์ธํ•ด ์œ„

ํ—˜์‚ฌํšŒ(risk society)๋กœ์˜ ์ง„์ „์ด ๊ฐ€์†ํ™”๋จ์— ๋”ฐ

ํ•œ๊ตญ์‚ฌํšŒ ๋ณ€ํ™”์™€ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท ์ •์ฑ…์— ํ•œ ํƒ์ƒ‰์  ์—ฐ๊ตฌ

Internet and Information Security 93

๋ถ„ ๋ฅ˜ ์†Œ ๋ถ„ ๋ฅ˜ ํ•œ๊ตญ์‚ฌํšŒ ๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ

๋ฏธ๋ž˜ ์‚ฌํšŒ

๊ตฌ์กฐ์˜ ๋ณ€ํ™”

๋„ ์‹œ 1. ๋กœ๋ฒŒ ๋ฉ”๊ฐ€์‹œํ‹ฐ ๊ฒฝ์Ÿ์˜ ํ™•

์œ„ ํ—˜ 2. ์˜ˆ์ธก๋ถˆ๊ฐ€๋Šฅ ์œ„ํ—˜์˜ ์ฆ

๊ฒฉ ์ฐจ 3. ๋””์ง€ํ„ธ ์–‘๊ทนํ™”์˜ ์‹ฌํ™”

์ • ๋ถ€ 4. ๊ฐœ๋ฐฉํ˜• ์ •๋ถ€๋กœ์˜ ์ „์ด

์ƒํ™œโˆ™์—…๋ฌด

์–‘์‹์˜ ๋ณ€ํ™”

๋งค ์ฒด 5. ์†Œ์…œ๋ฏธ๋””์–ด์˜ ์‚ฌํšŒ์ž์›ํ™”

๊ฐ ์„ฑ 6. ์‹ค๊ฐ๋งค์ฒด์™€ ๊ฐ์„ฑ์†Œ๋น„์˜ ๋ฐœ๋‹ฌ

์ฐธ ์—ฌ 7. ์ฐฝ์˜์  ์ง‘๋‹จ์ง€์„ฑ์˜ ํ™•์‚ฐ

๊ต ์œก 8. ํƒˆ ์ œ๋„ํ˜• ๊ต์œก ๋„คํŠธ์›Œํฌ ์‚ฌํšŒ ๋“ฑ์žฅ

์˜ ๋ฃŒ 9. ๊ณ ๋ น์‚ฌํšŒ์˜ ์˜๋ฃŒ๋ณต์ง€ ์ˆ˜์š” ๊ธ‰์ฆ

๊ธฐ์ˆ ํ˜์‹  ๋ฐ

์ง€์†๊ฐ€๋Šฅ ์„ฑ์žฅ

์œต ํ•ฉ 10. ํŠธ๋žœ์Šค๋ฏธ๋””์–ด ์‹œ ์˜ ๋„๋ž˜

์„ฑ ์žฅ 11. ์ง€์†๊ฐ€๋Šฅ ์„ฑ์žฅ์˜ ๆ–ฐ๊ฐ€์น˜ํ™”

ํ˜ ์‹  12. ๊ธฐ์ˆ ํ˜์‹ ๊ณผ ์Šค๋งˆํŠธ ๋ผ์ดํ”„

<ํ‘œ 1> IT์™€ 2020๋…„ ํ•œ๊ตญ์‚ฌํšŒ ๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ

4) UN์˜ ๋„์‹œํ™” ๋ณด๊ณ ์„œ์— ๋”ฐ๋ฅด๋ฉด, ํ˜„์žฌ 21๊ฐœ์˜ ๋ฉ”๊ฐ€์‹œํ‹ฐ๊ฐ€ ์กด์žฌํ•˜๋ฉฐ, 2025๋…„์—๋Š” 29๊ฐœ๋กœ ๋Š˜์–ด๋‚  ์ „๋ง์ด๋‹ค. 2009๋…„์„ ๊ธฐ์ค€์œผ๋กœ ์„ธ๊ณ„ ์ „์ฒด ์ธ๊ตฌ ๋น„ 4.7%, ์„ธ๊ณ„์ „์ฒด ๋„์‹œ์ธ๊ตฌ์˜ 9.4%๊ฐ€ ๋ฉ”๊ฐ€์‹œํ‹ฐ์— ๊ฑฐ์ฃผํ•˜๊ณ  ์žˆ๋‹ค(UN, 2010).

Page 95: nternet I Security - BIGBOOK

๋ผ ํ˜„ ์‚ฌํšŒ์˜ ์˜ˆ์ธก๋ถˆ๊ฐ€๋Šฅํ•œ ์œ„ํ—˜์ด ๊ทน ํ™”๋  ์ „๋ง

์ด๋‹ค. ๋”๋ถˆ์–ด ์ง€์†์  ๊ฒฝ์ œ๋ฐœ์ „๊ณผ ์„ฑ์žฅ ์ถ”๊ตฌ๋กœ ํ–ฅํ›„

์šฐ๋ฆฌ๋‚˜๋ผ์˜ ์‚ฌํšŒ ์œ„ํ—˜์€ ๋”์šฑ ์ฆ๊ฐ€ํ•  ๊ฒƒ์œผ๋กœ ์ „๋ง

ํ•œ๋‹ค. ๋…์ผ์˜ ์‚ฌํšŒํ•™์ž ์šธ๋ฆฌํžˆ ๋ฒก(Ulrich Beck)์€

ํ•œ๊ตญ์„ ์••์ถ•์  ๊ทผ ํ™”์— ๊ธฐ์ธํ•˜๋Š” ์ „๊ทผ ์  ์œ„ํ—˜๊ณผ

์ƒˆ๋กœ์šด ์œ„ํ—˜์ด ๊ณต์กดํ•˜๋Š”โ€˜์•„์ฃผ ํŠน๋ณ„ํ•˜๊ฒŒ ์œ„ํ—˜ํ•œ ์‚ฌ

ํšŒโ€™๋กœ ์ „๋งํ•œ ๋ฐ” ์žˆ๋‹ค(์ตœ๋ณด์‹โˆ™์žฅํ˜œ์ง„, 2008). ๊ทธ

๋Š” ํ˜„ ์‚ฌํšŒ์˜ ์œ„ํ—˜์‚ฌํšŒ๋กœ์˜ ์œ„ํ—˜์€ ๋‹จ์ˆœํ•œ ์žฌ์•™์ด

์•„๋‹Œ ์˜ˆ๊ฒฌ๋œ ์ž ์žฌ์  ์œ„ํ—˜์œผ๋กœ ๊ธ‰์†ํ•œ ๊ณผํ•™๊ธฐ์ˆ  ๋ฐœ

์ „, ์‚ฐ์—…ํ™” ๋“ฑ์— ์ฃผ๋กœ ๊ธฐ์ธํ•œ๋‹ค๊ณ  ์ฃผ์žฅํ•˜ ๋‹ค.

ํŠนํžˆ, ์ •๋ณดํ†ต์‹  ๊ธฐ์ˆ ์ด ๋ฐœ๋‹ฌํ•จ์— ๋”ฐ๋ผ ๋กœ๋ฒŒ,

๊ตญ๊ฐ€, ๊ธฐ์—…, ๊ฐœ์ธ ๋“ฑ ์ „ ์‚ฌํšŒ์  ์ฐจ์›์—์„œ ์˜ˆ์ธก๊ณผ

์‘์ด ์–ด๋ ค์šด ๋‹ค์–‘ํ•œ ์ •๋ณด ์œ„ํ—˜์ด ์ฆ๊ฐ€ํ•  ์ „๋ง์ด๋‹ค.

์ด๋กœ ์ธํ•ด ๊ธฐ์—… ๋น„ ๋ฐ ๊ฐœ์ธ ์‚ฌ์ƒํ™œ์˜ ๋…ธ์ถœ ์ฆ

๋“ฑ๊ณผ ๊ฐ™์€ ์ •๋ณด ์œ„ํ—˜ ๋ฐœ์ƒ์— ๋”ฐ๋ฅธ ์‚ฌํšŒ์  ๋น„์šฉ์ด

๊ธ‰์ฆํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋˜๋ฉฐ, ๊ตญ๊ฐ€โˆ™์‚ฌํšŒ ์ธํ”„๋ผ์˜ ์ •

๋ณดํ†ต์‹  ๊ธฐ์ˆ  ํ™œ์šฉ์ด ์ง€์†์ ์œผ๋กœ ์ฆ ๋  ๊ฒƒ์œผ๋กœ ์˜ˆ

์ธก๋œ๋‹ค.

3) ๋””์ง€ํ„ธ ์–‘๊ทนํ™”์˜ ์‹ฌํ™”

๋ฏธ๋ž˜์—๋Š” ์‹ ๊ธฐ์ˆ ์˜ ๋“ฑ์žฅ, ์„œ๋น„์Šค์˜ ๋‹ค์–‘ํ™”โˆ™์ฐจ

๋ณ„ํ™” ๋“ฑ์œผ๋กœ ์ •๋ณด ์ ‘๊ทผ์„ฑ๊ณผ ํ™œ์šฉ๋Šฅ๋ ฅ์˜ ์ฐจ์ด๋กœ ์ธ

ํ•œ ์ •๋ณดโˆ™์ง€์‹ ๊ฒฉ์ฐจ์˜ ์‹ฌํ™” ๊ฐ€๋Šฅ์„ฑ์ด ์ฆ ๋  ๊ฒƒ์ด

๋‹ค. ์ด๋Š” ๊ธฐ์ˆ ์˜ ํ™•์‚ฐ ์ •๋„์— ๋”ฐ๋ฅธ ์ƒˆ๋กœ์šด ์„œ๋น„์Šค

์— ํ•œ ์ •๋ณด์ ‘๊ทผ ๊ฒฉ์ฐจ์™€ ๊ธฐ์กด ์„œ๋น„์Šค์˜ ์ •๋ณด ํ™œ์šฉ

๊ฒฉ์ฐจ๊ฐ€ ์ค‘์ฒฉ๋˜์–ด ๋ฐœ์ƒํ•  ๊ฐ€๋Šฅ์„ฑ์ด ๋†’๋‹ค. ๋ฏธ๊ตญ ์ƒ๋ฌด

๋ถ€ ์‚ฐํ•˜ ํ†ต์‹ ์ •๋ณด๊ด€๋ฆฌ์ฒญ์€ ๋ธŒ๋กœ๋“œ๋ฐด๋“œ ์ธํ„ฐ๋„ท ์‚ฌ

์šฉ๊ฐ€๊ตฌ๊ฐ€ 2001๋…„์˜ 9%์—์„œ 2009๋…„์—๋Š” 64%๋กœ 7

๋ฐฐ ์ฆ๊ฐ€ํ•˜ ์Œ์—๋„ ๋ถˆ๊ตฌํ•˜๊ณ , ์ƒˆ๋กœ์šด ๋””์ง€ํ„ธ ๊ฒฉ์ฐจ

์˜ ์‹ฌํ™”๋ฌธ์ œ๊ฐ€ ์ง€์† ๋ฐ ํ™• ๋˜๊ณ  ์žˆ๋‹ค๋Š” ํ†ต๊ณ„ ์ง€ํ‘œ

๋ฅผ ๋ฐœํ‘œํ•œ ๋ฐ” ์žˆ๋‹ค(ESA & NTIA, 2010).

ํŠนํžˆ, ๊ณ ํ’ˆ์งˆโˆ™๊ณ ๊ธฐ๋Šฅํ™”๋œ ์‹ ๊ทœ ๋ฐฉ์†กํ†ต์‹  ๋‹จ๋ง

๋ฐ ์„œ๋น„์Šค๋Š” ์ผ๋ฐ˜์ ์œผ๋กœ ๊ณ ๊ฐ€๊ฒฉ ์ •์ฑ…์„ ์ฑ„ํƒํ•˜์—ฌ

์†Œ๋“ ๊ฒฉ์ฐจ์— ๋”ฐ๋ฅธ ์ƒˆ๋กœ์šด ์–‘๊ทนํ™”๋ฅผ ๋ฐœ์ƒ์‹œํ‚ฌ ๊ฐ€๋Šฅ

์„ฑ์ด ๋†’๋‹ค. ๋˜ํ•œ ๊ณ ๋ นํ™” ์ง„์ „, ๋‹ค๋ฌธํ™”๊ฐ€์ • ์ฆ๊ฐ€ ๋“ฑ

๊ณผ ๊ฐ™์€ ์‚ฌํšŒ๊ตฌ์กฐ์˜ ๋ณ€ํ™”์™€ ์ทจ์•ฝ ๊ณ„์ธต ์ƒ ์„œ๋น„

์Šคโˆ™์ฝ˜ํ…์ธ ์˜ ๋ถ€์กฑ๋„ ๋””์ง€ํ„ธ ์–‘๊ทนํ™” ํ˜„์ƒ์„ ์‹ฌํ™”

์‹œํ‚ค๋Š”๋ฐ ๊ธฐ์—ฌํ•  ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ๋‹ค.

4) ๊ฐœ๋ฐฉํ˜• ์ •๋ถ€๋กœ์˜ ์ „์ด

๋ฏธ๋ž˜์—๋Š” ๊ฒฝ์ œโˆ™์‚ฌํšŒ ๋ฐœ์ „, ์‹œ๋ฏผ์˜์‹์˜ ๊ฐ•ํ™”, IT

๊ธฐ์ˆ ์˜ ๋ฐœ์ „ ๋“ฑ์œผ๋กœ ํ์‡„ํ˜• ์ •๋ถ€์—์„œ ๊ฐœ๋ฐฉํ˜• ์ •๋ถ€

๋กœ ์ •์ฑ… ํŒจ๋Ÿฌ๋‹ค์ž„์ด ๊ธ‰๋ณ€ํ•  ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ๋‹ค. ๊ธฐ์กด

์˜ ๊ฑด์„คโˆ™๊ฐœ๋ฐœโˆ™์ง„ํฅโˆ™์ด‰์ง„์—์„œ ๋ฏธ๋ž˜์—๋Š” ๋ณด์กดโˆ™

ํ™˜๊ฒฝโˆ™์•ˆ์ •โˆ™๊ธฐ๋ฐ˜ ์กฐ์„ฑ์œผ๋กœ, ๊ณต๊ธ‰์ž ์ค‘์‹ฌ์˜ ๊ฑฐ๋ฒˆ

๋จผํŠธ(government)์—์„œ ์ฐธ์—ฌโˆ™ํ˜‘๋ ฅ์˜ ๊ฑฐ๋ฒ„๋„Œ์Šค

(governance)๋กœ ์ •๋ถ€์˜ ์—ญํ• ์ด ๋ณ€ํ™”ํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ

์ƒ๋œ๋‹ค. 2010๋…„์— ๋ฐœํ‘œ๋œ ๋ฏธ๊ตญ์˜ โ€˜Open

Government Initiativeโ€™, ๊ตญ์˜โ€˜Smarter

Governmentโ€™๋“ฑ ํˆฌ๋ช…(transparency)ํ•˜๊ณ , ์ฐธ์—ฌ

(participation)์ ์ด๋ฉฐ, ํ˜‘๋ ฅ(collaboration)์ 

์ธ ์ •๋ถ€๋ฅผ ์œ„ํ•œ ์ •๋ถ€ ๋ฐ์ดํ„ฐ ๊ณต๊ฐœ ์šด๋™์ด ํ™•์‚ฐ๋˜๊ณ 

์žˆ์œผ๋ฉฐ, ์ด๋Š” ์ „ ์„ธ๊ณ„์ ์ธ ํŠธ๋ Œ๋“œ๋กœ ํ™•์‚ฐ๋  ๊ฐ€๋Šฅ์„ฑ

์ด ๋†’๋‹ค. ๋˜ํ•œ ์ •๋ณดํ†ต์‹  ๊ธฐ์ˆ ์˜ ๊ณ ๋„ํ™”๋กœ ๋ถ€์ฒ˜๋ณ„,

ํ•˜๋ถ€์กฐ์ง๋ณ„๋กœ ๋‚˜๋‰˜์–ด์ ธ ์žˆ๋˜ Back-office ๊ธฐ๋Šฅ

์ด ํ†ตํ•ฉ๋˜๊ณ , u-์„œ๋น„์Šค๊ฐ€ ํ™•์‚ฐ๋˜์–ด Front-office

๊ธฐ๋Šฅ์ด ํ™• ๋  ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ๋‹ค.

ํ–ฅํ›„ ์‹œ์žฅ๊ฒฝ์ œ ํ™œ์„ฑํ™” ๋ฐ ๋ฏผโˆ™๊ด€ ํ˜‘๋ ฅ์ฒด๊ณ„ ํ™œ์„ฑ

ํ™”๋กœ ์ธํ•œ ๊ณต๊ณต์„œ๋น„์Šค์˜ ๋ฏผ๊ฐ„์ฐธ์—ฌ ํ™•์‚ฐ ๋“ฑ์œผ๋กœ ์ •

๋ถ€ ์ •์ฑ…์˜ ์ดˆ์ ์ด ๋ณ€ํ™”ํ•  ๊ฒƒ์ด๋‹ค. ์ •๋ณดํ†ต์‹  ๊ธฐ์ˆ ์˜

๋ฐœ๋‹ฌ๋กœ ์ธํ•œ ๊ณต๊ธฐ์—… ๋ฏผ ํ™” ์ด‰์ง„, ์ •๋ถ€ ๊ณ ์œ  ์—…๋ฌด

์˜ ๋ฏผ๊ฐ„ ์™ธ์ฃผ ๊ธ‰์ฆ, ๋ณด๊ฑดโˆ™๋ณต์ง€โˆ™๊ต์œก ์„œ๋น„์Šค์˜ ๋ฏผ

๊ฐ„์ฐธ์—ฌ ํ™• ํ˜„์ƒ์ด ๋”์šฑ ํ™• ๋  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋œ๋‹ค.

2. ์ƒํ™œโˆ™์—…๋ฌด ์–‘์‹์˜ ๋ณ€ํ™”

1) ์†Œ์…œ๋ฏธ๋””์–ด์˜ ์‚ฌํšŒ์ž์›ํ™”

์›น 2.0์˜ ๊ฐœ๋ฐฉ, ์ฐธ์—ฌ, ๊ณต์œ ๊ฐ€ ์†Œ์…œ๋ฏธ๋””์–ด ํ”Œ๋žซํผ

์„ ํ†ตํ•ด ํ™• โˆ™์žฌ์ƒ์‚ฐ๋˜๋Š” ์ƒํƒœ๊ณ„๊ฐ€ ์ƒ์„ฑ๋˜๊ณ , ์Šค

๋งˆํŠธ ๋‹จ๋ง์˜ ๋‹ค์–‘ํ•œ ๋ณด๊ธ‰์œผ๋กœ ๋ฏธ๋ž˜์—๋Š” ๋”์šฑ ํฐ ํŒŒ

์ œ ๊ถŒ ์ œ ํ˜ธ

94 ๋…„ ์›”

Page 96: nternet I Security - BIGBOOK

๊ธ‰ํšจ๊ณผ๋ฅผ ๊ฐ€์ ธ์˜ฌ ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋œ๋‹ค. ๋ฐ์ดํ„ฐ, ์ •๋ณด

์ค‘์‹ฌ์˜ ์ •๋ณด๋ฏธ๋””์–ด์—์„œ ์‚ฌ๋žŒ, ์ง€์‹ ์ค‘์‹ฌ์˜ ์†Œ์…œ๋ฏธ

๋””์–ด๋กœ ์ธํ„ฐ๋„ท ์ด์šฉ์˜ ์ค‘์‹ฌ์ด ๋ณ€ํ™”ํ•˜๋ฉด์„œ ์‚ฌํšŒ ์ง„

ํ™”์˜ ๊ธฐํญ์ œ๋กœ ์ž‘์šฉํ•  ๊ฐ€๋Šฅ์„ฑ์ด ๋†’๋‹ค. ๋˜ ์†Œ์…œ๋ฏธ๋””

์–ด๋Š” ์ค‘์žฅ๊ธฐ์ ์œผ๋กœ ์‚ฌํšŒ์ž์›ํ™”๊ฐ€ ๋  ๊ฐ€๋Šฅ์„ฑ์ด ๋งค

์šฐ ํฌ๋‹ค. ์ผ๋ณธ ์ด๋ฌด์„ฑ์€โ€˜2009๋…„ํŒ ์ •๋ณดํ†ต์‹ ๋ฐฑ์„œโ€™

๋ฅผ ํ†ตํ•ด ์†Œ์™ธ๊ณ„์ธต์˜ ์‚ฌํšŒ์ฐธ์—ฌ๋กœ ๋…ธ๋™๋ ฅ ํ™•์ถฉ(๊ฒฝ์ œ

๋ ฅ), ์ง€์‹โˆ™์ •๋ณด ๊ณต์œ ๋กœ ์ธ์ ์ž๋ณธ ์ถ•์ (์ง€๋ ฅ), ์ง€์—ญ

์œ  ์‹ฌํ™”์™€ ๊ฑฐ๋ฒ„๋„Œ์Šค ํ–ฅ์ƒ์œผ๋กœ ์‚ฌํšŒ๊ด€๊ณ„ ์ถ•์ (์‚ฌ

ํšŒ๋ ฅ)์— ๊ธฐ์—ฌํ•˜๋Š” ๋ชจ์Šต์œผ๋กœ ๋‚˜ํƒ€๋‚  ๊ฒƒ์ด๋ผ๊ณ  ์˜ˆ์ƒ

ํ•˜๊ณ  ์žˆ๋‹ค(์ด๋ฌด์„ฑ, 2009). ์ด๋ฌด์„ฑ์˜ ๋ฐฑ์„œ๋Š” ์ •๋ณดํ†ต

์‹ ์œผ๋กœ ํ–ฅ์ƒ๋œ ์ธ์ ์ž๋ณธ๊ณผ ์‚ฌํšŒ๊ด€๊ณ„์ž๋ณธ์ด ๋‹ค์‹œ

๊ฒฝ์ œ์„ฑ์žฅ์˜ ์ค‘์š”ํ•œ ์›๋™๋ ฅ์œผ๋กœ ์ž‘์šฉํ•จ์„ ์ฒด๊ณ„์ ์œผ

๋กœ ์ œ์‹œํ•˜ ๋‹ค๋Š” ์˜์˜๊ฐ€ ์žˆ๋‹ค.

์†Œ์…œ๋ฏธ๋””์–ด์˜ ํ™•์‚ฐ์€ ๋ฐ”์ด๋Ÿด(viral), ๋กฑํ…Œ์ผ

(long tail), ํ”„๋กœ์Šˆ๋ฐ(prosuming) ๋“ฑ ์ƒˆ๋กœ์šด ํŠธ

๋ Œ๋“œ์˜ ๋ฐœํ˜„ ๋ฐ ํ™•์‚ฐ์„ ๋™์‹œ์— ์œ ๋„ํ•  ๊ฒƒ์œผ๋กœ ์ „๋ง

๋œ๋‹ค. ์†Œ์…œ๋ฏธ๋””์–ด๋Š” ๊ฐœ์ธ, ๊ธฐ์—…, ๊ณต๊ณต ์ „๋ฐ˜์— ๊ฑธ์นœ

ํ˜์‹ ๊ณผ ๋ณ€ํ™”๋ฅผ ์œ ๋„ํ•˜๋Š” ์†Œ์…œ์ปค๋จธ์Šค(social

commerce), ์†Œ์…œ์• ๋„๋ฆฌํ‹ฑ์Šค(social analytics)

๋“ฑ์œผ๋กœ ์ง€์†์ ์ธ ์ง„ํ™”๋ฅผ ํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋œ๋‹ค.

2) ์‹ค๊ฐ๋งค์ฒด์™€ ๊ฐ์„ฑ์†Œ๋น„์˜๋ฐœ๋‹ฌ

๋ฏธ๋ž˜์—๋Š” ์ œํ’ˆ๊ณผ ์„œ๋น„์Šค์˜ ํŽธ๋ฆฌ์„ฑโˆ™ํšจ์œจ์„ฑ์„ ์ค‘

์‹œํ•˜๋˜ ์†Œ๋น„์—์„œ ์ฐฝ์˜๋ ฅ๊ณผ ์ƒ์ƒ๋ ฅ์„ ๋ฐ”ํƒ•์œผ๋กœ ๊ฐ

์„ฑ๊ณผ ์ฒดํ—˜์„ ์ค‘์‹œํ•˜๋Š” ์†Œ๋น„๋กœ ํŒจ๋Ÿฌ๋‹ค์ž„์ด ๊ธ‰๊ฒฉํ•˜

๊ฒŒ ๋ณ€ํ™”ํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ์ธก๋œ๋‹ค. ๋ฏธ๋ž˜์—๋Š” ์Šคํ† ๋ฆฌ์Šˆ๋จธ

(์ด์•ผ๊ธฐ๋ฅผ ์ฐพ๋Š” ์†Œ๋น„์ž), ํŠธ๋ผ์ด์Šˆ๋จธ(์ฒดํ—˜ํ•˜๋Š” ์†Œ

๋น„์ž), ๊ทธ๋ฆฐ์Šˆ๋จธ(๋…น์ƒ‰ ์†Œ๋น„์ž) ๋“ฑ ์ƒˆ๋กœ์šด ์œ ํ˜•์˜ ์†Œ

๋น„์ž๊ฐ€ ๋“ฑ์žฅํ•˜๊ณ  ํ™œ์„ฑํ™”๋  ๊ฒƒ์ด๋‹ค. ๊ทธ๋ฆฌ๊ณ  ์›ฐ๋น™

(wellbeing), ๊ฐ์„ฑ์š•๊ตฌ ๋“ฑ์˜ ์†Œ๋น„์ž ๊ฐ€์น˜ ์ค‘์‹ฌ์˜

๋ณ€ํ™”์™€ ๊ฐœ์ธํ™”, ๋‹ค์›ํ™”๋œ ์†Œ๋น„์ž์˜ ์š”๊ตฌ๋Š” ์ œํ’ˆโˆ™

์„œ๋น„์Šค ์„ฑ๊ณต์š”์ธ์˜ ๋ณ€ํ™”๋ฅผ ์œ ๋ฐœํ•  ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ

๋‹ค. ์ปดํ“จํ„ฐ ์ œ์กฐํšŒ์‚ฌ์ธ ์• ํ”Œ(Apple)์‚ฌ๋Š” ์•„์ดํฐ

๋ฐ ์•ฑ์Šคํ† ์–ด๋ฅผ ํ†ตํ•ด ํ•˜์ด์ปจ์…‰(high concept), ํ•˜

์ดํ„ฐ์น˜(high touch) ์ด๋ฏธ์ง€์™€ ๊ฒฝํ—˜์„ ๊ฐ•ํ™”ํ•˜์—ฌ

์ƒˆ๋กœ์šด ์‹œ์žฅ์„ ๊ฐœ์ฒ™ํ•˜๊ณ  ์žˆ๋‹ค.

ํ•œํŽธ 3D, ํŒŒ๋…ธ๋ผ๋งˆ, UHDTV(Ultra High

Definition Television), ๊ฐ€์ƒํ˜„์‹ค(virtual

reality), ์ฆ๊ฐ•ํ˜„์‹ค(augment reality) ๋“ฑ ๊ฐ์„ฑ์ฒด

ํ—˜์„ ํ™• ํ•˜๋Š” ๊ณ ํ’ˆ๊ฒฉ ์‹ค๊ฐํ˜• ๊ธฐ์ˆ  ๋˜ํ•œ ๊ธ‰์†๋„๋กœ

๋ฐœ๋‹ฌํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋œ๋‹ค. ์ฒจ๋‹จ ์ •๋ณดํ†ต์‹  ๊ธฐ์ˆ ์€ ๋‹ค

์–‘ํ•œ ์ „ํ†ต ๋ถ„์•ผ์™€ ์œตํ•ฉํ•˜์—ฌ ์—ญ์‚ฌโˆ™์šฐ์ฃผ์ฒดํ—˜ ๊ต์œก,

์Šคํฌ์ธ , ์›๊ฒฉ ์ˆ˜์ˆ  ๋“ฑ์˜ ์ฒจ๋‹จ ์‹ค๊ฐ ์„œ๋น„์Šค ์ œ๊ณต์„

์ด‰์ง„ํ•  ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ๋‹ค.

3) ์ฐฝ์˜์  ์ง‘๋‹จ์ง€์„ฑ์˜ ํ™•์‚ฐ

๋ฏธ๋ž˜์—๋Š” ๋‹ค์ˆ˜ ์ฐธ์—ฌ์ž๋“ค์˜ ์ž๋ฐœ์ ์ธ ์ •๋ณด ๊ณต์œ 

๋ฅผ ํ†ตํ•ด ๋ฐœ์ „ํ•˜๋Š”โ€˜Web 2.0โ€™์˜ ํ™•์‚ฐ์œผ๋กœ ์ง‘๋‹จ์ง€

์„ฑ( ์ค‘์˜ ์ง€ํ˜œ)์ด ์ •๋ณด ์ƒ์‚ฐ์˜ ์ฃผ์ฒด๋กœ ๋ถ€์ƒํ•  ๊ฒƒ

์œผ๋กœ ์˜ˆ์ธก๋œ๋‹ค. ์ด๋Š” ๋‹ค์ˆ˜์˜ ๊ฐœ์ฒด๋“ค์ด ์„œ๋กœ ํ˜‘๋ ฅ

ํ˜น์€ ๊ฒฝ์Ÿ์„ ํ†ตํ•˜์—ฌ ์–ป๊ฒŒ ๋˜๋Š” ์ง€์  ๋Šฅ๋ ฅ์— ์˜ํ•œ

๊ฒฐ๊ณผ๋กœ ์–ป์–ด์ง„ ์ง‘๋‹จ์  ๋Šฅ๋ ฅ์˜ ํ–ฅ๋ ฅ ํ™• ๋ฅผ ์˜๋ฏธ

ํ•œ๋‹ค. ์œ„ํ‚คํ”ผ๋””์•„(wikipedia), ํฌ๋ผ์šฐ๋“œ์†Œ์‹ฑ

(crowdsourcing)5) ์ง€์‹IN ๋“ฑ ์ง‘๋‹จ์ง€์„ฑ์„ ํ™œ์šฉํ•œ

๋ฌธ์ œํ•ด๊ฒฐ, ์ง€์ ๊ฒฐ๊ณผ๋ฌผ ์ฐฝ์ž‘ ์‚ฌ๋ก€๊ฐ€ ๊ธ‰์ฆํ•˜๊ณ  ์žˆ๋Š”

๊ฒƒ์ด ์ด์™€ ๊ฐ™์€ ์˜ˆ์ธก์„ ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•œ๋‹ค.

๊ธฐ์—…ํ˜์‹ , ์•„์ด๋””์–ด ์ฐฝ์ถœ, ์ง€์‹ ์ƒ์‚ฐ ๋“ฑ์—์„œ ์ง‘๋‹จ

์ง€์„ฑ์˜ ํ•„์š”์„ฑ์€ ์ง€์†์ ์œผ๋กœ ์ฆ๊ฐ€ํ•˜๊ณ  ์žˆ์œผ๋ฉฐ, ์›น

๊ธฐ์ˆ ์˜ ์ง„ํ™”๋Š” ์ด๋Ÿฌํ•œ ํ™œ์šฉ์„ ๊ฐ€์†ํ™”์‹œํ‚ค๊ณ  ์žˆ๋‹ค.

์ธํ„ฐ๋„ท ๊ธฐ๋ฐ˜ ๊ทœ๋ชจ ํ˜‘์—…(mass collaboration)

์€ ์ง€์‹ ๊ตํ™˜, ์ œํ’ˆโˆ™์„œ๋น„์Šค ๋ฐœ๋ช…, ์ƒ์‚ฐโˆ™๋งˆ์ผ€ํŒ…โˆ™

์œ ํ†ต๋ฐฉ์‹ ๋“ฑ์˜ ๋ณ€ํ™”๋ฅผ ์•ผ๊ธฐํ•  ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ๋‹ค. ์ง‘

๋‹จ์ง€์„ฑ์‚ฌ์ดํŠธ์ธ์ด๋…ธ์„ผํ‹ฐ๋ธŒ(www.innocentive.com)

ํ•œ๊ตญ์‚ฌํšŒ ๋ณ€ํ™”์™€ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท ์ •์ฑ…์— ํ•œ ํƒ์ƒ‰์  ์—ฐ๊ตฌ

Internet and Information Security 95

5) ๊ตฐ์ค‘(crowd)๊ณผ ์•„์›ƒ์†Œ์‹ฑ(outsourcing)์˜ ํ•ฉ์„ฑ์–ด๋กœ ์ผ๋ฐ˜ ์ค‘์ด ๊ธฐ์—… ๋‚ด๋ถ€์ธ๋ ฅ์„ ์ฒดํ•˜๋Š” ํ˜„์ƒ์„ ์ผ์ปซ๋Š” ๊ฒƒ์œผ๋กœ ๋ฏธ๊ตญ ์™€์ด์–ด๋“œ(Wired) ๋งค๊ฑฐ์ง„์˜ ์ œํ”„ ํ•˜์šฐ(Jeff Howe)๊ฐ€ ๋งŒ๋“  ์šฉ์–ด์ด๋‹ค. ์†Œ์…œ๋„คํŠธ์›Œํ‚น ๊ธฐ๋ฒ•์„ ์ด์šฉํ•˜์—ฌ ์ œํ’ˆ์ด๋‚˜ ์ง€์‹์˜ ์ƒ์„ฑ๊ณผ ์„œ๋น„์Šค ๊ณผ์ •์— ์ค‘์„ ์ฐธ์—ฌ์‹œํ‚ด์œผ๋กœ์จ ์ƒ์‚ฐ ๋‹จ๊ฐ€๋ฅผ ๋‚ฎ์ถ”๊ณ , ๋ถ€๊ฐ€๊ฐ€์น˜๋ฅผ์ฆ ์‹œํ‚ค๋ฉฐ ๋ฐœ์ƒ๋œ ์ˆ˜์ต์˜ ์ผ๋ถ€๋ฅผ ๋‹ค์‹œ ์ค‘์—๊ฒŒ ๋Œ๋ ค์ฃผ๋Š” ์ƒˆ๋กœ์šด ๊ฒฝ ํ˜์‹  ๋ฐฉ๋ฒ•์ด๋‹ค.

Page 97: nternet I Security - BIGBOOK

๋Š” 2001๋…„ ์ฐฝ๋ฆฝ ์ดํ›„ 600์—ฌ ๊ฐœ์˜ ๊ณ ๊ฐํšŒ์‚ฌ ๊ณผ์ œ

์ค‘ 200์—ฌ ๊ฐœ๋ฅผ ๋กœ๋ฒŒ ์ „๋ฌธ๊ฐ€ ๋„คํŠธ์›Œํฌ๋ฅผ ํ†ตํ•œ ๊ตฐ

์ง‘์šฉ์—ญ์œผ๋กœ ํ•ด๊ฒฐํ•œ ๋ฐ”๊ฐ€ ์žˆ๋‹ค.6)

4) ํƒˆ ์ œ๋„ํ˜• ๊ต์œก ๋„คํŠธ์›Œํฌ ์‚ฌํšŒ ๋“ฑ์žฅ

๋ฏธ๋ž˜์—๋Š” ์†Œ๋น„ํ–‰ํƒœ์˜ ๊ณ ๊ธ‰ํ™”, ์‚ถ์˜ ์งˆ ํ–ฅ์ƒ ์š•๊ตฌ

์ฆ ๋“ฑ์œผ๋กœ ์ž์œจ์ ์ด๊ณ , ์„ ํƒ์ ์ธ ๋งž์ถคํ˜• ๊ต์œกํ™˜

๊ฒฝ์— ํ•œ ์š”๊ตฌ๊ฐ€ ์ฆ ๋  ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ๋‹ค. ํš์ผ์ 

๊ต์œกํ™˜๊ฒฝ์˜ ๊ฐœ์„ , ๊ต์œก ์ „๋ฌธ์„ฑ ๊ฐ•ํ™”, ์—ฌ๊ฐ€๋ฅผ ๋™๋ฐ˜

ํ•œ ์ฒดํ—˜ํ•™์Šต ํ™• ๋“ฑ ์ƒˆ๋กœ์šด ๊ต์œก ํŒจ๋Ÿฌ๋‹ค์ž„์ด ๊ธ‰์†

ํžˆ ํ™•์‚ฐ๋  ๊ฒƒ์ด๋‹ค. ์ผ๋ก€๋กœ ํ™ˆ์Šค์ฟจ๋ง, ๊ณ„์•ฝ์ œ ํ•™๊ต

(charter school) ๋“ฑ ๋‹ค์–‘ํ•œ ํ˜•ํƒœ์˜ ํƒˆ ์ œ๋„๊ถŒ ํ•™

๊ต, ํŽœ์‹ค๋ฒ ์ด๋‹ˆ์•„ ์™€ํŠผ์Šค์ฟจ์˜โ€˜๊ธฐ๋ณผ๋กœ์ง€(givology)โ€™

์™€ ๊ฐ™์ด SNS๋ฅผ ํ™œ์šฉํ•œ ์ƒˆ๋กœ์šด ํ˜•ํƒœ์˜ ๊ตฐ์ง‘ ์ฒด๊ณ„

๋“ฑ์˜ ์ƒˆ๋กœ์šด ๊ต์œก ํ–‰ํƒœ๊ฐ€ ๋“ฑ์žฅํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋œ๋‹ค.

์ด๋กœ ์ธํ•ด ์ˆ˜๋™์  ํ•™์Šต์ž์—์„œ ๋Šฅ๋™์  ํ•™์Šต์ž๋กœ ํ•™

์Šต ์ฃผ์ฒด์˜ ๋ณธ์งˆ์ด ๋ณ€ํ™”ํ•˜๊ฒŒ ๋  ๊ฒƒ์ด๋ฉฐ, ์ •๋ณดํ†ต์‹ 

๊ธฐ์ˆ ์˜ ๋ฐœ๋‹ฌ ๋ฐ ํ™œ์šฉ ์—ฌ๊ฑด์˜ ํ–ฅ์ƒ์€ ๊ต์œกํ™˜๊ฒฝ์˜ ๋ณ€

ํ™”๋ฅผ ๋”์šฑ ์ด‰์ง„์‹œํ‚ฌ ๊ฒƒ์ด๋‹ค.

๊ทธ๋ฆฌ๊ณ  ์•ˆ์  ๊ต์œก ๊ธฐํšŒ์˜ ์ฆ๊ฐ€์— ๋”ฐ๋ผ ๋„คํŠธ์›Œ

ํฌ ํ•™์Šต์‚ฌํšŒ(network learning society)์˜ ๋“ฑ์žฅ

๋ฐ ํ™•์‚ฐ์ด ๊ฐ€์†ํ™”๋  ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ๋‹ค. ๋ถ€๋ถ„์˜ ๊ต

์œก์ด ์˜จ๋ผ์ธ ๋„คํŠธ์›Œํฌ์ƒ์—์„œ ์—…๋ฐ์ดํŠธ๋œ ์ •๋ณด๋กœ ์ด

๋ฃจ์–ด์ง€๊ณ , ์ปค๋ฎค๋‹ˆํ‹ฐ ํ™œ๋™์„ ์ค‘์‹ฌ์œผ๋กœ ํ•™๊ต์ƒํ™œ์ด

์ด๋ฃจ์–ด์งˆ ๊ฐ€๋Šฅ์„ฑ์ด ๋†’์•„์งˆ ๊ฒƒ์ด๋‹ค. ์ •๋ณดํ†ต์‹  ๊ธฐ๋ฐ˜

์˜ ๊ด‘๋ฒ”์œ„ํ•œ ํ•™์Šต ๋„คํŠธ์›Œํฌ์˜ ํ˜•์„ฑ์œผ๋กœ ์ฐฝ์˜, ํ˜‘

๋ ฅ, ์ฒดํ—˜, ๋งž์ถค, ์ฐธ์—ฌ์˜ ํ˜•ํƒœ๋กœ ๊ต์œก ๊ณต๊ฐ„โˆ™๋ฐฉ์‹โˆ™

๋งค์ฒดโˆ™์ฝ˜ํ…์ธ ์˜ ๋ณ€ํ™”๊ฐ€ ์ด๋ฃจ์–ด์งˆ ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋œ๋‹ค.

5) ๊ณ ๋ น์‚ฌํšŒ์˜ ์˜๋ฃŒ๋ณต์ง€ ์ˆ˜์š” ๊ธ‰์ฆ

๋ฏธ๋ž˜์—๋Š” ๊ณ ๋ นํ™”๋กœ ์ธํ•œ ๋ณด๊ฑด์˜๋ฃŒ ์„œ๋น„์Šค ์ˆ˜์š”

์ฆ๊ฐ€ ๋ฐ ์†Œ๋“์ˆ˜์ค€์˜ ์ฆ๊ฐ€์— ๋”ฐ๋ฅธ ๊ณ ํ’ˆ์งˆ ์˜๋ฃŒ ์„œ๋น„

์Šค์— ํ•œ ์š”๊ตฌ ๋“ฑ ๋ณด๊ฑด์˜๋ฃŒ ์ˆ˜์š”์˜ ๋‹ค์–‘ํ™”๊ฐ€ ํ•œ์ธต

๋น ๋ฅธ ์†๋„๋กœ ์ง„ํ–‰๋  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋œ๋‹ค. ํ•œ๊ตญ์˜ ๊ฒฝ

์šฐ, 2018๋…„์— ๊ณ ๋ น์‚ฌํšŒ, 2026๋…„์— ์ดˆ๊ณ ๋ น์‚ฌํšŒ๊ฐ€

๋„๋ž˜๋  ๊ฒƒ์œผ๋กœ ์ „๋ง๋˜๊ณ  ์žˆ์œผ๋ฉฐ, ๊ธ‰์†ํ•œ ๊ณ ๋ นํ™”์˜

์ง„์ „์œผ๋กœ ์‚ฌํšŒ ๋ถ€๋‹ด์ด ๊ธ‰๊ฒฉํžˆ ์ฆ๊ฐ€ํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ์ธก

๋œ๋‹ค(ํ†ต๊ณ„์ฒญ, 2010). ๋˜ํ•œ 2002๋…„๋ถ€ํ„ฐ 2008๋…„๊นŒ

์ง€ ๋…ธ์ธ์„ฑ ์งˆํ™˜์ž ์ง„๋ฃŒ์ถ”์ด๋ฅผ ๋ถ„์„ํ•œ ๊ฒฐ๊ณผ๋ฅผ ์‚ดํŽด

๋ณด๋ฉด ๋…ธ์ธ์„ฑ ์งˆํ™˜์ž๋Š” 95๋งŒ 2,000๋ช…์œผ๋กœ 90% ์ฆ

๊ฐ€, ์ด ์ง„๋ฃŒ๋น„๋Š” 1์กฐ 7,000์–ต ์›์œผ๋กœ 280% ์ฆ๊ฐ€

ํ•œ ๊ฒƒ์œผ๋กœ ๋‚˜ํƒ€๋‚˜๊ณ  ์žˆ๋‹ค(๊ตญ๋ฏผ๊ฑด๊ฐ•๋ณดํ—˜๊ณต๋‹จ,

2010). ํŠนํžˆ, ์†Œ๋“์ˆ˜์ค€์˜ ์ฆ๊ฐ€๋กœ ๊ธฐ๋ณธ๊ถŒ์ ์ธโ€˜ํ•„์ˆ˜

์˜๋ฃŒโ€™๋ณด๋‹ค๋Š” ์ ๊ทน์ ์ธ ๊ฑด๊ฐ•๊ด€๋ฆฌ๋ฅผ ์œ„ํ•œ ๋น„ํ•„์ˆ˜์ 

์ด๊ณ  ๋ถ€๊ฐ€์ ์ธโ€˜์„ ํƒ์˜๋ฃŒโ€™์— ํ•œ ์ˆ˜์š”๊ฐ€ ๊ธ‰๊ฒฉํžˆ

ํ™•์‚ฐ๋  ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ๋‹ค.

๊ณ ๋ น์‚ฌํšŒ์˜ ์˜๋ฃŒ๋ณต์ง€ ์ˆ˜์š”๊ฐ€ ๊ธ‰์ฆํ•จ์— ๋”ฐ๋ผ ํ–ฅ

ํ›„ ์œ ์ „๊ณตํ•™์˜ ๋ฐœ์ „, ์ •๋ณดํ†ต์‹  ๊ธฐ์ˆ ์˜ ์ ‘๋ชฉ ํ™•

๋“ฑ์œผ๋กœ ๊ฐœ์ธ๋ณ„ ์˜ˆ๋ฐฉ, ์ง„๋‹จ, ์น˜๋ฃŒ๊ฐ€ ์ด๋ฃจ์–ด์ง€๋Š” ์ด

์šฉ์ž ์ค‘์‹ฌ์˜ ์ฒจ๋‹จ ์˜๋ฃŒ๋ณต์ง€ ์‹œ ๊ฐ€ ๋„๋ž˜ํ•  ๊ฒƒ์œผ๋กœ

์˜ˆ์ƒ๋œ๋‹ค. ๋˜ํ•œ ์ „ ์„ธ๊ณ„์ ์œผ๋กœ ๋กœ๋ฒŒ ์˜๋ฃŒ๊ด€๊ด‘ ํ—ˆ

๋ธŒ๋กœ ๋„์•ฝํ•˜๊ธฐ ์œ„ํ•œ ๊ตญ๊ฐ€ ์ฐจ์›์˜ ์ •์ฑ…์ด ๋‹ค์ˆ˜ ์ง„ํ–‰

๋˜๊ณ  ์žˆ์œผ๋ฉฐ, ํ–ฅํ›„ ์˜๋ฃŒ๊ด€๊ด‘ ์‚ฐ์—…์ด ๋งŽ์€ ๊ตญ๊ฐ€๋“ค์˜

์ „๋žต ์‚ฐ์—…์œผ๋กœ ๋ถ€์ƒํ•  ๊ฐ€๋Šฅ์„ฑ์ด ๋†’๋‹ค.

3. ๊ธฐ์ˆ ํ˜์‹  ๋ฐ ์ง€์†๊ฐ€๋Šฅ ์„ฑ์žฅ

1) ํŠธ๋žœ์Šค๋ฏธ๋””์–ด ์‹œ ์˜ ๋„๋ž˜

์•ž์œผ๋กœ๋Š” ์‹ ๋ฌธ, ๋ฐฉ์†ก, ์ธํ„ฐ๋„ท๊ณผ ๊ฐ™์€ ๊ธฐ์กด ๋ฏธ๋””

์–ด๊ฐ€ SNS, ์Šค๋งˆํŠธ ๋‹จ๋ง ๋“ฑ ์‹ ๊ทœ ๋ฏธ๋””์–ด์™€ ๊ฒฐํ•ฉํ•˜

๋ฉด์„œ ์ด์šฉ์ž์™€ ๊ฐ์„ฑ์„ ์ฃผ๊ณ ๋ฐ›๋Š”(๋‹ค์ฑ„๋„๋กœ ๊ต๊ฐํ•˜

๋Š”) ์–‘๋ฐฉํ–ฅ ํŠธ๋žœ์Šค๋ฏธ๋””์–ด(transmedia)7) ํ™”๊ฐ€ ๋”์šฑ

์ด‰์ง„๋  ์ „๋ง์ด๋‹ค. ์‹ค์„ธ๊ณ„(real world)์˜ ๋ฏธ๋””์–ด

ํ™”, ๋ฏธ๋””์–ด์™€์˜ ์ƒ๊ฑฐ๋ž˜ ํ†ตํ•ฉ ํ™•์‚ฐ, ๋งํฌ(link)์˜

์ œ ๊ถŒ ์ œ ํ˜ธ

96 ๋…„ ์›”

6) ํ‘œ์  ์‚ฌ๋ก€๋กœ๋Š” 1989๋…„ ๋ฏธ๊ตญ ์•Œ๋ž˜์Šค์นด์—์„œ ์—‘์† ๋ฐœ๋ฐ์Šคํ˜ธ ์‚ฌ๊ฑด์ด๋ผ๊ณ  ๋ถ€๋ฅด๋Š” ์‚ฌ์ƒ ์ตœ์•…์˜ ๊ธฐ๋ฆ„ ์œ ์ถœ ์‚ฌ๊ณ  ์ดํ›„ 20๋…„ ๋™์•ˆ ์ „๋ฌธ๊ฐ€๋“ค์ด ํ’€์ง€ ๋ชปํ•œ ๋ฌธ์ œ๋ฅผ ์‹œ๋ฉ˜ํŠธํšŒ์‚ฌ์˜ ํ•œ ๋…ธ๋™์ž๊ฐ€ ํ•ด๊ฒฐํ•œ ์ผํ™”๊ฐ€ ์žˆ๋‹ค.

7) ๋ฏธ๋””์–ด ๊ฐ„ ์ƒํ˜ธ์ž‘์šฉ์œผ๋กœ ์„œ๋กœ ๋‹ค๋ฅธ ๋ฏธ๋””์–ด๊ฐ€ ๊ฒฐํ•ฉํ•˜๋Š” ํ˜„์ƒ๊ณผ ํŠน์ • ๋‚ด์šฉ์„ ๊ฐ–๋Š” ๋ฏธ๋””์–ด ๋‚ด์šฉ์ด ๋‹ค๋ฅธ ๋ฏธ๋””์–ด๋กœ ์ „ํ™˜ํ•˜๋Š” ํ˜„์ƒ์„ ๋™์‹œ์— ์ง€์นญํ•œ๋‹ค.

Page 98: nternet I Security - BIGBOOK

๋‚ด์žฌํ™” ๋“ฑ์œผ๋กœ ๋ฏธ๋””์–ด์˜ ์ผ์ƒํ™”๊ฐ€ ๋น ๋ฅด๊ฒŒ ์ง„ํ–‰๋ 

๊ฒƒ์œผ๋กœ ์˜ˆ์ธก๋œ๋‹ค.

์ด์™€ ๊ด€๋ จํ•˜์—ฌ ๋„คํŠธ์›Œํฌ๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ํ™œ๋™ํ•˜๋Š” ํŠธ

๋žœ์Šค๋ฏธ๋””์–ด ์ด์šฉ์ž์˜ ํ–‰ํƒœ ๋ณ€ํ™”๋Š” ๋ฏธ๋””์–ด์˜ ํ˜‘๋ ฅ์ 

์ด์šฉ ๋“ฑ ๋ฏธ๋””์–ด ์ƒํƒœ๊ณ„์˜ ๊ธ‰์†ํ•œ ๋ณ€ํ™”๋ฅผ ์ดˆ๋ž˜ํ•  ๊ฒƒ

์œผ๋กœ ์ „๋ง๋œ๋‹ค. ํŠน์ •ํ•œ ์žฅ๋ฅด์˜ ์ฝ˜ํ…์ธ ๋ฅผ ์—ฌ๋Ÿฌ ๊ฐ€์ง€

๋ฏธ๋””์–ด์—์„œ ๋‹ค์–‘ํ•œ ๋ฒ„์ „์œผ๋กœ ํ–ฅ์œ ํ•˜๋Š” ์ง‘๋‹จ์ด ๋ถ€๊ฐ

๋ ๊ฒƒ์ด๋‹ค. ํŠธ๋žœ์Šค๋ฏธ๋””์–ด์™€๋˜‘๋˜‘ํ•œ์ด์šฉ์ž(intelligent

user) ๊ฐ„ ์ง€์†์ ์ธ ์–‘๋ฐฉํ–ฅ ์†Œํ†ต(interaction)์ด ๋‹ค

์–‘ํ•œ ๊ฐ€์น˜๋ฅผ ์ฐฝ์ถœํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋˜๋ฉฐ, ํŠธ๋žœ์Šค๋ฏธ๋””

์–ด ์‚ฌ์šฉ์— ํ•œ ํ‰ํŒ๊ณผ ๊ตฌ์ „ ํšจ๊ณผ์˜ ์ค‘์š”์„ฑ์ด ํฌ๊ฒŒ

์ฆ ๋  ๊ฒƒ์ด๋‹ค. ์ด๋Ÿฌํ•œ ์ƒํƒœ๊ณ„๋Š” ์—ฌ๋Ÿฌ ๋งค์ฒด๋ฅผ ๋„˜๋‚˜

๋“ค๋ฉฐ ํ•„์š”๋กœ ํ•˜๋Š” ์ฝ˜ํ…์ธ ๋ฅผ ์ž์œ ๋กญ๊ฒŒ ํ™œ์šฉํ•˜๊ณ , ์ง€

์†์ ์ธ ์–‘๋ฐฉํ–ฅ ์†Œํ†ต์œผ๋กœ ์ƒˆ๋กœ์šด ๊ฐ€์น˜๋ฅผ ์ฐฝ์ถœํ•˜๋Š”

ํ˜•ํƒœ๋กœ ์ง„ํ™”ํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋œ๋‹ค.

2) ์ง€์†๊ฐ€๋Šฅ ์„ฑ์žฅ์˜ ์‹ ๊ฐ€์น˜ํ™”

ํ–ฅํ›„์—๋Š” ๊ตญ๊ฐ€๊ฒฝ์ œ์™€ ๊ตญ๋ฏผ์ƒํ™œ์˜ ๋ฏธ๋ž˜๋ฅผ ๊ฒฐ์ •ํ•˜

๋Š” ์ฃผ์š” ๋ณ€์ˆ˜๋กœ์„œ ์—๋„ˆ์ง€โˆ™ํ™˜๊ฒฝ ์ด์Šˆ๊ฐ€ ์ „ ์„ธ๊ณ„์ 

์œผ๋กœ ์ œ๊ธฐ๋˜์–ด ๋…น์ƒ‰์ƒํ™œโˆ™๊ฒฝ์ œ๊ฐ€ ๋ณดํŽธํ™”๋  ๊ฒƒ์œผ๋กœ

์ „๋ง๋œ๋‹ค. ์ž์›๊ณ ๊ฐˆ๋กœ ์ธํ•œ ์—๋„ˆ์ง€ ๋ถ€์กฑ๊ณผ ์˜จ์‹ค๊ฐ€

์Šค๋กœ ์ธํ•œ ๊ธฐํ›„๋ณ€ํ™”, ํ™˜๊ฒฝ์˜ค์—ผ ๋“ฑ์˜ ํ™˜๊ฒฝ๋ฌธ์ œ๊ฐ€ ์ธ

๋ฅ˜์—๊ฒŒ ํ˜„์‹ค์ ์ธ ์œ„ํ˜‘์œผ๋กœ ๋“ฑ์žฅํ•˜ ์œผ๋ฉฐ, ์ธ๋ฅ˜์˜

์‚ถ๊ณผ ๊ด€๋ จ๋˜๋Š” ๋ชจ๋“  ๋ถ„์•ผ์— ์žˆ์–ด ๋…น์ƒ‰ ํ˜๋ช…์˜ ํ•„์š”

์„ฑ์— ํ•œ ๊ณต๊ฐ ํ™•์‚ฐ์œผ๋กœ ์ „ ์„ธ๊ณ„์ ์ธ ์ง€์†๊ฐ€๋Šฅ

์„ฑ์žฅ ๋ฐฉ์•ˆ์˜ ๋ชจ์ƒ‰์ด ๋”์šฑ ํ™• ๋  ๊ฒƒ์ด๋‹ค.

์ด์— ์ผ์ƒ์ƒํ™œ ๋‚ด ์นœํ™˜๊ฒฝ์ ์ธ ์—๋„ˆ์ง€ ์ƒ์‚ฐโˆ™์†Œ

๋น„ ์ฆ๊ฐ€ ๋ฐ ํ™˜๊ฒฝ ๋ถ„์•ผ์˜ ์‹ ์„ฑ์žฅ ๋™๋ ฅํ™”๋ฅผ ์ถ”๊ตฌํ•˜๋Š”

๋กœ๋ฒŒ ๊ทธ๋ฆฐ ๋ฐฉ์†กํ†ต์‹  ํŠธ๋ Œ๋“œ๊ฐ€ ์ง€์†์ ์œผ๋กœ ํ™•์‚ฐ

๋  ๊ฒƒ์ด๋‹ค. ์—๋„ˆ์ง€ ์ƒ์‚ฐ, ์†Œ๋น„ ์ ˆ๊ฐ, ์žฌํ™œ์šฉ ๋“ฑ์„

์œ„ํ•œ ์นœํ™˜๊ฒฝ ์ œํ’ˆ์˜ ๊ฐœ๋ฐœ ๋ฐ ์ด์šฉ ํ™• , ์—๋„ˆ์ง€ ์œ 

ํ†ต์ฒด๊ณ„ ๊ฐœ์„ ์„ ํ†ตํ•œ ์‹  ๋ถ€๊ฐ€๊ฐ€์น˜ ์ฐฝ์ถœ ๋“ฑ์ด ํ‘œ์ 

์‚ฌ๋ก€์ด๋‹ค. ์ด์™€ ๊ด€๋ จํ•˜์—ฌ ๊ทธ๋ฆฐ ๋ฐ์ดํ„ฐ ์„ผํ„ฐ, ์ „๋ ฅ

๋ฐ˜๋„์ฒด, ๊ทธ๋ฆฐ ๋นŒ๋”ฉ, ๊ทธ๋ฆฐ ์นด, ์Šค๋งˆํŠธ ๊ทธ๋ฆฌ๋“œ ๋“ฑ ์ „

์„ธ๊ณ„์ ์œผ๋กœ ์นœํ™˜๊ฒฝ ์‚ฐ์—…์ด ๊ธ‰์†ํžˆ ์„ฑ์žฅํ•  ๊ฒƒ์œผ๋กœ

์ „๋ง๋œ๋‹ค. ์ „ ์„ธ๊ณ„ ๊ทธ๋ฆฐ ๋ฐ์ดํ„ฐ ์‹œ์žฅ์€ 2010๋…„ 75

์–ต ๋‹ฌ๋Ÿฌ์—์„œ 2015๋…„ 414์–ต ๋‹ฌ๋Ÿฌ๋กœ ์„ฑ์žฅํ•  ๊ฒƒ์œผ๋กœ

์˜ˆ์ธก๋˜๋ฉฐ(Pike Research, 2010), ์„ธ๊ณ„ ์ „๋ ฅ ๋ฐ˜๋„

์ฒด ์‹œ์žฅ์€ 2020๋…„์—๋Š” 2010๋…„ ๋น„ 2.2๋ฐฐ์ธ 4์กฐ

4,887์–ต ์—”์— ๋‹ฌํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ์ธก๋˜๊ณ  ์žˆ๋‹ค(ํ›„์ง€๊ฒฝ

์ œ, 2011).

3) ๊ธฐ์ˆ ํ˜์‹ ๊ณผ์Šค๋งˆํŠธ ๋ผ์ดํ”„

ํ„ฐ์น˜๊ธฐ์ˆ , ์•ฑ์Šคํ† ์–ด ๋“ฑ์œผ๋กœ ์‹œ์ž‘๋œ ์Šค๋งˆํŠธ ๊ธฐ์ˆ 

ํ˜์‹ ์€ ์ง€๋Šฅํ˜• ๊ณต๊ฐ„โˆ™์ƒํ™ฉ์ธ์ง€ ๊ธฐ์ˆ , ๊ฐœ์ธํ™” ๋ฐ ๊ฐ€

์ƒํ™” ๊ธฐ์ˆ  ๋“ฑ์œผ๋กœ ์ง„ํ™”๋ฅผ ์ง€์†ํ•  ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ๋‹ค.

์ด์™€ ๊ด€๋ จํ•˜์—ฌ 3D, UHDTV, ํ™€๋กœ๊ทธ๋žจ, ํด๋ผ์šฐ

๋“œ, ์‚ฌ๋ฌผํ†ต์‹  ๋“ฑ์„ ํ†ตํ•ด ๊ฐœ์ธ, ๊ธฐ์—…, ๊ณต๊ณต ๋“ฑ ์ „ ๋ถ„

์•ผ์— ์ƒˆ๋กœ์šด ๊ฐ€์น˜๋ฅผ ์ œ๊ณตํ•˜๋Š” ํ˜์‹ ์  ์„œ๋น„์Šค๊ฐ€ ๋‹ค

์ˆ˜ ์ถœํ˜„ํ•  ๊ฒƒ์ด๋‹ค. ๋…์ผ์˜ ํ…”๋ ˆ์ปค๋ฎค๋‹ˆ์ผ€์ด์…˜์—ฐ๊ตฌ

ํ˜‘ํšŒ์ธ M nchner Kreis๋Š” ๊ตญ์ œ์  ๋ธํŒŒ์ด ๊ธฐ๋ฒ•์„

ํ†ตํ•ด 2030๋…„๊นŒ์ง€ 20๋…„์˜ ์žฅ๊ธฐ์ ์ธ ICT์™€ ๋ฏธ๋””์–ด

๋ถ„์•ผ์˜ ๋ฐœ์ „, ๋ณ€ํ™” ๊ฒฝํ–ฅ ๋ฐ ํ˜์‹  ๋“ฑ์— ํ•œ ํ‰๊ฐ€์™€

์ „๋ง์„ ์ˆ˜ํ–‰ํ•œ ๊ฒฐ๊ณผ๋ฅผ ํ†  ๋กœ ICT์˜ ํ™•์‚ฐ์€ ์‚ฐ์—…

๊ณผ ์‚ฌํšŒ ๋ถ€๋ฌธ์˜ ์Šค๋งˆํŠธํ™”๋ฅผ ์ด‰์ง„ํ•˜๊ณ , ์Šค๋งˆํŠธํ•ด์ง„

์‚ฐ์—…์‚ฌํšŒ๋Š” ICT์˜ ๋ณด๋‹ค ํ˜์‹ ์ ์ธ ๋ฐœ์ „์˜ ๊ธฐํญ์ œ๋กœ

์„œ์˜ ์—ญํ• ์„ ํ•  ๊ฒƒ์ด๋ผ๊ณ  ๋ฐํžŒ ๋ฐ” ์žˆ๋‹ค(M nchner

Kreis et al., 2009).

์Šค๋งˆํŠธ ๊ธฐ์ˆ ํ˜์‹ ์œผ๋กœ ๋ฐœํ˜„๋œ ์ด์šฉ์ž๋“ค์˜ ์ƒํ™œํŒจ

ํ„ด ๋ณ€ํ™”๋Š” ์Šค๋งˆํŠธ ๋ผ์ดํ”„(smart life) ์‹œ ์˜ ๋ณธ๊ฒฉ

์ ์ธ ์ถœํ˜„์„ ๊ฐ€์‹œํ™”์‹œํ‚ฌ ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ๋‹ค. ๋‹จ๊ธฐ์ 

์œผ๋กœ๋Š” ์›๊ฒฉํ˜‘์—…, ์Šค๋งˆํŠธ์›Œํฌ, ํ™ˆ์„œ๋น„์Šค ๋“ฑ ๋ชจ๋“  ๊ฒƒ

์ด ์†์‰ฝ๊ฒŒ ๊ฐ€๋Šฅํ•œ ์Šค๋งˆํŠธ ๋ผ์ดํ”„๋ฅผ ์›ํ•˜๋Š” ์ด์šฉ์ž

์˜ ์ˆ˜์š”๊ฐ€ ์ฆ๊ฐ€ํ•˜์—ฌ ์Šค๋งˆํŠธ ์‚ฐ์—…์ด ํ™•์‚ฐ๋˜๊ณ , ์ค‘์žฅ

๊ธฐ์ ์œผ๋กœ๋Š” ๋ฒ”๊ตญ๊ฐ€ ์Šค๋งˆํŠธํ™”, ๋กœ๋ฒŒ ์Šค๋งˆํŠธํ™” ๋“ฑ

์œผ๋กœ ๊ฒฝ์ œ ๋ฐ ์‚ฌํšŒ ์ง„ํ™”๊ฐ€ ์ด‰์ง„๋  ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ๋‹ค.

๋ณธ ์—ฐ๊ตฌ์˜ ๋‘ ๋ฒˆ์งธ ๋‹จ๊ณ„๋กœ ํ•œ๊ตญ์‚ฌํšŒ์˜ ๋ฉ”ํƒ€ํŠธ๋ Œ

ํ•œ๊ตญ์‚ฌํšŒ ๋ณ€ํ™”์™€ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท ์ •์ฑ…์— ํ•œ ํƒ์ƒ‰์  ์—ฐ๊ตฌ

Internet and Information Security 97

Page 99: nternet I Security - BIGBOOK

๋“œ๋ฅผ ๊ทผ๊ฐ„์œผ๋กœ 2020๋…„ ์‚ฌํšŒ ๋ณ€ํ™”์— ๋”ฐ๋ฅธ IT ๋ฏธ๋ž˜

์ „๋ง์„ ๋„์ถœํ•˜ ๋‹ค. ์ „๋ฌธ๊ฐ€ ๋ธํŒŒ์ด๋ฅผ ํ™œ์šฉํ•˜์—ฌ ํ•œ

๊ตญ์‚ฌํšŒ ๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ๊ฐ€ ์ฃผ์–ด์กŒ์„ ๋•Œ IT ๋ฏธ๋ž˜ ์ „๋ง๊ณผ

๊ด€๋ จ๋œ ๋‹ค์–‘ํ•œ ๋ณ€์ˆ˜๋“ค์„ ๋‚˜์—ดํ•˜๊ณ , ์ด๋Ÿฌํ•œ ๋ณ€์ˆ˜๋“ค

์˜ ์ค‘์š”์„ฑ๊ณผ ๋ฐœ์ƒ ๊ฐ€๋Šฅ์„ฑ์„ ์กฐ์‚ฌํ•˜์—ฌ ๊ฐ€์žฅ ํƒ€๋‹นํ•œ

์‹œ๋‚˜๋ฆฌ์˜ค๋ฅผ ์„ ํƒํ•˜ ๋‹ค. ๋„์ถœ๋œ ๋ฏธ๋ž˜ ์ „๋ง์€ ๊ฒฝ

์ œโˆ™์‚ฐ์—…, ์‚ฌํšŒโˆ™๋ฌธํ™”, ์ •์น˜โˆ™๊ณต๊ณต ๋ถ„์•ผ์˜ 3๊ฐ€์ง€

๋ถ„๋ฅ˜์— ๋”ฐ๋ผ ์ •๋ฆฌํ•˜ ๋‹ค. ์•ž์—์„œ ์‚ดํŽด๋ณธ ํ•œ๊ตญ์‚ฌํšŒ

๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ์™€ ๋งˆ์ฐฌ๊ฐ€์ง€๋กœ ํŠธ๋ Œ๋“œ๋ณ„ ์‹œ๊ธฐ์™€ ํŒŒ๊ธ‰

ํšจ๊ณผ๋Š” ๊ฐ๊ฐ ๋‹ค๋ฅด๋ฉฐ, ์„œ๋กœ ๊ฐ„ ์ƒํ˜ธ์˜์กด ๊ด€๊ณ„์— ์žˆ

๋Š” ํŠธ๋ Œ๋“œ๋„ ์กด์žฌํ•œ๋‹ค. ๋„์ถœ๋œ ํ•œ๊ตญ์‚ฌํšŒ ๋ณ€ํ™”์— ๋”ฐ

๋ฅธ IT ๋ฏธ๋ž˜ ์ „๋ง์€ <ํ‘œ 2>์™€ ๊ฐ™๋‹ค.

1. ๊ฒฝ์ œโˆ™์‚ฐ์—… ๋ถ„์•ผ

1) ๋ชจ๋ฐ”์ผ ์—์ฝ”์‹œ์Šคํ…œ์˜ ํ™•์‚ฐ

๋ฏธ๋ž˜์—๋Š” ์ฝ˜ํ…์ธ  ์ƒ์‚ฐโˆ™์œ ํ†ต๋ฐฉ์‹์„ ํš๊ธฐ์ ์œผ๋กœ

๊ฐœ์„ ์‹œํ‚จ ์•ฑ์Šคํ† ์–ด์˜ ๋“ฑ์žฅ์œผ๋กœ ์Šค๋งˆํŠธ ๋‹จ๋ง ๊ธฐ๋ฐ˜

๋ชจ๋ฐ”์ผ ์—์ฝ”์‹œ์Šคํ…œ์ด ๊ธ‰์†ํ•˜๊ฒŒ ์„ฑ์žฅํ•  ๊ฒƒ์œผ๋กœ ์ „๋ง

๋œ๋‹ค. ๊ธฐ์กด ์ด๋™ํ†ต์‹ ์‚ฌ ์ค‘์‹ฌ์˜ ํ์‡„ํ˜• ๊ตฌ์กฐ์—์„œ ์ฝ˜

ํ…์ธ -ํ”Œ๋žซํผ-๋‹จ๋ง์„ ์•„์šฐ๋ฅด๋Š” ๊ฐœ๋ฐฉํ˜• ๊ตฌ์กฐ๋กœ ๋ชจ

๋ฐ”์ผ ์—์ฝ”์‹œ์Šคํ…œ ํ™˜๊ฒฝ์˜ ๋ณ€ํ™”๊ฐ€ ๊ฐ€์†ํ™”๋  ๊ฒƒ์ด๋‹ค.

๋ชจ๋ฐ”์ผ ์—์ฝ”์‹œ์Šคํ…œ์€ ๋ชจ๋ฐ”์ผ ํ”Œ๋žซํผ, ๋ชจ๋ฐ”์ผ ๋งˆ

์ผ“, ๋ชจ๋ฐ”์ผ ์•ฑ์„ ์ค‘์‹ฌ์œผ๋กœ ๋ชจ๋ฐ”์ผ์„ ๋„˜์–ด์„œ ๋‹ค์–‘ํ•œ

์‚ฐ์—…๊ณผ ์œตํ•ฉํ•˜๋ฉฐ ๊ธ‰์†ํžˆ ํ™•์‚ฐ๋  ๊ฒƒ์œผ๋กœ ์˜ˆ์ธก๋œ๋‹ค.

IT ์‚ฐ์—…์€ 2005๋…„ ์ดํ›„ ํ•œ ์ž๋ฆฟ์ˆ˜ ์„ฑ์žฅ์— ๊ทธ์น˜๋ฉฐ

ํ•œ๊ณ„์— ๋ด‰์ฐฉํ–ˆ๋‹ค๋Š” ํ‰๊ฐ€๋ฅผ ๋ฐ›๊ณ  ์žˆ๋Š” ๊ฐ€์šด๋ฐ, ๋ชจ๋ฐ”

์ผ ์—์ฝ”์‹œ์Šคํ…œ์€ ์ „ํ†ต ์‚ฐ์—…๊ณผ ์œตํ•ฉํ•œ ์„œ๋น„์Šค ์ œ๊ณต

์„ ํ†ตํ•˜์—ฌ ์ƒˆ๋กœ์šด ๊ฒฝ์ œ๋ฐœ์ „์˜ ๋™๋ ฅ์ด ๋  ๊ฐ€๋Šฅ์„ฑ์ด

๋†’๋‹ค.

2) โ€˜Green by ICTโ€™์˜ ์—ญํ•  ์ฆ

๋ฐฉ์†กํ†ต์‹ ์˜ ์ง€์†๊ฐ€๋Šฅ ์„ฑ์žฅ, ํŠนํžˆ ๋…น์ƒ‰ ์„ฑ์žฅ์—

ํ•œ ๊ธฐ์—ฌ๋Š”โ€˜Green of ICTโ€™์™€โ€˜Green by ICTโ€™์ธก

๋ฉด์—์„œ ์˜ˆ์ธกํ•  ์ˆ˜ ์žˆ๋‹ค. โ€˜Green of ICTโ€™์ธก๋ฉด์—์„œ

๋Š” ๊ทธ๋ฆฐ ๋„คํŠธ์›Œํฌ ๊ตฌ์ถ•, ์Šค๋งˆํŠธ ๊ทธ๋ฆฌ๋“œ ์ƒํ˜ธ์—ฐ๋™

์ œ ๊ถŒ ์ œ ํ˜ธ

98 ๋…„ ์›”

<ํ‘œ 2> ํ•œ๊ตญ์‚ฌํšŒ ๋ณ€ํ™”์— ๋”ฐ๋ฅธ IT ๋ฏธ๋ž˜ ์ „๋ง

๋ถ„ ๋ฅ˜ ์†Œ๋ถ„๋ฅ˜ IT ๋ฏธ๋ž˜์ „๋ง

๊ฒฝ์ œโˆ™์‚ฐ์—…๋ถ„์•ผ

๋ฌด ์„  1. ๋ชจ๋ฐ”์ผ์—์ฝ”์‹œ์Šคํ…œ์˜ํ™•์‚ฐ

์„ฑ ์žฅ 2. โ€˜Green by ICTโ€™์˜์—ญํ• ์ฆ

๋„ ์‹œ 3. ICT ๊ธฐ๋ฐ˜ ๋กœ๋ฒŒ๋„์‹œ๊ฒฝ์Ÿ๋ ฅ๊ฐ•ํ™”

์œต ํ•ฉ 4. ์ง€๋Šฅํ˜•ๆ–ฐ์„œ๋น„์Šค์œตํ•ฉ๊ฐ€์†ํ™”

๊ณ  ์šฉ 5. ์œตํ•ฉ์„ํ†ตํ•œ๊ณ ์šฉ์—†๋Š”์„ฑ์žฅ๊ทน๋ณต

์‚ฌํšŒโˆ™๋ฌธํ™”๋ถ„์•ผ

๋งค ์ฒด 6. ์†Œ์…œ๋ฏธ๋””์–ด์˜์‚ฌํšŒ์  ํ–ฅ๋ ฅํ™•

๊ทผ ๋ฌด 7. ์Šค๋งˆํŠธ์›Œํฌ์˜๋ณดํŽธํ™”

๊ฒฉ ์ฐจ 8. ๋””์ง€ํ„ธ์†Œ์™ธ๊ณ„์ธต์˜์‚ฌํšŒ๋ฌธ์ œ์‹ฌํ™”

์•ˆ ์ „ 9. ์‚ฌํšŒ์•ˆ์ „๋ฐ์ •๋ณด๋ณดํ˜ธ์ˆ˜์š”์ฆ

๊ต ์œก 10. ๋„คํŠธ์›Œํฌ๊ธฐ๋ฐ˜๊ฐœ๋ฐฉํ˜•๊ต์œกํ™•์‚ฐ

์˜ ๋ฃŒ 11. ์ด์šฉ์ž์ค‘์‹ฌ์˜u-Healthcare ํ™•์‚ฐ

์ •์น˜โˆ™๊ณต๊ณต๋ถ„์•ผ

์ • ๋ถ€ 12. ์Šค๋งˆํŠธ์ •๋ถ€๊ธฐ๋ฐ˜์—…๋ฌดํšจ์œจ์„ฑ๊ฐ•ํ™”

์ฐธ ์—ฌ 13. ๊ด€์—ฌ์ ์‹œ๋ฏผ(engaging citizen)์˜์ •์ฑ…์ฐธ์—ฌ์ฆ

์‹  ๋ขฐ 14. ํˆฌ๋ช…์„ฑ๊ณผ์‚ฌํšŒ์‹ ๋ขฐ์ฆ์ง„์š”๊ตฌํ™•์‚ฐ

Page 100: nternet I Security - BIGBOOK

๋“ฑ์„ ํ†ตํ•œ ICT ํ™˜๊ฒฝ์˜ ์นœํ™˜๊ฒฝํ™”๋กœ ๋…น์ƒ‰ ์„ฑ์žฅ์—

ํ•œ ๊ธฐ์—ฌ๋„๊ฐ€ ์ฆ์ง„๋  ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ๋‹ค.

ํŠนํžˆ, โ€˜Green by ICTโ€™์ธก๋ฉด์—์„œ์˜ ์—ญํ• ์€ ๋”์šฑ

ํฌ๊ฒŒ ์ฆ๊ฐ€ํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ์ธก๋œ๋‹ค. ์›๊ฒฉ์˜๋ฃŒ, ์‚ฌ๋ฌผํ†ต์‹ 

๋“ฑ ๊ทธ๋ฆฐ ICT ์„œ๋น„์Šค์˜ ํ™•์‚ฐ์œผ๋กœ ์˜จ์‹ค๊ฐ€์Šค ๊ฐ์ถ•,

์—๋„ˆ์ง€ ์ ˆ๊ฐ ๋ฐ ํšจ์œจํ™”๊ฐ€ ๊ธ‰์ง„์ „ํ•  ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ

๋‹ค. ์ „ ์„ธ๊ณ„ ๊ทธ๋ฆฐ ICT ์‹œ์žฅ ๊ทœ๋ชจ๋Š” 2008๋…„ ์•ฝ 5์–ต

๋‹ฌ๋Ÿฌ์—์„œ ์—ฐํ‰๊ท  60% ์ด์ƒ ์„ฑ์žฅํ•˜์—ฌ 2013๋…„์—๋Š”

์•ฝ 48์–ต ๋‹ฌ๋Ÿฌ์— ์ด๋ฅผ ๊ฒƒ์œผ๋กœ ์ „๋ง๋˜๊ณ  ์žˆ๋‹ค

(Schadler, 2009). ์—๋„ˆ์ง€ ์ ˆ๊ฐ์„ ์œ„ํ•œ ๊ทธ๋ฆฐ ICT

์„œ๋น„์Šค์˜ ๊ฒฝ์šฐ์—๋„ ๋…น์ƒ‰ ์ธ์ฆ์ œ๋„, ์›๊ฒฉ์˜๋ฃŒ, ์›๊ฒฉ

๊ต์œก, ์‚ฌ๋ฌผํ†ต์‹  ๋“ฑ์˜ ์„œ๋น„์Šค์™€ ์Šค๋งˆํŠธ ๊ทธ๋ฆฌ๋“œ ๊ตฌ์ถ•

์„ ํ†ตํ•ด ์˜จ์‹ค๊ฐ€์Šค ๊ฐ์ถ• ๋ฐ ์—๋„ˆ์ง€ ํšจ์œจ ๊ทน ํ™”์—

๊ธฐ์—ฌํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋œ๋‹ค.

3) ICT ๊ธฐ๋ฐ˜ ๋กœ๋ฒŒ ๋„์‹œ๊ฒฝ์Ÿ๋ ฅ ๊ฐ•ํ™”

์•ž์œผ๋กœ ๋„์‹œํ™˜๊ฒฝ ์ฐจ์›์—์„œ ์ง€๊ตฌ์˜จ๋‚œํ™”, ์ €์ถœ

์‚ฐโˆ™๊ณ ๋ นํ™” ๋“ฑ์œผ๋กœ ๋„์‹œํ™˜๊ฒฝ ๋ฐ ์ƒํ™œ์•ˆ์ „์— ๊ด€ํ•œ

์‹œ๋ฏผ๋“ค์˜ ์š”๊ตฌ๋Š” ์ง€์†์ ์œผ๋กœ ์ฆ๊ฐ€ํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ์ธก

๋œ๋‹ค. ์ด๋Ÿฌํ•œ ์š”๊ตฌ์— ๋ถ€์‘ํ•˜์—ฌ ICT๋ฅผ ์ด์šฉํ•œ ์‹œ๋ฏผ

์„œ๋น„์Šค ๊ฐœ์„ ๊ณผ ์ด๋ฅผ ํ†ตํ•œ ์ฐฝ์กฐ์ ์ธ ์ธ์žฌ ์œ ์ž…์œผ๋กœ

๋ฐœ์ „์„ ๋„๋ชจํ•˜๋ ค๋Š” ์ฃผ์š” ๋„์‹œ๋“ค์˜ ๊ฒฝ์Ÿ์ด ์‹ฌํ™”๋ 

์ „๋ง์ด๋‹ค. ๊ธฐ์—… ์ฐจ์›์—์„œ๋Š” IBM์ด ์ „ ์„ธ๊ณ„ 100์—ฌ

๊ฐœ ๋„์‹œ์— 5,000๋งŒ ๋‹ฌ๋Ÿฌ๋ฅผ ํˆฌ์žํ•ด ๊ตํ†ต, ์•ˆ์ „, ์—

๋„ˆ์ง€ ๋“ฑ์˜ ์ด์Šˆ๋ฅผ ํ•ด๊ฒฐํ•˜๋Š” ์ง€๋Šฅํ˜• ๋„์‹œ๊ตฌ์ถ• ์ง€์›

ํ”„๋กœ๊ทธ๋žจ์ธโ€˜Smarter Cities Challengeโ€™๋ฅผ ์ถ”์ง„

ํ•˜๊ณ  ์žˆ๋Š” ๊ฒƒ์ด ํ‘œ์ ์ธ ์‚ฌ๋ก€์ด๋‹ค.8)

๋„์‹œํ–‰์ • ์ฐจ์›์—์„œ๋Š” ์‹œ์„ค ๋ฐ ์—๋„ˆ์ง€ ๊ฐ์‹œโˆ™์ œ

์–ด, ๊ฐœ๋ฐฉํ˜• ํ˜‘๋ ฅโˆ™๊ณต์œ , ์‹ค์‹œ๊ฐ„ ์˜์‚ฌ๊ฒฐ์ • ๋“ฑ์ด ๋„

์‹œ๊ฒฝ์Ÿ๋ ฅ์˜ ์›์ฒœ์œผ๋กœ ๋‘๋˜๋ฉด์„œ ICT์˜ ์—ญํ• ์ด

์ฆ ๋  ์ „๋ง์ด๋‹ค. ์—๋„ˆ์ง€ ์†Œ๋น„ํ˜•์—์„œ ์ƒ์‚ฐํ˜• ๋„์‹œ

๋กœ, ๊ณ ์ •ํ˜•โˆ™์ง‘์ค‘ํ˜•์—์„œ ํ˜„์žฅํ˜•โˆ™์ฐธ์—ฌํ˜• ๋„์‹œํ–‰

์ •์œผ๋กœ, ๋ฒˆ์žกํ•œ ๋„์‹œ์—์„œ ์พŒ์ ํ•œ ๋„์‹œ๋กœ์˜ ๋ณ€ํ™”๊ฐ€

์ด‰์ง„๋  ๊ฒƒ์ด๋‹ค. ์ผ๋ก€๋กœ ์œ ๋Ÿฝ๋ฏธ๋ž˜์ธํ„ฐ๋„ท์ด๋‹ˆ์…”ํ‹ฐ

๋ธŒ๊ฐ€ ICT ๊ธฐ์ˆ ์„ ํ†ตํ•œ ํ™˜๊ฒฝโˆ™ํ๊ธฐ๋ฌผ ๊ด€๋ฆฌ, ๊ฐ€๋กœ

๋“ฑโˆ™์ˆ˜๋„โˆ™๊ฐ€์Šค ์ธํ”„๋ผ ๊ด€๋ฆฌโˆ™ํ†ต์ œ, ์—๋„ˆ์ง€ ์ค‘

๋ฆฝโˆ™์ƒ์‚ฐํ˜• ๊ฑฐ๋ฆฌ ๋“ฑ์„ ์œ„ํ•œ ์—ฐ๊ตฌ๊ฐœ๋ฐœ์„ ์ œ์•ˆ ๋ฐ

์ถ”์ง„ํ•˜๊ณ  ์žˆ๋‹ค(EFII, 2010)๋Š” ์  ๋“ฑ์ด ์ด๋ฅผ ๋’ท๋ฐ›

์นจํ•˜๊ณ  ์žˆ๋‹ค.

4) ์ง€๋Šฅํ˜• ์‹ ์„œ๋น„์Šค ์œตํ•ฉ ๊ฐ€์†ํ™”

IPTV, m-VoIP, MPS(Multiple Play Service)

๋“ฑ ์œตํ•ฉ ์„œ๋น„์Šค ํ™•์‚ฐ์ด ์ง€์†๋  ๊ฒƒ์ด๋ฉฐ, ์ƒํ™ฉโˆ™์œ„์น˜

์ •๋ณด ๊ธฐ๋ฐ˜์˜ ์ง€๋Šฅํ˜• ์„œ๋น„์Šค ์ถœํ˜„์ด ๊ฐ€์†ํ™”๋  ๊ฒƒ์ด

๋‹ค. ๊ณต๊ฐ„์— ๊ตฌ์• ๋ฐ›์ง€ ์•Š๊ณ  ์‚ฌ๋žŒ๊ณผ ์‚ฌ๋žŒ, ์‚ฌ๋žŒ๊ณผ ์‚ฌ

๋ฌผ, ์‚ฌ๋ฌผ๊ณผ ์‚ฌ๋ฌผ์ด ์„œ๋กœ ์ƒํ˜ธ ์—ฐ๊ฒฐ๋˜์–ด ์ง€๋Šฅ์ •๋ณด๋ฅผ

์ „๋‹ฌํ•˜๋Š” ์‚ฌ๋ฌผ์ง€๋Šฅํ†ต์‹ ์— ํ•œ ๊ด€์‹ฌ๊ณผ ํˆฌ์ž๊ฐ€ ํ™•

๋  ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ๋‹ค. 3์ฐจ ์‚ฐ์—…๊ณผ ๋‹ค์–‘ํ•œ ์ „ํ†ต ์‚ฐ

์—… ๋ถ„์•ผ์— ์Šค๋งˆํŠธ IT๊ฐ€ ์ ‘๋ชฉ๋˜์–ด ์‹  ๋ถ€๊ฐ€๊ฐ€์น˜๋ฅผ ์ฐฝ

์ถœํ•˜๋Š” ์œตํ•ฉ ์‹ ์‚ฐ์—…์ด ๋˜ํ•œ ํ™œ์„ฑํ™”๋  ๊ฒƒ์ด๋‹ค. ํ–‰

์ •, ๊ต์œก, ๋ณด๊ฑด์˜๋ฃŒ, ๊ตํ†ต, ๋ฌผ๋ฅ˜โˆ™์œ ํ†ต ๋“ฑ 3์ฐจ ์‚ฐ์—…

๋ถ„์•ผ์™€ ์ƒ์‚ฐโˆ™ํŒ๋งค ๊ด€๋ฆฌ ๋“ฑ 1, 2์ฐจ ์‚ฐ์—… ๋ถ„์•ผ์˜ ์—…

๋ฌด ํ˜•ํƒœ๊ฐ€ ICT ๊ธฐ๋ฐ˜์œผ๋กœ ๊ธ‰๋ณ€ํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ์ธก๋œ๋‹ค.

๊ธฐ์ˆ  ์ธก๋ฉด์—์„œ๋Š” IT, BT, NT, CT ๋“ฑ ๋‹ค์–‘ํ•œ ๊ธฐ

์ˆ ์˜ ์ƒํ˜ธ์ž‘์šฉ์œผ๋กœ ์ ์ธ ๊ธฐ์ˆ ์œตํ•ฉ๊ณผ ์ด๋ฅผ ๊ธฐ

๋ฐ˜์œผ๋กœ ํ•œ ์ƒˆ๋กœ์šด ํ˜์‹ ๊ธฐ์ˆ ์˜ ์ถœํ˜„์ด ์˜ˆ์ƒ๋œ๋‹ค. ์œ 

๋Ÿฝ์—ฐํ•ฉ(EU)์˜ FP7(7th Framework Programme)

์—์„œ๋Š” ์ •๋ณด ๊ธฐ์ˆ , ๋‚˜๋…ธ ๊ธฐ์ˆ , ์—๋„ˆ์ง€ ๊ธฐ์ˆ , ํ™˜๊ฒฝ

๊ธฐ์ˆ , ์ฐจ๋Ÿ‰ ๊ธฐ์ˆ  ๋“ฑ์„ ์œตํ•ฉํ•œ ํ˜์‹ ์ ์ธ ์‚ฐ์—… ๋ชจ๋ธ

๋ฐœ๊ตด์„ ์œ„ํ•œ ๋ฏผ๊ด€ํ˜‘๋ ฅํ”„๋กœ๊ทธ๋žจ(PPP: Private-

Public Partnership)์„ ์ง€์†์ ์œผ๋กœ ์ถ”์ง„ํ•˜๊ณ  ์žˆ

๋‹ค(European Commission, 2009).

5) ์œตํ•ฉ์„ ํ†ตํ•œ ๊ณ ์šฉ ์—†๋Š” ์„ฑ์žฅ ๊ทน๋ณต

2008๋…„ ๊ธˆ์œต์œ„๊ธฐ ์ดํ›„ ๊ณ ์šฉ ์—†๋Š” ์„ฑ์žฅ์ด ๊ฐ€์†ํ™”

๋˜์–ด ์ „ ์„ธ๊ณ„์ ์ธ ๊ณ ์šฉ ๋ถˆ์•ˆ ๋ฐ ์‹ค์—… ๋ฌธ์ œ๊ฐ€ ํ•ต์‹ฌ

ํ•œ๊ตญ์‚ฌํšŒ ๋ณ€ํ™”์™€ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท ์ •์ฑ…์— ํ•œ ํƒ์ƒ‰์  ์—ฐ๊ตฌ

Internet and Information Security 99

8) IBM Smarter Cities Challenge, https://smartercitieschallenge.org

Page 101: nternet I Security - BIGBOOK

์ ์ธ ์‚ฌํšŒ ์ด์Šˆ๋กœ ๋‘๋˜๊ณ  ์žˆ๋‹ค. ๊ฒฝ์ œ์„ฑ์žฅ๋ฅ  ๋น„

์ทจ์—…์ž์ฆ๊ฐ€์œจ์˜ ๋น„์œจ์ธ ๊ณ ์šฉํƒ„์„ฑ์น˜์˜ ๊ฒฝ์šฐ 2005

๋…„ 2/4๋ถ„๊ธฐ 0.50์—์„œ 2008๋…„ 3/4๋ถ„๊ธฐ์— 0.19๋กœ

ํ•˜๋ฝํ•˜์—ฌโ€˜๊ณ ์šฉ ์—†๋Š” ์„ฑ์žฅโ€™ํ˜„์ƒ์„ ์ง€์†ํ•œ ๋ฐ” ์žˆ๋‹ค

(ํ˜„ ๊ฒฝ์ œ์—ฐ๊ตฌ์›, 2009). ์ด์™€ ๊ด€๋ จํ•˜์—ฌ IT ์‚ฐ์—…

์ž์ฒด์˜ ๊ณ ์šฉ์ฐฝ์ถœ ๋Šฅ๋ ฅ์ด ํ•œ๊ณ„์— ๋‹ฌํ–ˆ๋‹ค๋Š” ์ง€์ ๋„

๋‘๋˜๊ณ  ์žˆ๋‹ค.

๊ทธ๋Ÿฌ๋‚˜ ๊ต์œก, ์˜๋ฃŒ ๋“ฑ ์ „ํ†ต ์‚ฐ์—…์— IT ๊ธฐ์ˆ ์„ ์ ‘

๋ชฉํ•œ ์œตํ•ฉ ์‚ฐ์—…์˜ ํ™• ๋กœ IT๋ฅผ ํ†ตํ•œ ์‹ ๊ทœ ๊ณ ์šฉ์ฐฝ์ถœ

๊ธฐํšŒ๊ฐ€ ๋‹ค์‹œ ๋„๋ž˜ํ•  ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ๋‹ค. IT ๊ธฐ์ˆ ์„

์ ‘๋ชฉํ•œ ์œตํ•ฉ ์„œ๋น„์Šค ํ™• ๋Š” ๋‹ค์–‘ํ•œ ์‚ฐ์—… ๋ถ„์•ผ์˜ ์ƒ

์‚ฐ์„ฑ ์ œ๊ณ  ๋ฐ ์‹ ๊ทœ ๋น„์ฆˆ๋‹ˆ์Šค ๋ชจ๋ธ์˜ ์ฐฝ์ถœ์„ ํ†ตํ•ด

ํ•ด๋‹น ์‚ฐ์—…์˜ ์„ฑ์žฅ๊ณผ ๊ณ ์šฉ ํ™• ๋ฅผ ์œ ๋„ํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ

์ธก๋œ๋‹ค. ๋ฏธ๊ตญ์˜ ๊ฒฝ์šฐ ์˜ค๋ฐ”๋งˆ ํ†ต๋ น์˜ IT ์ž๋ฌธ ์‹ฑ

ํฌํƒฑํฌ์ธ ITIF๋Š” 2009๋…„ 1์›”โ€˜๊ฒฝ์ œํšŒ๋ณต์„ ์œ„ํ•œ ๋””

์ง€ํ„ธ ๋กœ๋“œ(The Digital Road to Recovery)โ€™๋ผ๋Š”

๋ณด๊ณ ์„œ์—โ€œIT ํˆฌ์ž๋Š” ์งโˆ™๊ฐ„์ ‘์  ์ผ์ž๋ฆฌ ์ฐฝ์ถœ๋ฟ๋งŒ

์•„๋‹ˆ๋ผ ๋„คํŠธ์›Œํฌ ํšจ๊ณผ๋ฅผ ํ†ตํ•œ ์–‘์งˆ์˜ ๊ทœ๋ชจ ์ผ์ž

๋ฆฌ ์ฐฝ์ถœ์ด ๊ฐ€๋Šฅํ•˜๋‹คโ€๊ณ  ์ ์‹œํ•˜ ๋‹ค(Atkinson et

al., 2009).

2. ์‚ฌํšŒโˆ™๋ฌธํ™” ๋ถ„์•ผ

1) ์†Œ์…œ๋ฏธ๋””์–ด์˜ ์‚ฌํšŒ์  ํ–ฅ๋ ฅ ํ™•

๋ฏธ๋ž˜์—๋Š” ์†Œ์…œ๋ฏธ๋””์–ด๋ฅผ ํ†ตํ•œ ์ •๋ณด ๊ณต์œ โˆ™๊ฐœ๋ฐฉโˆ™

์—ฐ๊ฒฐ๋กœ ์ •๋ณด๊ฐ€์น˜ ์ฆ ์™€ ์ •๋ณด์— ๊ด€ํ•œ ์ •๋ณด(meta-

information)์˜ ์ƒ์„ฑ ๋ฐ ์œ ํ†ต์ด ๊ฐ€์†ํ™”๋  ๊ฒƒ์œผ๋กœ

์ „๋ง๋œ๋‹ค. ์†Œ์…œ๋ฏธ๋””์–ด์˜ ์ง€์†์ ์ธ ์ง„ํ™”๋กœ ๋ฏธ๋ž˜ ์‚ฌ

ํšŒ๊ด€๊ณ„์˜ ํ•ต์‹ฌ๊ฐ€์น˜์˜ ๋ณ€ํ™”, ์ƒˆ๋กœ์šด ๊ด€๊ณ„ํ˜•์„ฑ ๊ฐ€๋Šฅ

์„ฑ์˜ ์ฆ ๋“ฑ์œผ๋กœ ์‚ฌํšŒ๊ด€๊ณ„ ๊ตฌ์กฐ์— ๋‹ค์–‘ํ•œ ๋ณ€ํ™”๊ฐ€

๋‚˜ํƒ€๋‚  ๊ฒƒ์ด๋‹ค. ์ง‘์ค‘ํ˜•โˆ™ํ†ต์ œํ˜• ๋ฏธ๋””์–ด์—์„œ ๋ถ„์‚ฐ

ํ˜•โˆ™์ฐธ์—ฌํ˜• ๋ฏธ๋””์–ด๋กœ์˜ ๋ณ€ํ™”๋กœ ์ธํ•ด ํŽธ์˜์„ฑ, ์œ ์—ฐ

์„ฑ, ์ž์œ ๋„ ๋“ฑ์ด ํ–ฅ์ƒ๋˜์–ด ์‚ฌํšŒ์  ์†Œํ†ต์ด ํ™• ๋ 

๊ฒƒ์ด๋‹ค.

๋˜ํ•œ ์†Œ์…œ์ปค๋จธ์Šค ํ™•์‚ฐ, ์ „๋ฌธ ์†Œ์…œ๋ฏธ๋””์–ด ๋“ฑ์žฅ,

๊ณต๊ณต์ •๋ณด ๊ณต์œ  ํ™• ๋“ฑ ์†Œ์…œ๋ฏธ๋””์–ด์˜ ์ง„ํ™”์— ๋”ฐ๋ฅธ

์‚ฌํšŒ์  ํŒŒ๊ธ‰ ํšจ๊ณผ๊ฐ€ ํฌ๊ฒŒ ์ฆ ๋  ๊ฒƒ์ด๋‹ค. ๊ฐœ์ธ์˜

์‚ฌํšŒํ™œ๋™ ์ฐธ์—ฌ ๊ธฐํšŒ ํ™• , ๊ธฐ์—…์˜ ๋งˆ์ผ€ํŒ… ๋ฐฉ์‹ ๋ณ€

ํ™”, ๊ณต๊ณต ๋ถ„์•ผ์—์„œ์˜ ์ •์น˜โˆ™๋ฌธํ™” ๋ฐœ์ „์— ํ•œ ๊ธฐ์—ฌ

ํ™• ๋“ฑ์œผ๋กœ ์†Œ์…œ๋ฏธ๋””์–ด์˜ ํ–ฅ๋ ฅ์ด ๊ธ‰์†ํžˆ ํ™•

๋  ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ๋‹ค. 2008๋…„ ๋ฏธ๊ตญ ์„  ์ดํ›„ ์ฃผ์š”

๊ตญ๊ฐ€๋“ค์˜ ์„ ๊ฑฐ์—์„œ ํŽ˜์ด์Šค๋ถ, ํŠธ์œ„ํ„ฐ ๋“ฑ์˜ ์†Œ์…œ๋ฏธ

๋””์–ด๊ฐ€ ์„ ๊ฑฐ ์•„์  ๋‹ค, ์—ฌ๋ก  ํ˜•์„ฑ, ์„ ๊ฑฐ๊ฒฐ๊ณผ์— ํฐ

ํ–ฅ์„ ๋ฏธ์น˜๋Š” ํ˜„์ƒ์€ ์†Œ์…œ๋ฏธ๋””์–ด์˜ ์‚ฌํšŒ์  ํ–ฅ๋ ฅ

ํ™• ์˜ ํ‘œ์  ์‚ฌ๋ก€์ด๋ฉฐ, ์ด๋Ÿฌํ•œ ์ถ”์„ธ๋Š” ์•ž์œผ๋กœ ๋ณด

๋‹ค ํ™• ๋  ๊ฒƒ์œผ๋กœ ์˜ˆ์ธก๋œ๋‹ค(์ด์›ํƒœ, 2010).

2) ์Šค๋งˆํŠธ์›Œํฌ์˜ ๋ณดํŽธํ™”

๋ฏธ๋ž˜์—๋Š” ๊ฐœ์ธ์˜ ์‚ถ๊ณผ ์ผ์˜ ๊ท ํ˜•, ๊ธฐ์—…์˜ ์ˆ˜์ต์„ฑ

์ œ๊ณ , ๊ณต๊ณต์˜ ์ €์ถœ์‚ฐโˆ™๊ณ ๋ นํ™” ๋“ฑ ์‚ฌํšŒ ์ด์Šˆ ํ•ด๊ฒฐ์„

์œ„ํ•œ ์—…๋ฌด๋ฐฉ์‹์— ํ•œ ๋ณ€ํ™”์˜ ์š”๊ตฌ๊ฐ€ ํฌ๊ฒŒ ์ฆ ๋ 

๊ฒƒ์ด๋‹ค. ๊ธฐ์กด ์ง์žฅ ์ค‘์‹ฌ์˜ ๊ทผ๋กœ๊ด€์ด ๊ฐœ์ธ์ƒํ™œ๊ณผ ์‚ถ

์˜ ์งˆ์„ ์ค‘์‹œํ•˜๋Š” ๊ฒฝํ–ฅ(WLB: Work-Life Balance)

์œผ๋กœ ๋ณ€ํ™”ํ•  ๊ฒƒ์ด๋‹ค. ์ด์— ๋”ฐ๋ผ ๋น„์šฉ์ ˆ๊ฐ ๋ฐ ์ƒ์‚ฐ

์„ฑ ํ–ฅ์ƒ, ์—ฌ์„ฑ, ๊ณ ๋ น์ž ๋“ฑ์˜ ์ทจ์—… ์†Œ์™ธ๊ณ„์ธต์— ํ•œ

๋…ธ๋™๊ธฐํšŒ ์ œ๊ณต, ํƒ„์†Œ๋ฐฐ์ถœ ๊ฐ์†Œ ๋“ฑ์„ ์œ„ํ•œ ์Šค๋งˆํŠธ์›Œ

ํฌ์˜ ํ•„์š”์„ฑ์ด ํฌ๊ฒŒ ์ฆ๊ฐ€ํ•  ๊ฒƒ์ด๋‹ค.

์ด์— ๋”ฐ๋ผ ํด๋ผ์šฐ๋“œ, ํ…”๋ ˆํ”„๋ ˆ์ฆŒ์Šค(telepresence),

ํ†ตํ•ฉ์ปค๋ฎค๋‹ˆ์ผ€์ด์…˜ ๋“ฑ ์ฒจ๋‹จ ์Šค๋งˆํŠธ ICT๋ฅผ ํ™œ์šฉํ•œ

ํƒ„๋ ฅโˆ™์žฌํƒโˆ™์›๊ฒฉโˆ™์ด๋™ ๊ทผ๋ฌด๊ฐ€ ๋ณดํŽธํ™”๋  ๊ฒƒ์œผ๋กœ

์ „๋ง๋œ๋‹ค. ํ˜„์žฌ ์ฃผ์š” ์„ ๋„๊ตญ์„ ์ค‘์‹ฌ์œผ๋กœ ์Šค๋งˆํŠธ์›Œ

ํฌ๊ฐ€ ํ™•์‚ฐ ์ค‘์ด๋ฉฐ, ๊ตญ๋‚ด๋Š” ์ •๋ถ€โˆ™๊ณต๊ณต ๋ถ€๋ฌธ์ด ์Šค๋งˆ

ํŠธ์›Œํฌ ํ™œ์„ฑํ™”๋ฅผ ์„ ๋„ํ•  ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ๋‹ค. ๋ฏธ๊ตญ์˜

๊ฒฝ์šฐ 2008๋…„ ์žฌํƒ๊ทผ๋ฌด์ž ์ˆ˜๋Š” 3,400๋งŒ ๋ช… ์ˆ˜์ค€์ด

๋ฉฐ, 2016๋…„์—๋Š” ๋ฏธ๊ตญ ์ง์žฅ์ธ์˜ 43%์— ํ•ด๋‹นํ•˜๋Š”

6,300๋งŒ ๋ช…์ด ์žฌํƒ๊ทผ๋ฌด๋ฅผ ํ•  ๊ฒƒ์œผ๋กœ ์ „๋ง๋˜๊ณ  ์žˆ

๋‹ค(Schadler, 2009). ์šฐ๋ฆฌ๋‚˜๋ผ์˜ ๊ฒฝ์šฐ ๋ฐฉ์†กํ†ต์‹ ์œ„

์›ํšŒ๊ฐ€โ€˜์‚ถ๊ณผ ์ผ์˜ ๊ท ํ˜•์„ ํ†ตํ•œ ๋กœ๋ฒŒ ์Šค๋งˆํŠธ ๊ฐ•

๊ตญ ๊ตฌํ˜„โ€™์„ ์œ„ํ•ด 2015๋…„๊นŒ์ง€ ์ „์ฒด ๊ทผ๋กœ์ž์˜ 30%

๊นŒ์ง€ ์Šค๋งˆํŠธ์›Œํฌ๋ฅผ ๋„์ž…ํ•˜๋Š”โ€˜์Šค๋งˆํŠธ์›Œํฌ ํ™œ์„ฑํ™”

์ œ ๊ถŒ ์ œ ํ˜ธ

100 ๋…„ ์›”

Page 102: nternet I Security - BIGBOOK

์ถ”์ง„ ๊ณ„ํšโ€™์„ 2011๋…„ 1์›”์— ๋ฐœํ‘œํ•œ ๋ฐ” ์žˆ๋‹ค(๋ฐฉ์†กํ†ต

์‹ ์œ„์›ํšŒ, 2011a).

3) ๋””์ง€ํ„ธ ์†Œ์™ธ๊ณ„์ธต์˜ ์‚ฌํšŒ๋ฌธ์ œ ์‹ฌํ™”

๋ฏธ๋ž˜์—๋Š” ์ •๋ณด ํ™œ์šฉ ๋Šฅ๋ ฅ์ด ๊ฒฝ์Ÿ๋ ฅ์˜ ๊ฒฐ์ •์š”์†Œ

๋กœ ๋ถ€์ƒํ•˜์—ฌ ์ •๋ณดํ™” ๊ฒฉ์ฐจ๊ฐ€ ์†Œ๋“ ๊ฒฉ์ฐจ๋กœ ์ด์–ด์ง€๊ณ ,

์ด๋Š” ๋‹ค์‹œ ์ •๋ณดํ™” ๊ฒฉ์ฐจ๋ฅผ ์ฆํญ์‹œํ‚ค๋Š” ์•…์ˆœํ™˜์˜ ๊ณ 

๋ฆฌ๊ฐ€ ๋ฐœ์ƒํ•  ๊ฐ€๋Šฅ์„ฑ์ด ๋†’๋‹ค. ์ฆ‰, ๋””์ง€ํ„ธํ™”๋œ ๊ต

์œกโˆ™๋ฌธํ™”์œ ํ†ต ์ฒด๊ณ„์— ์˜ํ•ด ์ •๋ณด ๊ฒฉ์ฐจ๊ฐ€ ๊ต์œกโˆ™๋ฌธ

ํ™”โˆ™์—ฌ๊ฐ€ ํ™œ๋™ ๊ฒฉ์ฐจ๋กœ ํ™• ์žฌ์ƒ์‚ฐ๋˜๊ณ  ์†Œ๋“ ๊ฒฉ์ฐจ

๋ฅผ ์œ ๋ฐœํ•˜๋Š” ํ˜„์ƒ์ด ๋ฐœ์ƒํ•  ๊ฒƒ์ด๋‹ค. ๋˜ํ•œ ๊ธฐ์ˆ ๋ฐœ์ „

์†๋„์˜ ์ฆ๊ฐ€๋กœ ๊ณ ๋ น์ธต, ์ €์†Œ๋“์ธต, ๋†์–ด์ดŒ ๋“ฑ ์ •๋ณด

ํ™” ์†Œ์™ธ๊ณ„์ธต์˜ ๊ฒฉ์ฐจ ํ™• ๋ฐ ์‚ฌํšŒ์  ์†Œ์™ธ ๊ฐ€๋Šฅ์„ฑ์ด

ํฌ๊ฒŒ ์ฆ ๋  ๊ฒƒ์ด๋ฉฐ, ์ด์— ํ•œ ์ฑ…์ด ์ •๋ถ€ ์ •์ฑ…

์˜ ์ค‘์š”ํ•œ ๋ณ€์ˆ˜๋กœ ์ž๋ฆฌ ์žก์„ ๊ฒƒ์ด๋‹ค.

์ •๋ณดํ™” ๊ฒฉ์ฐจ ์ค‘ ํ–ฅํ›„ ์Šค๋งˆํŠธํฐ์˜ ๋ณด๊ธ‰โˆ™ํ™•์‚ฐ์—

๋”ฐ๋ผ ์ปดํ“จํ„ฐ์™€ ์ธํ„ฐ๋„ท๋ฟ๋งŒ ์•„๋‹ˆ๋ผ ๋ชจ๋ฐ”์ผ์„ ํ†ตํ•œ

์ •๋ณด ๊ฒฉ์ฐจ์˜ ํ™• ์— ํ•œ ์šฐ๋ ค๊ฐ€ ์ฆ ๋  ๊ฒƒ์ด๋ฉฐ,

์ด๋ฅผ ์Šค๋งˆํŠธ ๊ฒฉ์ฐจ๋ผ๊ณ  ํ‘œํ˜„ํ•  ์ˆ˜๋„ ์žˆ๋‹ค. ๋ชจ๋ฐ”์ผ

๋‹จ๋ง์€ ๊ฐœ์ธ ํŠน์„ฑ์ด ๊ฐ•ํ•˜์—ฌ ๊ธฐ์กด ์œ ์„  ์ธํ„ฐ๋„ท๊ณผ ์ ‘

๊ทผ์„ฑ์—์„œ ๊ทผ๋ณธ์ ์ธ ์ฐจ์ด๋ฅผ ๊ฐ€์ง€๊ธฐ ๋•Œ๋ฌธ์— ์Šค๋งˆํŠธ

ํฐ ํ™œ์šฉ ๊ฒฉ์ฐจ๋Š” ์•ž์œผ๋กœ ์ž์ฃผ ์ด์Šˆํ™”๋  ์ „๋ง์ด๋‹ค.

4) ์‚ฌํšŒ ์•ˆ์ „ ๋ฐ ์ •๋ณด๋ณดํ˜ธ ์ˆ˜์š” ์ฆ

ํ˜„ ์‚ฌํšŒ์˜ ์žฌ๋‚œ ๋ถˆํ™•์‹ค์„ฑ, ์ƒํ˜ธ ์ž‘์šฉ์„ฑ, ๋ณต์žก์„ฑ

ํ™• ๋กœ ์žฌ๋‚œ ์˜ˆ์ธก ๊ฐ€๋Šฅ์„ฑ์ด ๋ฏธ๋ž˜์— ํฌ๊ฒŒ ๊ฐ์†Œํ•˜์—ฌ

์‚ฌํšŒ ์•ˆ์ „ ์œ„ํ˜‘์ด ์ง€์†์ ์œผ๋กœ ์ฆ๊ฐ€ํ•  ์ „๋ง์ด๋‹ค. ๋„

์‹œํ™”, ์‚ฐ์—…ํ™”, ์ง€๊ตฌ์˜จ๋‚œํ™” ๋“ฑ์œผ๋กœ ์žฌ๋‚œ์˜ ํ˜•ํ™”,

๋ณตํ•ฉํ™”, ์‚ฌํšŒํ™” ํ˜„์ƒ์ด ๋‚˜ํƒ€๋‚˜๊ณ  ์žˆ์–ด ์ง€๋Šฅํ˜• ์‚ฌํšŒ

์•ˆ์ „ ์ธํ”„๋ผ์˜ ๊ณ ๋„ํ™”์— ํ•œ ์š”๊ตฌ๊ฐ€ ๊ธ‰์ฆํ•  ๊ฒƒ์œผ

๋กœ ์˜ˆ์ƒ๋œ๋‹ค(๊น€์‚ฌํ˜โˆ™์ตœ์ƒํ›ˆ, 2010).

ํŠนํžˆ, ์ „๋ฌธ์ โˆ™์กฐ์ง์  ์‚ฌ์ด๋ฒ„ ํ…Œ๋Ÿฌ๋กœ ์ธํ•œ ๊ตญ๊ฐ€

๊ธฐ๋ฐ˜์˜ ์œ„ํ˜‘ ์ฆ๊ฐ€ ๋ฐ ICT ์œตํ•ฉํ™”โˆ™์Šค๋งˆํŠธํ™”์— ๋”ฐ

๋ฅธ ์‹ ๊ทœ ๋ณด์•ˆ ์œ„ํ˜‘์ด ํฌ๊ฒŒ ์ฆ๊ฐ€ํ•  ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ

๋‹ค. ์ด์™€ ๊ฐ™์€ ๋„คํŠธ์›Œํฌ ์—ฐ๊ฒฐ ํ™• ๋กœ ํ”ผํ•ด ๊ทœ๋ชจ๊ฐ€

์ ์ฐจ ํ˜•ํ™”โˆ™๋ณต์žกํ™”๋˜๊ธฐ ๋•Œ๋ฌธ์— ์‚ฌ์ด๋ฒ„ ์œ„ํ˜‘์„

ํ•ด์†Œํ•˜๊ธฐ ์œ„ํ•œ ๋„คํŠธ์›Œํฌ์˜ ์ง€๋Šฅํ™”์— ํ•œ ํ•„์š”์„ฑ

์ด ์ง€์†์ ์œผ๋กœ ๋‘๋  ๊ฒƒ์ด๋‹ค. ๋˜ํ•œ ๋ชจ๋ฐ”์ผ ํ™˜๊ฒฝ์—

์„œ์˜ ๋ชจ๋ฐ”์ผ DDoS ๊ณต๊ฒฉ, ์œ ํ•ด ์ฝ˜ํ…์ธ  ํ™•์‚ฐ, ์œ„์น˜

์ •๋ณด ๋ฐ ํ”„๋ผ์ด๋ฒ„์‹œ ์นจํ•ด ๋“ฑ์— ์‘ํ•˜๊ธฐ ์œ„ํ•œ ์ •๋ณด

๋ณดํ˜ธ์˜ ์ฒด๊ณ„ ๋งˆ๋ จ์— ํ•œ ์š”๊ตฌ๊ฐ€ ํฌ๊ฒŒ ์ฆ ํ•  ๊ฒƒ์œผ

๋กœ ๋ณด์ธ๋‹ค.

5) ๋„คํŠธ์›Œํฌ ๊ธฐ๋ฐ˜ ๊ฐœ๋ฐฉํ˜• ๊ต์œก ํ™•์‚ฐ

๊ตญ๋ฏผ 2๋ช… ์ค‘ ํ•œ๋ช…์ด e-learning์„ ์ด์šฉํ•  ์ •๋„

๋กœ ๋ณดํŽธํ™”๋œ ์˜จ๋ผ์ธ ๊ต์œก ์‹œ์Šคํ…œ์€ ๋„คํŠธ์›Œํฌ ๊ณ ๋„

ํ™”๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ๊ธ‰๊ฒฉํ•œ ์„ฑ์žฅ์„ ๋ณด์ผ ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ

๋‹ค.9) ๋˜ํ•œ ์ •๋ณดํ†ต์‹  ๊ธฐ์ˆ ์„ ์ด์šฉํ•ด ์‹œ๊ฐ„๊ณผ ๊ณต๊ฐ„์˜

์ œ์•ฝ์ด ์—†๋Š” ์Œ๋ฐฉํ–ฅ ํ•™์Šต ๋ฐ ๊ต์œก์ด ๊ฐ€๋Šฅํ•ด์งˆ ๊ฒƒ์œผ

๋กœ ์˜ˆ์ƒ๋œ๋‹ค. ๊ณ ๋ นํ™”โˆ™๋‹ค๋ฌธํ™” ๋“ฑ์˜ ์‚ฌํšŒ๊ตฌ์กฐ ๋ณ€ํ™”,

์ง€์‹์‚ฌํšŒ๋กœ์˜ ์ „ํ™˜์— ๋”ฐ๋ฅธ ๋…ธ๋™์ˆ˜์š” ๋ณ€ํ™” ๋“ฑ์œผ๋กœ

๊ต์œก ์ˆ˜์š” ๋ณ€ํ™” ๋ฐ ๊ต์œก ๊ฒฉ์ฐจ์˜ ์‹ฌํ™”๊ฐ€ ๋ฐœ์ƒํ•  ๊ฒƒ

์œผ๋กœ ์ „๋ง๋œ๋‹ค. ๋‹ค์–‘ํ•œ ์ˆ˜์š” ์ถฉ์กฑ์„ ์œ„ํ•œ ์—ด๋ฆฐ๊ต

์œก, ์ ์‘โˆ™๋ณ€ํ™”โˆ™๋ฐœ์ „์„ ์œ„ํ•œ ํ‰์ƒ๊ต์œก, ์‹œ๊ณต๊ฐ„์˜

ํ•œ๊ณ„ ๊ทน๋ณต์„ ํ†ตํ•œ ์•ˆ๊ต์œก ๋“ฑ์˜ ๊ต์œก์ˆ˜์š”๊ฐ€ ๋ฐœํ˜„

๋  ๊ฒƒ์ด๋‹ค.

์ด๋Ÿฌํ•œ ๋ณ€ํ™”์— ์žˆ์–ด ์ฒจ๋‹จ ์Šค๋งˆํŠธ IT ๊ธฐ์ˆ  ๋ฐ ์Šค

๋งˆํŠธ ๋„คํŠธ์›Œํฌ๋ฅผ ์ ๊ทน์ ์œผ๋กœ ํ™œ์šฉํ•œ ๋ฏธ๋ž˜์ง€ํ–ฅ์ 

๊ฐœ๋ฐฉํ˜• ๊ต์œกํ™˜๊ฒฝ์˜ ํ™• ๊ฐ€ ์˜ˆ์ธก๋œ๋‹ค. ๋‹ค์–‘ํ•œ ๊ณ ํ’ˆ

์งˆ ์‹ค๊ฐํ˜• ๊ต์œก ์ฝ˜ํ…์ธ  ๋ฐ ๊ต์œก์šฉ ์Šค๋งˆํŠธ ๋‹จ๋ง์˜

ํ™•์‚ฐ์œผ๋กœ ๋ฏธ๋ž˜ ๊ต์œก ์ˆ˜์š” ์ถฉ์กฑ ๋ฐ ๊ด€๋ จ ์‚ฐ์—…์˜ ๊ธ‰

์†ํ•œ ์„ฑ์žฅ์ด ๊ฐ€๋Šฅํ•ด์งˆ ์ „๋ง์ด๋‹ค. ์ด์— ๋”ฐ๋ผ ๋ชจ๋ฐ”์ผ

๋Ÿฌ๋‹, G-๋Ÿฌ๋‹, 3D ๋””์ง€ํ„ธ ๊ต๊ณผ์„œ ๋“ฑ์„ ์ด์šฉํ•œ ์ˆ˜

์—…์ด ํ™œ์„ฑํ™”๋  ์ „๋ง์ด๋ฉฐ, ๋ฏธ๋ž˜ ๊ต์œก ํ™˜๊ฒฝ ๋ณ€ํ™”๋ฅผ

์ง€์›ํ•˜๊ธฐ ์œ„ํ•œ ํด๋ผ์šฐ๋“œ ๋“ฑ ๋ฏธ๋ž˜ ๋„คํŠธ์›Œํฌ ํ™˜๊ฒฝ ๊ณ 

๋„ํ™”๊ฐ€ ์˜ˆ์ƒ๋œ๋‹ค.

ํ•œ๊ตญ์‚ฌํšŒ ๋ณ€ํ™”์™€ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท ์ •์ฑ…์— ํ•œ ํƒ์ƒ‰์  ์—ฐ๊ตฌ

Internet and Information Security 101

9) ์ธํ„ฐ๋„ท์„ ์ด์šฉํ•œ ๋งŒ 3์„ธ ์ด์ƒ ๊ตญ๋ฏผ์˜ e-learning ์ด์šฉ๋ฅ ์€ 2007๋…„ 39.4%์—์„œ 2008๋…„ 45.0%๋กœ ์ƒ์Šนํ–ˆ์œผ๋ฉฐ, 2009๋…„์—๋Š” 48.3%๋กœ ์ฆ๊ฐ€ํ•˜ ๋‹ค (์ง€์‹๊ฒฝ์ œ๋ถ€โˆ™์ •๋ณดํ†ต์‹ ์‚ฐ์—…์ง„ํฅ์›, 2010).

Page 103: nternet I Security - BIGBOOK

6) ์ด์šฉ์ž ์ค‘์‹ฌ์˜ u-Healthcare ํ™œ์„ฑํ™”

๋ฏธ๋ž˜์—๋Š” ๊ณต๊ธ‰์ž ์ค‘์‹ฌ, ์น˜๋ฃŒ ์œ„์ฃผ์˜ ์„œ๋น„์Šค์—์„œ

์˜ˆ๋ฐฉโˆ™๊ฑด๊ฐ• ์ฆ์ง„์— ์ค‘์ ์„ ๋‘” ์ˆ˜์š”์ž ์ค‘์‹ฌ์˜ ๋Šฅ๋™

์  ์„œ๋น„์Šค๋กœ ๋ณด๊ฑด์˜๋ฃŒ์˜ ์ˆ˜์š”๊ฐ€ ๋ณ€ํ™”ํ•  ๊ฒƒ์ด๋‹ค. ์ด

์— ๋”ฐ๋ผ ํ™˜์ž๋“ค์ด ์Šค์Šค๋กœ ์ •๋ณด๋ฅผ ์ œ๊ณตํ•˜๊ณ , ์ง„๋ฃŒ์™€

์น˜๋ฃŒ์— ์ฐธ์—ฌํ•˜๋ฉฐ ์ง€์‹์„ ๊ณต์œ ํ•˜์—ฌ ๋ณด๋‹ค ๋‚˜์€ ์น˜๋ฃŒ

๋ฐฉ์•ˆ์„ ์ฐพ์•„๊ฐ€๋Š”โ€˜ํ—ฌ์Šค 2.0โ€™์‹œ ๊ฐ€ ๋„๋ž˜ํ•  ๊ฒƒ์œผ๋กœ

๋ณด์ธ๋‹ค. ํ˜„์žฌ ์˜๋ฃŒ๋ฒ•์˜ ํ•œ๊ณ„๋กœ ํ™•์‚ฐ์ด ์ง€์—ฐ๋˜๊ณ  ์žˆ

์œผ๋‚˜, u-Medical, u-Silver, u-Wellness์— ํ•œ

์š”๊ตฌ ๊ธ‰์ฆ์œผ๋กœ ๋ฒ•์ œ๋„์˜ ์กฐ๊ธฐ ๊ฐœ์„ ์ด ์ด๋ฃจ์–ด์งˆ ๊ฒƒ

์œผ๋กœ ์ „๋ง๋œ๋‹ค. ์˜๋ฃŒ ์ทจ์•ฝ๊ณ„์ธต ํ™˜์ž์™€ ์˜์‚ฌ ๊ฐ„ ์ง

์ ‘์ ์ธ ์ง„๋ฃŒํ–‰์œ„ ํ—ˆ์šฉ, ์ผ๋ฐ˜์ธ์— ํ•œ ์›๊ฒฉ์ง„๋ฃŒ ํ—ˆ

์šฉ, ์˜๋ฃŒ๊ธฐ๊ด€ ์ƒํ˜ธ ๊ฐ„์˜ ์ •๋ณด ๊ณต์œ  ๋“ฑ์„ ์œ„ํ•œ ๋ฒ•์ œ

๋„ ๊ฐœ์„  ๋…ธ๋ ฅ์ด ์ง€์†๋˜๊ณ  ์žˆ๋‹ค.

ํ–ฅํ›„์—๋Š” ํŽธ๋ฆฌํ•˜๊ฒŒ ์งˆ๋ณ‘โˆ™์˜์•ฝํ’ˆโˆ™์˜ˆ๋ฐฉ์ •๋ณด ๋“ฑ

์„ ์ œ๊ณต๋ฐ›๊ณ , ์›๊ฒฉ ์˜๋ฃŒ์ƒ๋‹ด์„ ํ†ตํ•œ ์ž๊ฐ€ ๊ฑด๊ฐ•๊ด€๋ฆฌ

๋“ฑ์œผ๋กœ ๊ตญ๋ฏผ์˜ ๊ฑด๊ฐ•๊ณผ ์‚ถ์˜ ์งˆ์ด ํ–ฅ์ƒ๋  ๊ฒƒ์ด๋‹ค.

์ด์— ์˜๋ฃŒ ๊ธฐ์ˆ ๊ณผ IT ๊ธฐ์ˆ ์ด ์ ‘๋ชฉ๋˜์–ด ๊ธฐ์กด ๋ณ‘์›

์ค‘์‹ฌ ์˜๋ฃŒ ์„œ๋น„์Šค์˜ ์‹œโˆ™๊ณต๊ฐ„์  ํ•œ๊ณ„๋ฅผ ๊ทน๋ณตํ•œ ์ด

์šฉ์ž ์ฐฉํ˜• ๋ณด๊ฑด์˜๋ฃŒ ์„œ๋น„์Šค๊ฐ€ ํ™•์‚ฐ๋  ๊ฒƒ์œผ๋กœ ์ „

๋ง๋œ๋‹ค. ํšจ๊ณผ์ ์ธ ์งˆ๋ณ‘ ์กฐ๊ธฐ ์ง„๋‹จ, ๋งŒ์„ฑ ํ™˜์ž ๊ด€๋ฆฌ,

๊ฑด๊ฐ• ์ฆ์ง„ ๋“ฑ์„ ์œ„ํ•œ ์Šค๋งˆํŠธ ์„ผ์„œ ๊ธฐ๋ฐ˜์˜ ๋Šฅ๋™์ 

๋ณด๊ฑด์˜๋ฃŒ ์„œ๋น„์Šค๊ฐ€ ๋„์ž…๋  ๊ฒƒ์ด๋ฉฐ, ์ ์ฐจ์ ์œผ๋กœ ํ™•

์‚ฐ๋  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋œ๋‹ค.

3. ์ •์น˜โˆ™๊ณต๊ณต ๋ถ„์•ผ

1) ์Šค๋งˆํŠธ ์ •๋ถ€ ๊ธฐ๋ฐ˜ ์—…๋ฌดํšจ์œจ์„ฑ๊ฐ•ํ™”

ICT ํ™˜๊ฒฝ ๋ณ€ํ™”์— ๋”ฐ๋ฅธ ์ •๋ถ€ ์—…๋ฌดํ™˜๊ฒฝ์˜ ๋ณ€ํ™”์—

์‘ํ•œ ์Šค๋งˆํŠธ์›Œํฌ ๋“ฑ์˜ ๋„์ž…์œผ๋กœ ์ •๋ถ€ ๋‚ด ์—…๋ฌด ํšจ

์œจ์„ฑ์ด ํ•œ์ธต ๊ฐ•ํ™”๋  ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ๋‹ค. ๋‹จ๋ฐฉํ–ฅ ์†Œํ†ต

์—์„œ ์–‘๋ฐฉํ–ฅ ์†Œํ†ต์œผ๋กœ, PC ์ค‘์‹ฌ์—์„œ ๋ชจ๋ฐ”์ผ ์ค‘์‹ฌ

์œผ๋กœ, ๋‹จ์ ˆ๋œ ์„œ๋น„์Šค์—์„œ ๋Š๊น€ ์—†๋Š” ์„œ๋น„์Šค๋กœ ์ •๋ถ€

์—…๋ฌด๋ฐฉ์‹์˜ ๋ณ€ํ™”๊ฐ€ ์˜ˆ์ƒ๋œ๋‹ค. ์ด๋ฅผ ํ†ตํ•ด ์‚ฐ์—…ํ™” ์‹œ

์˜ ํš์ผ์  ๊ทผ๋ฌด๋ฐฉ์‹์—์„œ ๋ฒ—์–ด๋‚˜ ์œ โˆ™๋ฌด์„  ๋„คํŠธ

์›Œํฌ๋ฅผ ํ™œ์šฉํ•œ ์ž์œ ๋กญ๊ณ  ์œ ์—ฐํ•˜๋ฉฐ ํ†ตํ•ฉ์ ์ธ ์—…๋ฌด

์ˆ˜ํ–‰์ด ๊ฐ€๋Šฅํ•ด์งˆ ๊ฒƒ์œผ๋กœ ๋ณด์ธ๋‹ค. ์กฐ์ง ์ฐจ์›์—์„œ

ICT ๋ฐœ์ „์— ๋”ฐ๋ผ ์ •๋ณด ๊ณต์œ ์™€ ์‹œ์Šคํ…œ ์—ฐ๊ณ„๊ฐ€ ์ž์œ 

๋กœ์›Œ์ง€๋ฉด์„œ, ํ•„์š”์— ๋”ฐ๋ผ ๋‹ค์–‘ํ•œ ์กฐ์ง์˜ ์—ฐ๊ด€ ์—…๋ฌด

๊ฐ€ ์ ์€ ๋น„์šฉ์œผ๋กœ ํ†ตํ•ฉ๋จ์œผ๋กœ์จ ์ •๋ถ€์กฐ์ง ๊ฐ„ ๊ฒฝ๊ณ„

๊ฐ€ ํฌ์„๋˜๋Š” ํ˜„์ƒ์ด ๋ฐœ์ƒํ•  ๊ฒƒ์ด๋‹ค(์ •๊ตญํ™˜ ์™ธ,

2009).

ํ•œํŽธ, ์Šค๋งˆํŠธ ๋‹จ๋ง ๊ธฐ๋ฐ˜ ๋ณต์ง€โˆ™์†Œ๋ฐฉโˆ™๋ฐฉ์žฌโˆ™์น˜

์•ˆ ๋“ฑ ํŠนํ™”๋œ ํ˜„์žฅ ์—…๋ฌด ์„œ๋น„์Šค๋ฅผ ํ†ตํ•ด ๊ณต๋ฌด์›์˜

ํ˜„์žฅ ์‘๋ ฅ ๋˜ํ•œ ๊ฐ•ํ™”๋  ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ๋‹ค. ํ˜„์žฅ

๋‹จ์†, ์‹œ์„ค๋ฌผโˆ™์œ„ํ—˜๋ฌผ ๊ด€๋ฆฌ, ๊ฐ์ข… ์กฐ์‚ฌ ๋“ฑ ๋ถ€์ฒ˜๋ณ„

ํŠนํ™”๋œ ํ˜„์žฅ ์—…๋ฌด๋ฅผ ์ง€์›ํ•˜๋Š” ๋‹ค์ˆ˜์˜ ์Šค๋งˆํŠธ ์„œ๋น„

์Šค์˜ ๋„์ž…์ด ๋‹จ๊ณ„์ ์œผ๋กœ ์ด๋ฃจ์–ด์งˆ ๊ฒƒ์œผ๋กœ ๋ณด์ธ๋‹ค.

2) ๊ด€์—ฌ์  ์‹œ๋ฏผ์˜ ์ •์ฑ…์ฐธ์—ฌ ์ฆ

๋ฏธ๋ž˜์—๋Š” ์ ๊ทน์ โˆ™๋Šฅ๋™์ ์œผ๋กœ ์ •์ฑ…์— ์ฐธ์—ฌํ•˜๋Š”

โ€˜๊ด€์—ฌ์  ์‹œ๋ฏผ(engaging citizen)โ€™์˜ ์—ญํ• ์ด ํฌ๊ฒŒ

์ฆ ๋  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋œ๋‹ค. ๋‹ค์ˆ˜์˜ IT ์ด์šฉ์ž๋Š” IT

๋“ฑ ๋‹ค์–‘ํ•œ ์ฐธ์—ฌ ์ˆ˜๋‹จ์„ ์ ๊ทน์ ์œผ๋กœ ํ™œ์šฉํ•˜์—ฌโ€˜์ž๊ธฐ

์กฐ์งํ™”โ€™์™€โ€˜์ง‘๋‹จ์ง€์„ฑโ€™์˜ ํ–‰๋™์–‘์‹์„ ๋ณด์ด๋Š” ๋„คํŠธ

์›Œํฌํ™”๋œโ€˜๋ชจ๋‹ˆํ„ฐ ์‹œ๋ฏผโ€™10)์œผ๋กœ ๋ณ€๋ชจํ•  ๊ฐ€๋Šฅ์„ฑ์ด ๋†’

๋‹ค. IT์˜ ๋ฐœ์ „๊ณผ ์†Œ์…œ๋ฏธ๋””์–ด์˜ ๋ฐœ๋‹ฌ๋กœ ์ธํ•˜์—ฌ ๋ˆ„๊ตฌ

๋‚˜ ๋‰ด์Šค์˜ ์ทจ์žฌ, ํŽธ์ง‘, ๋ฐฐํฌ๊ฐ€ ๊ฐ€๋Šฅํ•œโ€˜์‹œ๋ฏผ ์ €๋„

๋ฆฌ์ฆ˜โ€™๋˜ํ•œ ํ™•์‚ฐ๋  ๊ฒƒ์ด๋‹ค. ์–ธ๋ก ์‚ฌ๊ฐ€ ํŠธ์œ„ํ„ฐ๋‚˜ ์œ 

ํŠœ๋ธŒ์— ์˜ฌ๋ผ์˜จ ์ž๋ฃŒ๋ฅผ ๋ฐฉ์†ก์— ์ธ์šฉํ•˜๊ณ , ๋„คํ‹ฐ์ฆŒ์ด

์‚ฌ๊ฑด ํ˜„์žฅ์„ ์ค‘๊ณ„ํ•˜๊ฑฐ๋‚˜ ๋ชฉ๊ฒฉ์ž์™€ ์ธํ„ฐ๋ทฐ๋ฅผ ํ•˜๋ฉด

์„œ ์‚ฌ๊ฑด ํ˜„ํ™ฉ์„ ๋ณด๋„ํ•˜๋Š” ๊ฒƒ ๋“ฑ์ด ๊ทธ ํ‘œ์ ์ธ ์‚ฌ

๋ก€์ด๋‹ค.

์ •์ฑ…์ฐธ์—ฌ์— ์žˆ์–ด ์‹œ๋ฏผ์ฐธ์—ฌ๋ฅผ ์œ ๋„ํ•˜๊ณ , ์ง‘๋‹จ์ง€

์„ฑ์„ ํ™œ์šฉํ•˜์—ฌ ํ–‰์ •๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๋Š” ๋“ฑ ์ •๋ถ€โˆ™ํ–‰

์ •๊ธฐ๊ด€๊ณผ์˜ ์†Œํ†ตํ™• ๋ฅผ ์œ„ํ•œ ICT์˜ ํ™œ์šฉ๋„๊ฐ€ ํฌ๊ฒŒ

์ œ ๊ถŒ ์ œ ํ˜ธ

102 ๋…„ ์›”

10) ๊ด‘๋ฒ”์œ„ํ•œ ์ด์Šˆ๋ฅผ ์ „์ฒด์ ์œผ๋กœโ€˜์Šค์บ”โ€™ํ•˜๋ฉด์„œ ๋ชจ๋“  ์˜์ œ์— ์ ๊ทน์ ์œผ๋กœ ๊ด€์—ฌํ•˜๋Š” ์ƒˆ๋กœ์šด ์‹œ๋ฏผ ๋ชจ๋ธ์„ ์˜๋ฏธํ•œ๋‹ค(Schudson, 1998).

Page 104: nternet I Security - BIGBOOK

์ฆ๊ฐ€ํ•  ์ „๋ง์ด๋‹ค. ํ–‰์ •๊ธฐ๊ด€์ด ๊ฐ„๊ณผํ•˜๋Š” ๋ฌธ์ œ์ ์„

์‹œ๋ฏผ๋“ค์˜ ์ œ์•ˆ์„ ํ†ตํ•˜์—ฌ ๋ณด์™„ํ•˜๋Š” ์ฐธ์—ฌ, ๊ฐœ๋ฐฉ, ๊ณต

์œ , ์†Œํ†ต์˜ ๊ตญ๋ฏผ ์„œ๋น„์Šค ์ œ๊ณต๋ฐฉ์‹์— ๋งŽ์€ ๋ณ€ํ™”๊ฐ€

๋ฐœ์ƒํ•  ๊ฒƒ์ด๋‹ค.

3) ํˆฌ๋ช…์„ฑ๊ณผ ์‚ฌํšŒ์‹ ๋ขฐ ์ฆ์ง„ ์š”๊ตฌ ํ™•์‚ฐ

์•ž์œผ๋กœ๋Š” ์ง€์‹, ๊ฐ€์ƒ๊ณต๊ฐ„์˜ ์ •๋ณด, ์›น ํ™˜๊ฒฝ ์‹œ์Šค

ํ…œ์— ํ•œ ์‹ ๋ขฐ๋ฅผ ํ†ตํ•œ ICT ๊ธฐ๋ฐ˜ ์‹ ๋ขฐ์˜ ์‚ฌํšŒ ์ž๋ณธ

ํ™” ์š”๊ตฌ๊ฐ€ ์ง€์†์ ์œผ๋กœ ํ™•์‚ฐ๋  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋œ๋‹ค. ์ „

์‚ฌํšŒ์ ์ธ ๋””์ง€ํ„ธ ์†Œํ†ต ๋…ธ๋ ฅ์˜ ์ฆ ๋กœ ๊ณ„์ธต ๊ฐ„, ์ง€

์—ญ ๊ฐ„, ์„ธ ๊ฐ„์˜ ์ทจ์•ฝํ•œ ์‹ ๋ขฐโˆ™ํ•ฉ์˜ ์ฒด๊ณ„์— ํ•œ

๊ฐœ์„  ๋˜ํ•œ ์ด๋ฃจ์–ด์งˆ ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ๋‹ค. ICT ๊ธฐ๋ฐ˜

์‚ฌํšŒ ์‹œ์Šคํ…œ ๋ชจ๋‹ˆํ„ฐ๋ง์˜ ๊ฐ•ํ™”๋กœ ๊ณผ๊ฑฐ์™€๋Š” ๋‹ค๋ฅธ ์‚ฌ

ํšŒํˆฌ๋ช…์„ฑ์˜ ํ™•๋ณด๊ฐ€ ๊ฐ€๋Šฅํ•ด์งˆ ๊ฒƒ์ด๋‹ค.

๋˜ํ•œ ์ •๋ถ€์— ์žˆ์–ด ํ•ฉ๋ฆฌ์ ์ธ ๊ฐˆ๋“ฑํ•ด๊ฒฐ ํ”„๋กœ์„ธ์Šค

๋ฅผ ํ†ตํ•œ ์‚ฌํšŒ์  ํ•ฉ์˜ ์ˆ˜์ค€์˜ ์ œ๊ณ ๋กœ ์‚ฌํšŒ์  ๋น„์šฉ์ ˆ

๊ฐ, ์ •์ฑ…์˜ ํˆฌ๋ช…์„ฑโˆ™์‹ ๋ขฐ๋„๊ฐ€ ์ฆ๊ฐ€ํ•  ์ „๋ง์ด๋‹ค. ์•ž

์œผ๋กœ๋Š” ์ฐธ์—ฌํ˜• ์˜จ๋ผ์ธ ์ˆ™์˜ ์‹œ์Šคํ…œ, ์‹ค์‹œ๊ฐ„ ์ •๋ถ€๊ธฐ

๋ก ๊ด€๋ฆฌ ์‹œ์Šคํ…œ, ๋งž์ถคํ˜• ์ •์ฑ…์ •๋ณด ์ œ๊ณต ์„œ๋น„์Šค ๋“ฑ

์ด ๋„์ž…๋˜๊ณ  ํ™•์‚ฐ๋˜์–ด ICT๋ฅผ ํ™œ์šฉํ•œ ์‚ฌํšŒํ†ตํ•ฉ ์ฆ

์ง„์— ์ด๋ฐ”์ง€ํ•  ๊ฒƒ์œผ๋กœ ๋ณด์ธ๋‹ค.

1. ๋ฏธ๋ž˜ ์ „๋ง๊ณผ ์ค‘์žฅ๊ธฐ ๋„คํŠธ์›Œํฌ ๋ฐœ์ „ ๋ฐฉํ–ฅ์˜

์—ฐ๊ณ„์„ฑ

์‚ฌํšŒ๊ตฌ์กฐโˆ™์ƒํ™œ์—…๋ฌดโˆ™๊ธฐ์ˆ ์„ฑ์žฅ ๋ถ„์•ผ์—์„œ ๋ฐœํ˜„

๋˜๋Š” ํ•œ๊ตญ ์‚ฌํšŒ ๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ๋Š” ๊ฒฝ์ œโˆ™์‚ฐ์—…โˆ™์‚ฌํšŒโˆ™

๋ฌธํ™”โˆ™์ •์น˜โˆ™๊ณต๊ณต ์ „ ๋ถ„์•ผ์— ํ•œ IT์˜ ์—ญํ•  ์ฆ

๋ฅผ ์ด‰์ง„์‹œํ‚ฌ ๊ฒƒ์ด๋‹ค. ๋”๋ถˆ์–ด ์ธํ”„๋ผ ์ธก๋ฉด์—์„œ ์ด๋Ÿฌ

ํ•œ ๋ณ€ํ™”๋Š” ์‹ ๊ทœ ์„œ๋น„์Šค์— ํ•œ ์ˆ˜์š”๋ฅผ ํ™•์‚ฐ์‹œํ‚ค๊ณ 

๊ฒฐ๊ณผ์ ์œผ๋กœ ์„œ๋น„์Šค ์ œ๊ณต ๋Šฅ๋ ฅ์„ ๊ฐ•ํ™”ํ•˜๊ธฐ ์œ„ํ•œ ๋„ค

ํŠธ์›Œํฌ ๊ณ ๋„ํ™”์˜ ํ•„์š”์„ฑ์„ ์ฆ ์‹œํ‚ฌ ๊ฒƒ์ด๋‹ค. ๋ฐ˜๋ฉด

์ •์ฑ…์ ์œผ๋กœ๋Š” ๋„คํŠธ์›Œํฌ ๊ณ ๋„ํ™” ํ•„์š”์„ฑ์„ ์ถฉ์กฑ์‹œํ‚ค

๊ธฐ ์œ„ํ•œ ์„ ์ œ์ ์ธ ๋„คํŠธ์›Œํฌ ํˆฌ์ž ์ด‰์ง„ ์ •์ฑ…์„ ์ถ”์ง„

ํ•จ์œผ๋กœ์จ ๋ฏผ๊ฐ„โˆ™๊ณต๊ณต ๋„คํŠธ์›Œํฌ ํˆฌ์ž๋ฅผ ํ™• ์‹œ์ผœ

์„œ๋น„์Šค ๋ฐœํ˜„์„ ์ด‰์ง„์‹œํ‚ค๊ณ , ํ™œ์šฉํŽธ์ต์„ ์ฆ์ง„์‹œ์ผœ

์‚ฌํšŒ๋ฐœ์ „ ๋ฐ ํ›„์ƒ ์ฆ ๋ฅผ ์œ ๋„ํ•˜๋Š” ๊ฒƒ์ด ๊ฐ€๋Šฅํ•˜๋‹ค.

์ด๋Ÿฌํ•œ ๋…ผ๋ฆฌ๋ฅผ ๊ทผ๊ฐ„์œผ๋กœ ํ•œ๊ตญ์‚ฌํšŒ ๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ์™€

์ค‘์žฅ๊ธฐ ๋„คํŠธ์›Œํฌ ๋ฐœ์ „ ๋ฐฉํ–ฅ์˜ ์—ฐ๊ณ„์„ฑ์„ ๋„์‹ํ™”ํ•˜

๋ฉด [๊ทธ๋ฆผ 1]๊ณผ ๊ฐ™์ด ์œ ์ถ”ํ•ด๋ณผ ์ˆ˜ ์žˆ๋‹ค. ๋ณธ ์—ฐ๊ตฌ๋Š”

2020๋…„์„ ๊ธฐ์ค€์œผ๋กœ ๋‚˜ํƒ€๋‚  ์‚ฌํšŒ ๋ฐ IT ๋ณ€ํ™”์™€ ์ค‘

์žฅ๊ธฐ ๋„คํŠธ์›Œํฌ๊ฐ€ ๋‚ดํฌํ•  ์œตํ•ฉ, ์ง€๋Šฅ, ๊ฐœ๋ฐฉ, ์ดˆ๊ด‘

์—ญ์˜ 4๊ฐ€์ง€ ์†์„ฑ์„ ์œ ๊ธฐ์ ์œผ๋กœ ์—ฐ๊ณ„ํ•˜์—ฌ ๋ฏธ๋ž˜ ์ „

๋ง๊ณผ ๋„คํŠธ์›Œํฌ ๋ฐœ์ „ ๋ฐฉํ–ฅ์˜ ๊ด€๊ณ„์„ฑ์„ ๋ฐํžŒ๋‹ค๋Š” ์˜

์˜๊ฐ€ ์žˆ๋‹ค.

๊ฐ ๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ๋Š” ์„œ๋กœ ๋‹ค๋ฅธ ๋ถ„์•ผ์—์„œ ์„œ๋กœ ๋‹ค๋ฅธ

๋™์ธ์— ์˜ํ•ด ๋‚˜ํƒ€๋‚˜์ง€๋งŒ ์ธํ”„๋ผ ์ธก๋ฉด์—์„œ ์‚ดํŽด๋ณด

๋ฉด ๊ณตํ†ต๋œ ์„œ๋น„์Šค ํŠน์„ฑ ๋ฐ ๋„คํŠธ์›Œํฌ ์†์„ฑ์„ ์š”๊ตฌํ• 

๊ฒƒ์ด๋‹ค. [๊ทธ๋ฆผ 1]์€ ํ•œ๊ตญ ์‚ฌํšŒ ๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ, IT ๋ฏธ๋ž˜

์ „๋ง ๊ฐ„์˜ ๊ด€๋ จ์„ฑ๊ณผ ๋ฏธ๋ž˜ ๋ณ€ํ™”์— ์‘ํ•˜๊ณ  ๋•Œ๋กœ๋Š”

๋ณ€ํ™”๋ฅผ ์ด‰์ง„์‹œํ‚ค๊ธฐ ์œ„ํ•ด ์š”๊ตฌ๋˜๋Š” ์„œ๋น„์Šค ๋ฐ ๋„คํŠธ

์›Œํฌ ์†์„ฑ์„ ์„œ๋กœ ์—ฐ๊ณ„ํ•˜ ๋‹ค.

ํ•œํŽธ, ํ•œ๊ตญ์‚ฌํšŒ ๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ์™€ IT ๋ฏธ๋ž˜ ์ „๋ง๊ณผ์˜

๊ด€๋ จ๋„์˜ ์„ธ๋กœ์ถ•๊ณผ ๊ฐ€๋กœ์ถ•์„ ๋ฐ”๊พธ์–ด ๋„คํŠธ์›Œํฌ ์†

์„ฑ๊ณผ IT ๋ฏธ๋ž˜ ์ „๋ง๊ณผ์˜ ์—ฐ๊ณ„๋„๋ฅผ ์‚ดํŽด๋ณด๋ฉด [๊ทธ๋ฆผ

2]์™€ ๊ฐ™๋‹ค. ํ•œ๊ตญ์‚ฌํšŒ ๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ์™€ IT ๋ฏธ๋ž˜ ์ „๋ง์˜

์—ฐ๊ณ„์„ฑ์˜ ๋ณ€ํ™”๋Š” ์—†์ง€๋งŒ [๊ทธ๋ฆผ 1]์€ ๋„คํŠธ์›Œํฌ๊ฐ€ ํ•œ

๊ตญ์‚ฌํšŒ ๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ ๋ณ€ํ™”์— ์–ด๋–ป๊ฒŒ ๊ธฐ์—ฌํ•ด์•ผ ํ•˜๋Š”

์ง€๋ฅผ ๋ณด์—ฌ์ฃผ๋Š” ๋ฐ˜๋ฉด, [๊ทธ๋ฆผ 2]๋Š” ๋„คํŠธ์›Œํฌ ์†์„ฑ์ด

IT ๋ฏธ๋ž˜ ์ „๋ง์— ์–ด๋–ป๊ฒŒ ์—ฐ๊ณ„๋˜๋Š”์ง€๋ฅผ ๋ณด์—ฌ์ฃผ๋Š” ์ฐจ

์ด์ ์„ ์ง€๋‹Œ๋‹ค. ๋˜ํ•œ [๊ทธ๋ฆผ 1]๊ณผ [๊ทธ๋ฆผ 2]๋ฅผ ๋™์‹œ์—

๊ณ ๋ คํ•˜์—ฌ ๋‘ ์š”์†Œ๊ฐ„์˜ ์ƒํ˜ธ์ž‘์šฉ์„ฑ์„ ํŒŒ์•…ํ•˜๋Š” ๊ฒƒ

๋„ ๊ฐ€๋Šฅํ•˜๋‹ค.

ํ–ฅํ›„ ์‹ฌ๋„ ๊นŠ์€ ์—ฐ๊ตฌ๋ฅผ ํ†ตํ•ด ์—ฐ๊ณ„์„ฑ์„ ๋ฉด ํžˆ ํŒŒ

์•…ํ•  ํ•„์š”๊ฐ€ ์žˆ๊ฒ ์ง€๋งŒ ์ œ์‹œ๋œ ์—ฐ๊ณ„๋„๋Š” ๋„คํŠธ์›Œํฌ

์— ํ•œ ํˆฌ์ž๊ฐ€ ์–ด๋– ํ•œ ์„œ๋น„์Šค์˜ ๋ฐœํ˜„์„ ์ด‰์ง„์‹œ์ผœ

๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ๋กœ ๋ฐœ์ƒ๋˜๋Š” ํ›„์ƒ์˜ ๊ฐ•ํ™” ๋˜๋Š” ๋ฉ”ํƒ€ํŠธ

ํ•œ๊ตญ์‚ฌํšŒ ๋ณ€ํ™”์™€ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท ์ •์ฑ…์— ํ•œ ํƒ์ƒ‰์  ์—ฐ๊ตฌ

Internet and Information Security 103

Page 105: nternet I Security - BIGBOOK

์ œ ๊ถŒ ์ œ ํ˜ธ

104 ๋…„ ์›”

[๊ทธ๋ฆผ 1] ํ•œ๊ตญ์‚ฌํšŒ ๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ์™€ ์ค‘์žฅ๊ธฐ ๋„คํŠธ์›Œํฌ ๋ฐœ์ „ ๋ฐฉํ–ฅ์˜ ์ƒํ˜ธ์—ฐ๊ด€์„ฑ

โ€ป ์—ฐ๊ณ„์„ฑ: Weak Middle Strong

Page 106: nternet I Security - BIGBOOK

๋ Œ๋“œ์— ๋”ฐ๋ผ ๋ฐœ์ƒ๋˜๋Š” ์œ„ํ—˜์— ํ•œ ์‘์„ ๊ฐ€๋Šฅํ•˜

๊ฒŒ ํ•˜๋Š”์ง€์— ํ•œ ์‹œ์‚ฌ์ ์„ ์ œ๊ณตํ•œ๋‹ค. ๋”ฐ๋ผ์„œ ์ด์™€

๊ฐ™์€ ๋ถ„์„์€ ์ค‘์žฅ๊ธฐ ๋„คํŠธ์›Œํฌ ๊ตฌ์ถ•์— ํ•œ ์ „๋žต์ 

๋ฐฉํ–ฅ์„ฑ์„ ์ œ๊ณตํ•จ์œผ๋กœ์จ ๋„คํŠธ์›Œํฌ ๊ณ ๋„ํ™” ๊ด€์ ์—์„œ

๋ฏธ๋ž˜์ธํ„ฐ๋„ท ์ •์ฑ…์˜ ํšจ๊ณผ์„ฑ ๋ฐ ํšจ์œจ์„ฑ์„ ์ œ๊ณ ํ•˜๋Š”

๋ฐ ๊ธฐ์—ฌํ•  ๊ฒƒ์œผ๋กœ ๊ธฐ ๋œ๋‹ค.

2. 2020๋…„ ์ค‘์žฅ๊ธฐ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท ์ •์ฑ… ๋ฐฉํ–ฅ

์•ž์„œ ๋„์ถœํ•œ ํ•œ๊ตญ์‚ฌํšŒ ๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ์™€ ์ด์— ๋”ฐ๋ฅธ

IT ๋ฏธ๋ž˜ ์ „๋ง์€ ๋ฏธ๋ž˜ ๊ตญ๊ฐ€โˆ™์‚ฌํšŒ ์ธํ”„๋ผ๋กœ์„œ ๋ฏธ๋ž˜

์˜ ๋„คํŠธ์›Œํฌ๊ฐ€ ํ•ด๊ฒฐโˆ™์ง€์›ํ•ด์•ผ ํ•  IT ๊ด€๋ จ ์ •์น˜,

๊ฒฝ์ œ, ์‚ฌํšŒ ๋“ฑ ๋‹ค๋ถ„์•ผ์—์„œ์˜ ๋ฒ”๊ตญ๊ฐ€์  ์ด์Šˆ๋“ค์ด๋‹ค.

๋”ฐ๋ผ์„œ ๋ฐœ์ „์ ์ธ ICT ์ •์ฑ… ์ˆ˜๋ฆฝ์„ ์œ„ํ•ด์„œ๋Š” ๋ฏธ๋ž˜

๋„คํŠธ์›Œํฌ ๊ตฌ์ถ•์„ ๊ทผ๊ฐ„์œผ๋กœ ์ธํ„ฐ๋„ท, ์‚ฌ๋ฌผํ†ต์‹ ์˜ ๊ฐœ

๋…์„ ํฌ๊ด„ํ•˜์—ฌ ํ†ตํ•ฉ์  ์ธํ”„๋ผ ํ•˜๋ถ€๊ตฌ์กฐ๋ฅผ ์„ค๊ณ„ํ•˜

๊ณ  ๋‹ค์–‘ํ•œ ๊ตญ๊ฐ€์  ํ˜„์•ˆ์— ๊ธฐ์—ฌํ•จ์œผ๋กœ์จ ๊ตญ๊ฐ€์˜ ํ˜

์‹ ๊ณผ ๋ฏธ๋ž˜ ๋„์ „๊ณผ์ œ ํ•ด๊ฒฐ์„ ํ†ตํ•ด ๊ตญ๊ฐ€๊ฒฝ์Ÿ๋ ฅ ํ™•๋ณด

์— ๊ธฐ์—ฌํ•˜๋Š” ๋ฐฉ์•ˆ์„ ๋ชจ์ƒ‰ํ•˜๋Š” ๊ฒƒ์ด ์š”๊ตฌ๋œ๋‹ค.

์ด์™€ ๊ด€๋ จํ•˜์—ฌ ๋„คํŠธ์›Œํฌ๋ฅผ ์ค‘์‹ฌ์œผ๋กœ ICT ์ธํ”„๋ผ

์ •์ฑ…์„ ์ˆ˜๋ฆฝํ•  ๊ฒฝ์šฐ ๊ตญ๊ฐ€์  ์ค‘์žฅ๊ธฐ ์ „๋žต์œผ๋กœ ์–ด๋– 

ํ•œ ๋ช…์นญ์„ ์“ธ ๊ฒƒ์ธ์ง€์— ํ•ด ๊ฒ€ํ† ํ•  ํ•„์š”๊ฐ€ ์žˆ๋‹ค.

๋ฏธ๋ž˜์˜ IT ํ™˜๊ฒฝ ๋ณ€ํ™”์— ํ•œ ํ˜„์‹œ์ ์˜ ํŠน์ •ํ•œ ์ถ”์„ธ

์™€ ๋ฐฉํ–ฅ์„ฑ์€ ๊ตญ๋‚ด์™ธ์ ์œผ๋กœโ€˜๋””์ง€ํ„ธ ์ „ํ™˜โ€™์˜ ๊ฐœ๋…

ํ•œ๊ตญ์‚ฌํšŒ ๋ณ€ํ™”์™€ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท ์ •์ฑ…์— ํ•œ ํƒ์ƒ‰์  ์—ฐ๊ตฌ

Internet and Information Security 105

[๊ทธ๋ฆผ 2] IT ๋ฏธ๋ž˜ ์ „๋ง๊ณผ ์ค‘์žฅ๊ธฐ ๋„คํŠธ์›Œํฌ ๋ฐœ์ „ ๋ฐฉํ–ฅ์˜ ์ƒํ˜ธ์—ฐ๊ด€์„ฑ

โ€ป ์—ฐ๊ณ„์„ฑ: Weak Middle Strong

Page 107: nternet I Security - BIGBOOK

์œผ๋กœ ํฌ๊ด„์„ฑ์„ ๋ ๊ณ  ์žˆ๋‹ค. ์šฐ๋ฆฌ๋‚˜๋ผ๋Š” ๋””์ง€ํ„ธ ๋ฏธ๋ž˜

ํ•œ๊ตญ์˜ ๊ฐœ๋… ๋“ฑ์„ ํ†ตํ•ด ํƒ€ ๊ตญ๊ฐ€๋ณด๋‹ค ๋น„์ „์ด๋‚˜ ์ „๋žต

์ธก๋ฉด์—์„œ ์•ž์„  ๋””์ง€ํ„ธ ์ „ํ™˜์„ ํ‘œ๋ฐฉํ•œ ๋ฐ”๊ฐ€ ์žˆ๋‹ค.

ํŠนํžˆ, ํ˜„์žฌ์˜ ๊ฒฝ์ œ ์ƒํ™ฉ์„ ๊ณ ๋ คํ•  ๋•Œ ๊ฒฝ์ œ ์„ฑ์žฅ, ๊ณ 

์šฉ ์ฐฝ์ถœ, ๋””์ง€ํ„ธ ๊ฒฉ์ฐจ ํ•ด์†Œ, ์ง€์‹๊ธฐ๋ฐ˜ ์‚ฌํšŒ ๋“ฑ์„ ์ค‘

์‹ฌ์œผ๋กœ ํ•œ ๋””์ง€ํ„ธ ๊ฒฝ์ œ๋กœ์˜ ์ „ํ™˜์ด ์ง€์†์ ์ธ ์ด์Šˆ

๊ฐ€ ๋  ๊ฒƒ์ด๋‹ค.

์ „ ์„ธ๊ณ„์ ์œผ๋กœ ๋””์ง€ํ„ธ ์ „ํ™˜์ด๋ผ๋Š” ํฌ๊ด„์ ์ธ ์ •

์ฑ… ๋ฐฉํ–ฅ์ด ์„ค์ •๋˜๊ณ  ์žˆ๋Š” ์ƒํ™ฉ๊ณผ ๊ธฐ์ˆ ์˜ ๋ณ€ํ™”์™€ ํ™˜

๊ฒฝ ๋ณ€ํ™”๊ฐ€ ๊ทน์‹ฌํ•˜๊ฒŒ ์ด๋ฃจ์–ด์ง€๋Š” ์ƒํ™ฉ์„ ๊ณ ๋ คํ•  ๋•Œ,

๊ณผ๊ฑฐ์ฒ˜๋Ÿผ ํŠน์ • ์šฉ์–ด์˜ ์„ ํƒ์ด ์‰ฝ์ง€๋Š” ์•Š์„ ๊ฒƒ์œผ๋กœ

๋ณด์ธ๋‹ค. ๋”ฐ๋ผ์„œ ํ–ฅํ›„ ์šฐ๋ฆฌ๋‚˜๋ผ์˜ ICT ์ธํ”„๋ผ ์ •์ฑ…

์œผ๋กœ ์ง€์†์„ฑ ์žˆ๋Š” ์ค‘์žฅ๊ธฐ ๊ณ„ํš ์ˆ˜๋ฆฝ๊ณผ ์ •์ฑ…์˜ ์•ˆ์ •

์ โˆ™์ฒด๊ณ„์  ์šด ์„ ์œ„ํ•ด ํฌ๊ด„์ โˆ™๋ณดํŽธ์  ๋ช…์นญ์„

์‚ฌ์šฉํ•˜๋Š” ๊ฒƒ์„ ๊ณ ๋ คํ•  ํ•„์š”๊ฐ€ ์žˆ๋‹ค. ์ด์™€ ๊ด€๋ จํ•˜์—ฌ

ํฌ๊ด„์„ฑ ์žˆ๋Š” ๋ช…์นญ์„ ์„ ํƒํ•  ๋•Œ, ๊ตญ๊ฐ€ ์ •์ฑ…์ƒ์˜ ์ฐจ

๋ณ„ํ™”๋ฅผ ์œ„ํ•ด ์ •ํ™•ํ•œ ๋ชฉํ‘œ ์‹œ์ ์„ ๋ฐํžˆ๊ณ , ๋‹จ๊ณ„๋ณ„๋กœ

๊ตฌ๋ถ„ํ•˜์—ฌ ์Šฌ๋กœ๊ฑด์„ ์ฑ„ํƒํ•˜๋Š” ๊ฒƒ์ด ํ•˜๋‚˜์˜ ๋ฐฉ์•ˆ์ด

๋  ์ˆ˜ ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ๋‹จ๊ณ„๋ณ„ ์ ‘๊ทผ์„ ํ†ตํ•ด ๊ธ‰๋ณ€ํ•˜๋Š”

๊ธฐ์ˆ โˆ™์ •์น˜โˆ™์‚ฌํšŒโˆ™๋ฌธํ™” ํ™˜๊ฒฝ์„ ๋ฐ˜ ํ•œ ์ˆ˜์ • ๊ณ„ํš

์ˆ˜๋ฆฝ์ด ์šฉ์ดํ•˜๋ฉฐ, ์ค‘๊ฐ„์ ๊ฒ€์„ ํ†ตํ•œ ๋ชฉํ‘œ๋‹ฌ์„ฑ ์—ฌ๋ถ€

์™€ ์ƒˆ๋กœ์šด ์‹œ ์  ์‚ฌ๋ช…์„ ๋ฐ˜ ํ•œ ๊ตญ๊ฐ€์ •์ฑ…๊ณผ์˜ ์—ฐ

๊ณ„๊ฐ€ ์šฉ์ดํ•  ๊ฒƒ์œผ๋กœ ํŒ๋‹จ๋œ๋‹ค. ํ•œํŽธ, ํฌ๊ด„์„ฑ ์žˆ๋Š”

๋ช…์นญ์ด ๋‚˜ํƒ€๋‚ด๋Š” ๋ฐ”๋ฅผ ๋ช…ํ™•ํžˆ ํ•  ์ˆ˜ ์žˆ๋Š” ๋ช…์นญ์˜

ํ•˜๋ถ€๊ตฌ์กฐ ์„ค๊ณ„๊ฐ€ ํ•„์š”ํ•˜๋‹ค. ๋ณธ ์—ฐ๊ตฌ๋Š” ์ด์™€ ๊ฐ™์€

๊ณ ๋ ค์š”์†Œ๋ฅผ ๋ฐ˜ ํ•œ ์ •์ฑ… ๊ฐœ๋…์ธโ€˜๋ฏธ๋ž˜ ๋„คํŠธ์›Œํฌ

(FN: Future Network) 2020โ€™์„ ์ œ์•ˆํ•œ๋‹ค.

โ€˜๋ฏธ๋ž˜ ๋„คํŠธ์›Œํฌ 2020โ€™์€ ์„ธ๊ณ„ ์ตœ๊ณ  ์ˆ˜์ค€์˜ IT

์ธํ”„๋ผ ์„ ๋„ ์ „๋žต์„ ํ†ตํ•ด ๋กœ๋ฒŒ First-mover

Advantage๋ฅผ ์ง€์†์ ์œผ๋กœ ์œ ์ง€ํ•  ์ˆ˜ ์žˆ๋Š” ์ค‘์žฅ๊ธฐ

์ ์ธ ์ฒจ๋‹จ ์ธํ”„๋ผ ํ•˜๋ถ€๊ตฌ์กฐ ์„ค๊ณ„ ๋ฐ ํ†ตํ•ฉ์„ ์œ„ํ•œ

๊ตญ๊ฐ€ ์‹ค์ฒœ ์ „๋žต์ด๋ฉฐ, 2020๋…„์„ ๋ชฉํ‘œ๋กœ ์œตํ•ฉโˆ™์ง€๋Šฅ

ํ™”ํ•˜๊ณ , ๊ฐœ๋ฐฉ๋˜๋ฉฐ, ์ดˆ๊ด‘ ์—ญํ™”ํ•˜๋Š” ๋ฏธ๋ž˜ IT ์ธํ”„๋ผ

์ •์ฑ… ํŒจ๋Ÿฌ๋‹ค์ž„์ด๋‹ค.

๋ฏธ๋ž˜ ๋„คํŠธ์›Œํฌ์˜ ๊ฐœ๋…์„ ๊ตฌ์ฒด์ ์œผ๋กœ ์„ค๋ช…ํ•˜๊ณ ,

๊ตญ๊ฐ€์˜ ์ •์ฑ… ๋ธŒ๋žœ๋“œ๋กœ์„œ ์ฐจ๋ณ„ํ™”๋ฅผ ์‹œ๋„ํ•˜๊ธฐ ์œ„ํ•ด

FN์˜ ์ƒ์„ธ ์˜๋ฏธ๋กœ Future Network(F๏ฟฝN)

๋ฅผ ์ œ์•ˆํ•œ๋‹ค. ๋ฏธ๋ž˜ ๋„คํŠธ์›Œํฌ์˜ ์ •์ฑ… ๋ธŒ๋žœ๋“œ๋กœ์„œ์˜

๊ฐœ๋… ํ™•์žฅ์„ ์œ„ํ•ด FCN(Future Convergent

Network), FIN(Future Intelligent Network),

FON(Future Open Network), FUN(Future

Ultra-broadband Network)์˜ 4๊ฐ€์ง€ ์ฐจ์›์„

[๊ทธ๋ฆผ 3]๊ณผ ๊ฐ™์ด ์ œ์•ˆํ•œ๋‹ค. ์•ž์„  ์—ฐ๊ณ„๋„์—์„œ ์„ค๋ช…

๋œ ๋ฐ”์ฒ˜๋Ÿผ ์ œ์•ˆ๋œ 4๊ฐ€์ง€ ์ฐจ์›์€ ํ•œ๊ตญ์‚ฌํšŒ ๋ฉ”ํƒ€ํŠธ

๋ Œ๋“œ์™€ IT ๋ฏธ๋ž˜ ์ „๋ง๊ณผ ์ ‘ํ•œ ์—ฐ๊ด€๊ด€๊ณ„๋ฅผ ๊ฐ€์ง„๋‹ค.

[๊ทธ๋ฆผ 3]์— ์ œ์‹œ๋œ ๋ฏธ๋ž˜ ์œตํ•ฉ ๋„คํŠธ์›Œํฌ๋Š” ๋‹จ๋ง,

์„œ๋น„์Šค, ๋„คํŠธ์›Œํฌ ๊ฐ„ ์œตํ•ฉ๊ณผ ํ•จ๊ป˜ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท์„ ๊ทผ

๊ฐ„์œผ๋กœ ์ „ ์‚ฌํšŒโˆ™์‚ฐ์—… ๋ถ„์•ผ์™€ ICT๊ฐ€ ์œตํ•ฉ๋˜์–ด ์ƒˆ

๋กœ์šด ๋ถ€๊ฐ€๊ฐ€์น˜๋ฅผ ์ฐฝ์ถœํ•  ์ˆ˜ ์žˆ๋„๋ก ์ง€์›ํ•˜๋Š” ๋„คํŠธ

์›Œํฌ๋ฅผ ์˜๋ฏธํ•œ๋‹ค. ๋ฏธ๋ž˜ ์ง€๋Šฅ ๋„คํŠธ์›Œํฌ๋Š” ์‚ฌ์šฉ์ž์˜

์ทจํ–ฅ, ์ƒํ™ฉ ๋“ฑ์„ ์ธ์ง€ํ•˜๊ณ  ์ถ•์ ๋œ ์ •๋ณด๋ฅผ ํ†  ๋กœ

๋‹ค์–‘ํ•œ ์ง€๋Šฅํ˜• ์„œ๋น„์Šค๋ฅผ ์ฐฝ์ถœํ•˜๊ธฐ ์œ„ํ•œ ๋„คํŠธ์›Œํฌ

๋กœ ์‚ฌ๋ฌผ๋ฐฉ์†กํ†ต์‹ ์˜ ๋ฐœ์ „์ด ์ค‘์š”ํ•œ ์—ญํ• ์„ ์ˆ˜ํ–‰ํ• 

๊ฒƒ์ด๋‹ค. ๋ฏธ๋ž˜ ๊ฐœ๋ฐฉํ˜• ๋„คํŠธ์›Œํฌ๋Š” ํ˜์‹ ๊ณผ ๊ฐœ๋ฐฉ์„ฑ์„

๋ณด์žฅํ•˜๋Š” ์—ด๋ฆฐ ์‹œ์Šคํ…œ์„ ์˜๋ฏธํ•˜๋Š” ๊ฒƒ์œผ๋กœ ๋ชจ๋“  ๋„ค

ํŠธ์›Œํฌ์™€ ๋‹จ๋ง ๋“ฑ์ด ์ˆ˜์šฉ๋˜๋Š” ํ†ตํ•ฉ์ธํ”„๋ผ๋ฅผ ๊ธฐ๋ฐ˜

์œผ๋กœ ๋‹ค์–‘ํ•œ ์„œ๋น„์Šค๊ฐ€ ๊ฒฐํ•ฉ๋˜๋Š” ํ˜•ํƒœ์˜ ๋„คํŠธ์›Œํฌ

๋ฅผ ์˜๋ฏธํ•œ๋‹ค. ๋งˆ์ง€๋ง‰์œผ๋กœ ๋ฏธ๋ž˜ ์ดˆ๊ด‘ ์—ญ ๋„คํŠธ์›Œํฌ

๋Š” ์‚ฌ์‹ค์ ์ด๊ณ  ํ˜„์žฅ๊ฐ ์žˆ๋Š” ์ •๋ณด์˜ ๊ณ ์†โˆ™๊ณ ํ’ˆ์งˆ

์‹ค๊ฐํ˜• ์„œ๋น„์Šค ์ œ๊ณต์„ ์œ„ํ•ด ์—ญํญ์ด ์ดˆ๊ด‘ ์—ญ์œผ

๋กœ ํ™•์žฅ๋˜๋Š” ๋„คํŠธ์›Œํฌ๋ฅผ ์˜๋ฏธํ•˜๋ฉฐ, 2012๋…„ ์ƒ์šฉํ™”

๊ฐ€ ์˜ˆ์ •๋œ Giga ์ธํ„ฐ๋„ท ์ด์ƒ์œผ๋กœ ๋„คํŠธ์›Œํฌ๊ฐ€ ํ™•์žฅ

๋˜๋Š” ๊ฐœ๋…์„ ์˜๋ฏธํ•œ๋‹ค.

์ธํ”„๋ผ ๊ตฌ์ถ• ์ •์ฑ…์œผ๋กœ์„œ์˜โ€˜๋ฏธ๋ž˜ ๋„คํŠธ์›Œํฌ

2020โ€™์—์„œ 2020์€ 2020๋…„์„ ์ง€์นญํ•˜๋Š” ๊ฒƒ์œผ๋กœ

์ตœ์†Œํ•œ 10๋…„์„ ๋‚ด๋‹ค๋ณด๋Š” ๊ณ„ํš์„ ์˜๋ฏธํ•œ๋‹ค. ์ด์™€

๊ด€๋ จํ•˜์—ฌ ์ •์ฑ…์ƒ ๋‹จ๊ณ„๋ณ„ ์ ‘๊ทผ์„ ์‹œ๋„ํ•˜๋Š” ๊ฒƒ์ด ์˜ฌ

๋ฐ”๋ฅธ ๋ฐฉํ–ฅ์ผ ์ˆ˜ ์žˆ๋‹ค. ๊ณผ๊ฑฐ ์ดˆ๊ณ ์†์ •๋ณดํ†ต์‹ ๋ง ๊ตฌ์ถ•

1๏ฟฝ3๋‹จ๊ณ„ ๊ณ„ํš์ฒ˜๋Ÿผ ์ค‘์žฅ๊ธฐ์  ๋ชฉํ‘œ๋ฅผ ๋‹ฌ์„ฑํ•˜๊ธฐ ์œ„

ํ•œ ๋‹จ๊ณ„๋ณ„ ์ ‘๊ทผ์„ ๋„๋ชจํ•˜๋Š” ๊ฒƒ์€ ์•ž์„œ ์„ค๋ช…ํ•œ ๋ฐ”์™€

์ œ ๊ถŒ ์ œ ํ˜ธ

106 ๋…„ ์›”

Page 108: nternet I Security - BIGBOOK

๊ฐ™์ด ํ™˜๊ฒฝ ๋ณ€ํ™”์— ๋”ฐ๋ฅธ ์ˆ˜์ • ๊ณ„ํš ๋ฐ˜ ์ด ์šฉ์ดํ•˜

๋ฉฐ, ๋‹จ๊ณ„๋ณ„ ์ ๊ฒ€ ๋ฐ ์ƒˆ๋กœ์šด ์‹œ ์‚ฌ๋ช…์„ ๋ฐ˜ ํ•œ ๊ตญ

๊ฐ€ ์ •์ฑ…๊ณผ์˜ ์ง€์†์ ์ธ ์—ฐ๊ณ„๋ฅผ ๊ฐ€์ง€๊ธฐ์—๋„ ์šฉ์ดํ•˜

๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค. ์ด๋Ÿฌํ•œ ๋‹จ๊ณ„๋ณ„ ์ ‘๊ทผ์— ํ•ด์„œ๋Š” ํ–ฅํ›„

๊ณ„ํš ์ˆ˜๋ฆฝ ์‹œ์— ๋งŽ์€ ์˜๊ฒฌ์ด ๋ฐ˜ ๋˜์–ด์•ผ ํ•˜๋ฉฐ, ์Šฌ

๋กœ๊ฑด ์„ค์ • ์‹œ ๊ตญ๊ฐ€ ์ตœ์ƒ์œ„ ๋ฏธ๋ž˜ ๊ณ„ํš, ์ค‘์žฅ๊ธฐ IT ์ „

๋žต, ํ•œ๊ตญ์‚ฌํšŒ์˜ ๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ์™€ IT ๋ฏธ๋ž˜ ์ „๋ง์„ ์ตœ

ํ•œ ๋ฐ˜ ํ•ด์•ผ ํ•  ๊ฒƒ์ด๋‹ค.

์ตœ๊ทผ ์ •๋ถ€๋Š” ์ƒˆ๋กœ์šด ์„œ๋น„์Šค์˜ ๋“ฑ์žฅ์œผ๋กœ ์ธํ•ด ํŠธ

๋ž˜ํ”ฝ์ด ๊ธ‰์ฆํ•˜๊ณ , DDoS๋ฅผ ๋น„๋กฏํ•œ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฒฉ์—

ํ•œ ์ทจ์•ฝํ•˜๋ฉฐ, ์ด๋™ ์ค‘์— ์ž์ฃผ ๋Š๊ธฐ๋Š” ๋“ฑ ํ˜„์žฌ์˜

์ธํ„ฐ๋„ท์ด ์ง€๋‹Œ ๋‹ค์–‘ํ•œ ๋ฌธ์ œ์ ์„ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•ด

๋กœ๋ฒŒ ๊ธฐ์ˆ ๊ฒฝ์Ÿ์ด ์‹ฌํ™”๋˜๋Š”๋ฐ ๋น„ํ•ด ๊ตญ๋‚ด ๊ธฐ์ˆ  ์ˆ˜์ค€

์ด ์„ ๋„ ๊ตญ๊ฐ€์— ๋’ค์ฒ˜์ง€๋Š” ํ˜„์‹ค์„ ํ•ด์†Œํ•˜๊ณ  ์šฐ๋ฆฌ๋‚˜

ํ•œ๊ตญ์‚ฌํšŒ ๋ณ€ํ™”์™€ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท ์ •์ฑ…์— ํ•œ ํƒ์ƒ‰์  ์—ฐ๊ตฌ

Internet and Information Security 107

โ‘  ๋ฏธ๋ž˜ ์œตํ•ฉ ๋„คํŠธ์›Œํฌ(FCN)

๏ฟฝICT์‚ฐ์—…์˜ ์ „ ๋ถ„์•ผ ์œตํ•ฉ์œผ๋กœ ์ƒˆ๋กœ์šด ๋ถ€๊ฐ€๊ฐ€์น˜๋ฅผ ์ฐฝ์ถœํ•˜๋Š”

๊ธฐ๋ฐ˜ ์ธํ”„๋ผโ€ป u-City, ITS, Smart Grid, u-Health ๋“ฑ

๏ฟฝ๊ต์œก, ํ–‰์ •, ์—”ํ„ฐํ…Œ์ธ๋จผํŠธ ๋“ฑ์˜ ๋ถ„์•ผ์™€ ICT๊ฐ€ ๊ฒฐํ•ฉํ•œ ๊ฐœ์ธ

๋งž์ถคํ˜• ์„œ๋น„์Šค ์ œ๊ณต ์ธํ”„๋ผ

๏ฟฝ์–‘๋ฐฉํ–ฅ ๋””์ง€ํ„ธTV ๊ธฐ๋ฐ˜์˜ SoTV(Serviceover TV) ์ œ๊ณต

์ธํ”„๋ผ

โ‘ก ๋ฏธ๋ž˜ ์ง€๋Šฅ ๋„คํŠธ์›Œํฌ(FIN)

๏ฟฝ์‚ฌํšŒ ์•ˆ์ „, ์žฌ๋‚œ ์ฒ˜, ๋””์ง€ํ„ธ ์—ญ๊ธฐ๋Šฅ ํ•ด์†Œ, ์ €ํƒ„์†Œ ๋…น์ƒ‰ ์„ฑ์žฅ์—

๊ธฐ์—ฌํ•˜๋Š” ์ƒํ™ฉ์ธ์‹ ๊ธฐ๋ฐ˜ ์ง€๋Šฅ ์ธํ”„๋ผ

๏ฟฝ์‚ฌ๋žŒๅฐ์‚ฌ๋ฌผ, ์‚ฌ๋ฌผๅฐ์‚ฌ๋ฌผ ๊ฐ„ ์ง€๋Šฅ ํ†ต์‹  ์„œ๋น„์Šค๋ฅผ ์•ˆ์ „ํ•˜๊ณ 

ํŽธ๋ฆฌํ•˜๊ฒŒ ์‹ค์‹œ๊ฐ„์œผ๋กœ ์ด์šฉํ•  ์ˆ˜ ์žˆ๋Š” ์ธํ”„๋ผ

๏ฟฝ์ธํ”„๋ผ์— ์ถ•์ ๋œ ์ง€์‹์„ ๊ธฐ๋ฐ˜์œผ๋กœ ๋Šฅ๋™์  context-aware

์„œ๋น„์Šค ์ œ๊ณต ์ธํ”„๋ผ

โ‘ข ๋ฏธ๋ž˜ ๊ฐœ๋ฐฉํ˜• ๋„คํŠธ์›Œํฌ(FON)

๏ฟฝ๊ฐœ๋ฐฉ๊ณผ ์†Œํ†ต์˜ ํ™• ๋ฅผ ์ง€ํ–ฅํ•˜๋ฉฐ, ๋ชจ๋“  ๋ง๊ณผ ์ •๋ณดํ†ต์‹  ๊ธฐ๊ธฐ

๋“ฑ์„ ์ˆ˜์šฉํ•  ์ˆ˜ ์žˆ๋Š” ๋กœ๋ฒŒ ์ธํ”„๋ผ

๏ฟฝ์›น 2.0, ์›น 3.0 ๊ธฐ๋ฐ˜์˜ ์œตํ•ฉํ˜• ์„œ๋น„์Šค ๋ชจ๋ธ(์›น๊ณผ VoIP,

IPTV, USN, ํƒ€ ์‚ฐ์—… ๊ธฐ์ˆ ๊ณผ์˜ ์œตํ•ฉ) ์ œ๊ณตโˆ™ํ™•์‚ฐ์„ ์œ„ํ•œ

๊ฐœ๋ฐฉํ˜• ICT ์ธํ”„๋ผ

โ‘ฃ ๋ฏธ๋ž˜์ดˆ๊ด‘ ์—ญ๋„คํŠธ์›Œํฌ(FUN)

๏ฟฝ๊ธฐ์กด ๊ด‘ ์—ญ๋ง๋ณด๋‹ค 10๋ฐฐ

์ด์ƒ ๋น ๋ฅธ All-IP ๊ธฐ๋ฐ˜์˜

๋ฐฉ์†กํ†ต์‹  ์ธํ”„๋ผ

โ€ป ์ดˆ์‹ค๊ฐํ˜• IPTV, UHDTV ๋“ฑ

[๊ทธ๋ฆผ 3] ๋ฏธ๋ž˜ ๋„คํŠธ์›Œํฌ(Future Network)์˜ ๊ฐœ๋… ํ™•์žฅ

F ๏ฟฝ N 2020

Page 109: nternet I Security - BIGBOOK

๋ผ๋ฅผ 2020๋…„ ์ธํ„ฐ๋„ท ๋กœ๋ฒŒ ๋ฆฌ๋”๋กœ ๋„์•ฝ์‹œํ‚ค๊ธฐ

์œ„ํ•ดโ€˜๋ฏธ๋ž˜๋ฅผ ๋น„ํ•œ ์ธํ„ฐ๋„ท ๋ฐœ์ „๊ณ„ํš(๋ฐฉ์†กํ†ต์‹ ์œ„

์›ํšŒ, 2011b)โ€™์„ ๋ฐœํ‘œํ•˜ ๋‹ค. ์„ธ๋ถ€์ ์œผ๋กœ๋Š” ํ˜„์žฌ

๋ณด๋‹ค 100๋ฐฐ ๋น ๋ฅธ ์„ธ๊ณ„ ์ตœ๊ณ ์†์˜ ๋„คํŠธ์›Œํฌ๋ฅผ ๊ตฌ์ถ•

ํ•˜๊ณ , ๊ธฐ์ˆ ๊ฐœ๋ฐœ ๋ฐ ์‚ฐ์—… ์ •์ฑ…์„ ์ถ”์ง„ํ•˜์—ฌ ์ธํ„ฐ๋„ท

๊ธฐ์—…์˜ ๊ฒฝ์Ÿ๋ ฅ์„ ๊ฐ•ํ™”์‹œํ‚ค๋Š” ๊ฒƒ์ด ๋ชฉํ‘œ๋กœ ์ œ์‹œ๋˜

์—ˆ๋‹ค. โ€˜๋ฏธ๋ž˜๋ฅผ ๋น„ํ•œ ์ธํ„ฐ๋„ท ๋ฐœ์ „๊ณ„ํšโ€™์€ ๋ฏธ๋ž˜์ธ

ํ„ฐ๋„ท์˜ ๊ด€์ ์—์„œ ์•ž์„œ ๋…ผ์˜ํ•œ ์ค‘์žฅ๊ธฐ ๊ตญ๊ฐ€ ICT ์ธ

ํ”„๋ผ๋ฅผ ๊ตฌ์ถ•ํ•˜๊ธฐ ์œ„ํ•œ ๋„คํŠธ์›Œํฌ ๊ตฌ์ถ•์˜ ๋ฐฉํ–ฅ์„ฑ์„

์ œ์‹œํ•˜๊ณ , ์ด๋ฅผ ์‹คํ˜„ํ•˜๊ธฐ ์œ„ํ•œ ๊ธฐ์ˆ  ๋ฐ ์‚ฐ์—… ์ •์ฑ…

์„ ๊ตฌ์ฒดํ™”ํ•˜๊ณ  ์žˆ๋‹ค.

2009๋…„ 11์›” ์•„์ดํฐ์ด ๋„์ž…๋œ ์ดํ›„ ๊ตญ๋‚ด ์Šค๋งˆํŠธ

ํฐ ๊ฐ€์ž…์ž๋Š” ์ง€์†์ ์œผ๋กœ ์ฆ๊ฐ€ํ•˜๊ณ  ์žˆ์œผ๋ฉฐ, ์ด๋™ํ†ต

์‹  3์‚ฌ์˜ ์Šค๋งˆํŠธํฐ ๋ผ์ธ์—… ํ™• ๋ฐ ์ด๋™์ „ํ™” ์•ฝ์ •

๊ธฐ๊ฐ„ ๋งŒ๋ฃŒ์— ๋”ฐ๋ผ ์ฆ๊ฐ€์„ธ๋Š” ๋”์šฑ ๊ฐ€์†ํ™”๋  ์ „๋ง์ด

๋‹ค. ์• ํ”Œ์‚ฌ๋กœ๋ถ€ํ„ฐ ์œ ๋ฐœ๋œ ์Šค๋งˆํŠธ ํ˜๋ช…์˜ ๊ฐ€์žฅ ํฐ

ํŠน์ง•์€ ๊ธฐ์กด์˜ ํ์‡„์ ์ธ ๋ชจ๋ฐ”์ผ ์‹œ์žฅ์„ ๊ฐœ๋ฐฉ์‹œ์ผœ

์ƒˆ๋กœ์šด ์ƒํƒœ๊ณ„๋ฅผ ๊ตฌ์ถ•ํ•จ์œผ๋กœ์จ ์ด์ „๊ณผ ๋‹ค๋ฅธ ๋ณ€ํ™”

๋ฅผ ๊ฐ€์ ธ์˜จ๋‹ค๋Š” ์ ์ด๋‹ค. ๋ชจ๋ฐ”์ผ ์‚ฐ์—…์˜ ๊ฒฝ์šฐ ๊ธฐ์กด์—

๋Š” ์ฝ˜ํ…์ธ  ์‚ฌ์—…์ž, ํ”Œ๋žซํผ ์‚ฌ์—…์ž, ๋„คํŠธ์›Œํฌ ์‚ฌ์—…

์ž์™€ ๋‹จ๋ง์ œ์กฐ์‚ฌ๊ฐ€ ๊ฐ๊ฐ์˜ ๊ฐ€์น˜์‚ฌ์Šฌ์—์„œ ์ „๋ฌธํ™”๋œ

์—ญ์„ ๋‹ด๋‹นํ•˜๋Š” ๋‹จ์ˆœํ•œ ์ƒํƒœ๊ณ„๋ฅผ ํ˜•์„ฑํ–ˆ์—ˆ๋‹ค. ๊ทธ

๋Ÿฌ๋‚˜ ์ƒˆ๋กœ์šด ์ƒํƒœ๊ณ„์—์„œ๋Š” ๊ทธ ๊ณ ์œ  ์—ญ์ด ํ•ด์ฒด ๋ฐ

์žฌ๊ฒฐํ•ฉ๋˜์–ด ๊ฐ€์น˜์‚ฌ์Šฌ์ด ์žฌํŽธ๋˜๊ณ  ์žˆ๋‹ค. ์•ฑ์Šคํ† ์–ด

๋“ฑ์„ ์ค‘์‹ฌ์œผ๋กœ ์ฝ˜ํ…์ธ ์™€ ์†Œํ”„ํŠธ์›จ์–ด์˜ ์œ ํ†ต์ฒด๊ณ„๊ฐ€

ํ˜์‹ ๋˜์—ˆ์œผ๋ฉฐ, ์ฝ˜ํ…์ธ ๏ผํ”Œ๋žซํผ๏ผ๋‹จ๋ง์˜ ํ†ตํ•ฉ ๋น„์ฆˆ

๋‹ˆ์Šค ๋ชจ๋ธ์ด ๋“ฑ์žฅํ•˜๊ณ  ์žˆ๋‹ค. ํ•˜๋“œ์›จ์–ด์˜ ๊ณ ๊ธฐ๋Šฅ์„ฑ

์ด ์•„๋‹ˆ๋ผ, ๋ฐฉ ํ•œ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์ด ์ œ๊ณตํ•˜๋Š” ์ƒˆ๋กœ

์šด ์ด์šฉ์ž ๊ฒฝํ—˜์ด ๊ฐ€์น˜๋ฅผ ์ฐฝ์ถœํ•จ์— ๋”ฐ๋ผ, ๊ฒฝ์Ÿ๋ ฅ์˜

์›์ฒœ์ด ์†Œํ”„ํŠธ์›จ์–ด๋กœ ์ด๋™ํ•˜๊ณ  ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ํ™˜๊ฒฝ

์—์„œ๋Š” ๋ฌด์—‡๋ณด๋‹ค๋„ ์‚ฌ์—…์ž ๊ฐ„, ์ค‘์†Œ๊ธฐ์—… ๊ฐ„์˜ ํ˜‘

๋ ฅ์  ์ƒํƒœ๊ณ„ ๊ตฌ์ถ•์ด ๋น„์ฆˆ๋‹ˆ์Šค์˜ ์„ฑํŒจ๋ฅผ ์ขŒ์šฐํ•˜๊ณ 

์žˆ๋‹ค(ํ™ฉ์ฃผ์„ฑ ์™ธ, 2010).

์Šค๋งˆํŠธ๊ฐ€ ๊ฐ€์ ธ์˜จ ์ด๋Ÿฌํ•œ ๋ณ€ํ™”๋Š” ํ–ฅํ›„ ๋ชจ๋ฐ”์ผ๋ฟ

์ œ ๊ถŒ ์ œ ํ˜ธ

108 ๋…„ ์›”

[๊ทธ๋ฆผ 4] โ€˜๋ฏธ๋ž˜๋ฅผ ๋น„ํ•œ ์ธํ„ฐ๋„ท ๋ฐœ์ „ ๊ณ„ํšโ€™์˜ ์ฃผ์š” ์ •์ฑ…๊ณผ์ œ

Page 110: nternet I Security - BIGBOOK

๋งŒ ์•„๋‹ˆ๋ผ ์œ ์„ , ์‚ฌ๋ฌผํ†ต์‹  ๋“ฑ์œผ๋กœ๋„ ํ™• ๋  ๊ฒƒ์ด

์˜ˆ์ƒ๋˜๋ฉฐ, ์ด์— ํ•œ ์กฐ๊ธฐ ์‘ ์ •์ฑ… ๋งˆ๋ จ์ด ์ค‘์š”

ํ•œ ์‚ฌํ•ญ์ž„์„ ๊ฐ์•ˆํ•  ๋•Œ ๊ตญ๋ฏผ๋“ค์—๊ฒŒ๋„ ๋„๋ฆฌ ์•Œ๋ ค์ง„

์Šค๋งˆํŠธ๋ผ๋Š” ์ด๋ฏธ์ง€๋ฅผ ๋„คํŠธ์›Œํฌ ๊ตฌ์ถ•์—์„œ๋„ ์‚ฌ์šฉํ•˜

๋Š” ๊ฒƒ์ด ๊ฐ€๋Šฅํ•˜๋‹ค. ์Šค๋งˆํŠธํฐ์˜ ์ปค๋ฎค๋‹ˆ์ผ€์ด์…˜์  ํŠน

์„ฑ์€ ํฌ๊ฒŒ ์ด๋™์„ฑ(mobility), ์—ฐ๊ฒฐ์„ฑ(connectivity),

๊ฐœ์ธํ™”(personalization), ํ˜ผ์ข…์„ฑ(hybridity), ๋‹ค

๋ชฉ์ ์„ฑ ๋ฏธ๋””์–ด(multi-purpose media)๋กœ ๋ณผ ์ˆ˜

์žˆ์œผ๋ฉฐ, ์ด๋Š” ๊ธฐ์กด ๋„คํŠธ์›Œํฌ ๊ตฌ์ถ• ๊ณ„ํš์— ๋งŽ์€ ๋ณ€

ํ™”๋ฅผ ๊ฐ€์ ธ์˜ฌ ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ๋‹ค. ๋”ฐ๋ผ์„œ ๋ฏธ๋ž˜ ์Šค๋งˆํŠธ

์ธํ”„๋ผ์˜ ๋น„์ „์„ ์ •๋ฆฝํ•˜๊ณ , ์•„ํ‚คํ…์ฒ˜์˜ ์„ค๊ณ„, ์Šค๋งˆ

ํŠธ ๊ธฐ๊ธฐ๋ฅผ ๋ชจ๋‘ ํฌ๊ด„ํ•˜๋Š” ์ƒํƒœ๊ณ„ ํ”Œ๋žซํผ์˜ ๊ตฌ์ถ•,

์ด๋ฅผ ์œ„ํ•œ R&D ์ „๋žต์˜ ๋ชจ์ƒ‰, ๊ทœ์ œ์™€ ์‹œ์žฅ๊ฒฝ์Ÿ์˜

์กฐํ™” ๋“ฑ์„ ๋ชจ์ƒ‰ํ•˜๋Š” ๊ด€์ ์—์„œโ€˜๋ฏธ๋ž˜๋ฅผ ๋น„ํ•œ ์ธํ„ฐ

๋„ท ๋ฐœ์ „๊ณ„ํšโ€™์ด ๊ฐ€์ง€๋Š” ์˜์˜๋Š” ๋งค์šฐ ํฌ๋‹ค๊ณ  ํ•  ์ˆ˜

์žˆ์„ ๊ฒƒ์ด๋‹ค.

โ€˜๋ฏธ๋ž˜๋ฅผ ๋น„ํ•œ ์ธํ„ฐ๋„ท ๋ฐœ์ „๊ณ„ํšโ€™์—์„œ ์ œ์‹œํ•˜๊ณ 

์žˆ๋Š” ์Šค๋งˆํŠธ ๋„คํŠธ์›Œํฌ์˜ ๊ฐœ๋…์€ [๊ทธ๋ฆผ 5]์™€ ๊ฐ™๋‹ค.

๋ณธ ์—ฐ๊ตฌ์—์„œ ์ œ์‹œํ•œ 4๊ฐ€์ง€ ๋„คํŠธ์›Œํฌ์˜ ์†์„ฑ์€ ์—ญ

ํ•  ๋ฐ ๊ธฐ์—ฌ์— ์ดˆ์ ์„ ๋งž์ถ˜ ๋ฐ˜๋ฉด, ์Šค๋งˆํŠธ ๋„คํŠธ์›Œํฌ

์˜ ๊ฐœ๋…์€ ๊ธฐ๋Šฅ์  ์ธก๋ฉด์— ์ดˆ์ ์„ ๋งž์ถ”์–ด ์ƒํ˜ธ๋ณด์™„

์ ์œผ๋กœ ์—ฐ๊ณ„๋  ์ˆ˜ ์žˆ๋‹ค.

๋ฐ˜๋ฉด, โ€˜๋ฏธ๋ž˜๋ฅผ ๋น„ํ•œ ์ธํ„ฐ๋„ท ๋ฐœ์ „๊ณ„ํšโ€™์€ ๋„คํŠธ

์›Œํฌ ๊ตฌ์ถ•๊ณผ ๊ธฐ์ˆ ๊ฐœ๋ฐœ ๋ฐ ์‚ฐ์—… ํ™œ์„ฑํ™”์— ์ค‘์‹ฌ์„ ๋‘

์–ด ๋ฏธ๋ž˜์ธํ„ฐ๋„ท์ด ์–ด๋– ํ•œ ๋ฏธ๋ž˜ ์‚ฌํšŒ์ƒ์„ ๊ตฌํ˜„ํ•˜๋Š”

๋ฐ ๊ธฐ์—ฌํ•˜๋Š”์ง€, ๋ฒ”๊ตญ๊ฐ€์  ์‚ฌํšŒํ˜„์•ˆ๊ณผ๋Š” ์–ด๋– ํ•œ ์—ฐ

๊ด€์„ฑ์„ ์ง€๋‹ˆ๋Š”์ง€์— ํ•œ ์ œ์‹œ๊ฐ€ ๋ฏธํกํ•œ ์ ์ด ์กด์žฌ

ํ•œ๋‹ค. ์ดˆ๊ณ ์† ๊ตญ๊ฐ€๋ง ๊ตฌ์ถ•๊ณ„ํš, BcN ๊ตฌ์ถ• ๊ธฐ๋ณธ ๊ณ„

ํš ๋“ฑ ๊ธฐ์กด ICT ์ธํ”„๋ผ ๊ตฌ์ถ• ์ •์ฑ…์˜ ํ›„์†์œผ๋กœ ์ˆ˜๋ฆฝ

๋˜๋Š” ์ƒˆ๋กœ์šด ์ธํ”„๋ผ ๊ตฌ์ถ• ์ •์ฑ…์œผ๋กœ ๋น„์ „ ๋ฐ ๋ชฉํ‘œ,

์ถ”์ง„๋ฐฉํ–ฅ, ์ถ”์ง„๊ณผ์ œ๊ฐ€ ๊ธด ํ•˜๊ฒŒ ํ•œ๊ตญ์‚ฌํšŒ ๋ฉ”ํƒ€ํŠธ

๋ Œ๋“œ์™€ IT ๋ฏธ๋ž˜ ์ „๋ง๊ณผ์˜ ๋ช…ํ™•ํ•œ ์—ฐ๊ณ„์„ฑ์ด ์ œ์‹œ๋˜

์–ด์•ผ๋งŒ ๋ฒ”๊ตญ๊ฐ€์  ๊ณต๊ฐ ๋ฅผ ํ˜•์„ฑ์„ ํ†ตํ•ด ์ถ”์ง„์˜ ๋‹น

์œ„์„ฑ์„ ์ฆ ์‹œํ‚ค๋Š” ๊ฒƒ์ด ๊ฐ€๋Šฅํ•˜๋‹ค. ์ฆ‰, ๋ฏธ๋ž˜์ธํ„ฐ๋„ท

์€ ๋ฒ”๊ตญ๊ฐ€์  ์‚ฌํšŒ ํ˜„์•ˆ์„ ํ•ด๊ฒฐํ•˜๋Š” ๋ฐ ๊ธฐ์—ฌํ•˜๊ธฐ ์œ„

ํ•œ ์ธํ”„๋ผ ํ•˜๋ถ€๊ตฌ์กฐ๋กœ์„œ์˜ ์˜๋ฏธ๋ฅผ ์ง€๋‹ˆ๊ธฐ ๋•Œ๋ฌธ์—

๊ตฌ์ฒด์ ์ธ ์ถ”์ง„ ๊ณผ์ œ๋“ค์€ IT ๋ฏธ๋ž˜ ๋ถ€๋ถ„์˜ ์–ด๋– ํ•œ ๋ฌธ

์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ณ , ๋‚˜์•„๊ฐ€ ํ•œ๊ตญ์‚ฌํšŒ์˜ ์˜ฌ๋ฐ”๋ฅธ ๋ณ€ํ™”๋ฅผ

ํ•œ๊ตญ์‚ฌํšŒ ๋ณ€ํ™”์™€ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท ์ •์ฑ…์— ํ•œ ํƒ์ƒ‰์  ์—ฐ๊ตฌ

Internet and Information Security 109

[๊ทธ๋ฆผ 5] ์Šค๋งˆํŠธ ๋„คํŠธ์›Œํฌ ๊ฐœ๋…๋„

Page 111: nternet I Security - BIGBOOK

์ง€์›ํ•˜๋Š”์ง€์— ํ•œ ๋ช…ํ™•ํ•œ ์ธ๊ณผ๊ด€๊ณ„๊ฐ€ ์„ค์ •๋˜์–ด์•ผ

ํ•œ๋‹ค. ์ด์™€ ๊ด€๋ จ๋œ ์ธ๊ณผ๊ด€๊ณ„๋Š” 4์žฅ 1์ ˆ์˜ ์—ฐ๊ณ„๋„๋ฅผ

ํ†ตํ•ด ์‚ฌ๋ก€๋กœ ์„ค๋ช…ํ•œ ๋ฐ” ์žˆ๋‹ค.

๋”ฐ๋ผ์„œ ๋ณธ ์—ฐ๊ตฌ์—์„œ ์ œ์•ˆํ•œ ์ดˆ๊ธฐ ๊ตฌ์ƒ์„ ๋ฐ”ํƒ•์œผ

๋กœ ํ–ฅํ›„ ํ•™๊ณ„์™€ ์—ฐ๊ตฌ๊ณ„, ์ •๋ถ€๊ฐ€ ํ•ฉ์‹ฌํ•˜์—ฌ ๋ฏธ๋ž˜ ์Šค

๋งˆํŠธ ์‚ฌํšŒ์™€ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท์˜ ์—ฐ๊ด€์„ฑ์— ํ•œ ๋ณด๋‹ค ์ง„

์ง€ํ•œ ๋…ผ์˜์™€ ์—ฐ๊ตฌ๊ฐ€ ์ง„ํ–‰๋˜์–ด ๋ฒ”๊ตญ๊ฐ€ ICT ์ธํ”„๋ผ

๋กœ์„œ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท์˜ ๋ฐœ์ „ ๋ฐ ์Šค๋งˆํŠธ ๋„คํŠธ์›Œํฌ ๊ตฌ์ถ•

์˜ ๊ตญ๊ฐ€ ์‚ฌํšŒ์  ์ •์ฑ…์  ๋‹น์œ„์„ฑ์„ ์ œ์‹œํ•˜๊ณ  ์ถ”์ง„๋ ฅ

์„ ๊ฐ•ํ™”ํ•˜๋Š” ๊ฒƒ์ด ํ•„์š”ํ•  ๊ฒƒ์ด๋‹ค.

๋ณธ ์—ฐ๊ตฌ๋Š” ๊ณผ๊ฑฐ์™€ ๊ฐ™์€ ์†๋„ ์ค‘์‹ฌ์˜ ๋„คํŠธ์›Œํฌ ๊ตฌ

์ถ• ์ •์ฑ…๋งŒ์œผ๋กœ๋Š” ๋‹ค๋ณ€ํ™”ํ•˜๋Š” ์‚ฌํšŒ ๋ณ€ํ™”์— ๋’ค์ฒ˜์งˆ

์ˆ˜ ์žˆ์œผ๋ฉฐ, IT์‚ฐ์—… ์ž์ฒด์˜ ์„ฑ์žฅ๋ฟ๋งŒ ์•„๋‹ˆ๋ผ ํƒ€ ์‚ฐ

์—…์˜ ์ƒ์‚ฐ์š”์†Œ์™€ ์ธํ”„๋ผ๋กœ์„œ์˜ ๋ฒ”๊ตญ๊ฐ€์  ๋ฌธ์ œ ํ•ด

๊ฒฐ์— ๊ธฐ์—ฌํ•˜๊ธฐ ์œ„ํ•œ ์ƒˆ๋กœ์šด ์ „๋žต ๊ด€์ ์—์„œ ๋ฏธ๋ž˜์ธ

ํ„ฐ๋„ท์„ ์ค€๋น„ํ•ด์•ผ ํ•  ์‹œ์ ์ด๋ผ๋Š” ๋ฌธ์ œ์ œ๊ธฐ์—์„œ ์‹œ

์ž‘๋˜์—ˆ๋‹ค.

๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ๋ฏธ๋ž˜ ๊ตญ๊ฐ€ ICT ์ธํ”„๋ผ ๊ตฌ์ถ• ์ •์ฑ…

๋ฐฉํ–ฅ ์ˆ˜๋ฆฝ์„ ์œ„ํ•œ ์„ ํ–‰ ์—ฐ๊ตฌ๋กœ 2020๋…„ ๊ธฐ์ค€ IT์™€

ํ•œ๊ตญ์‚ฌํšŒ์˜ ๋ฉ”ํƒ€ํŠธ๋ Œ๋“œ์™€ ๊ด€๋ จํ•˜์—ฌ 3๊ฐœ ์—ญ์— ์žˆ

์–ด 12๊ฐœ ํŠธ๋ Œ๋“œ๋ฅผ ๋„์ถœํ•˜ ๊ณ , ์ด๋ฅผ ๊ทผ๊ฐ„์œผ๋กœ IT์˜

๋ฏธ๋ž˜ ์ „๋ง๊ณผ ๊ด€๋ จํ•˜์—ฌ 3๊ฐœ ์—ญ์˜ 14๊ฐœ ํŠธ๋ Œ๋“œ๋ฅผ

๋ฐœ๊ตดํ•˜ ๋‹ค. ์ด๋ฅผ ์œ„ํ•ด ๋‹ค์–‘ํ•œ ํ™˜๊ฒฝ ๋ณ€ํ™”์™€ ๋ฏธ๋ž˜

์ „๋ง, ์ฃผ์š” ํ˜„์•ˆ ๋ฐ ๋ฏธ๋ž˜ ๊ณผ์ œ ๋“ฑ ๋‹ค๋ฐฉ๋ฉด์˜ ํŠธ๋ Œ๋“œ

์™€ ๋ณ€ํ™”์ƒ์„ ์กฐ์‚ฌํ•˜ ์œผ๋ฉฐ, ๋ถ„์•ผ๋ณ„ ์ „๋ฌธ๊ฐ€์˜ ์‹๊ฒฌ

์— ๋งŽ์€ ๋ถ€๋ถ„ ๋„์›€์„ ๋ฐ›์•˜๋‹ค. ์ด์™€ ๊ฐ™์ด ๋„์ถœ๋œ ํŠธ

๋ Œ๋“œ๋“ค์€ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท ๋ฐœ์ „์„ ์œ„ํ•œ ๋ฏธ๋ž˜ ์—ฐ๊ตฌ๋กœ์„œ

์˜ ํ™œ์šฉ์ด ๊ฐ€๋Šฅํ•จ๊ณผ ๋™์‹œ์— ICT ์ƒ์œ„ ๊ณ„ํš ์ˆ˜๋ฆฝ์—

๋„ ์ผ์ • ๋ถ€๋ถ„ ํ™œ์šฉ๋  ์ˆ˜ ์žˆ์„ ๊ฒƒ์ด๋‹ค.

ํŠธ๋ Œ๋“œ ๋„์ถœ๊ณผ ๋ฏธ๋ž˜ ์ „๋ง์„ ํ†  ๋กœ ๋ณธ ์—ฐ๊ตฌ์—์„œ

๋Š” ์ค‘์žฅ๊ธฐ ๋„คํŠธ์›Œํฌ์˜ ๋ฏธ๋ž˜ ์ •์ฑ… ๋ฐฉํ–ฅ์„ ๋ชจ์ƒ‰ํ•˜

๋‹ค. ๋ฏธ๋ž˜ ๋„คํŠธ์›Œํฌ ๊ตฌ์ถ•์— ์žˆ์–ด ํ–ฅํ›„ ์ตœ์ฒจ๋‹จ ICT

๊ธฐ๋ฐ˜ ํ†ตํ•ฉ ์ธํ”„๋ผ ๊ตฌ์ถ•์„ ํ†ตํ•œ ๋ฏธ๋ž˜ ๊ตญ๊ฐ€ ํ•˜๋ถ€๊ตฌ์กฐ

์„ค๊ณ„์˜ ํ•„์š”์„ฑ์€ ๊ณ„์† ์ฆ ํ•˜๊ณ  ์žˆ์œผ๋ฉฐ, IT ๊ธฐ๋ฐ˜

๋ฏธ๋ž˜ ๊ตญ๊ฐ€์˜ ๋ฐ”๋žŒ์งํ•œ ํ•˜๋ถ€๊ตฌ์กฐ๋ฅผ ์ •๋ฆฝํ•˜๊ธฐ ์œ„ํ•ด

ํ˜„์žฌ ๊ฐœ๋ณ„์ ์œผ๋กœ ์ถ”์ง„๋˜๊ณ  ์žˆ๋Š” ์—ฌ๋Ÿฌ IT ์ธํ”„๋ผ ๋ถ„

์•ผ๋“ค์˜ ๊ณผ๊ฐํ•œ ์—ญ ํŒŒ๊ดด ๋ฐ ํ†ตํ•ฉ์ด ํ•„์š”ํ•œ ์ƒํ™ฉ์ด

๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š”โ€˜๋ฏธ๋ž˜ ๋„คํŠธ์›Œํฌ 2020โ€™์„ ์—ฌ๋Ÿฌ

๋ถ„์•ผ์™€ ์—ฐ๊ณ„ํ•˜๊ณ  ํ˜‘๋ ฅํ•˜์—ฌ ์‹œ๋„ˆ์ง€๋ฅผ ๊ทน ํ™”ํ•˜๋Š”

์ •์ฑ…์œผ๋กœ ์ œ์•ˆํ•˜ ๋‹ค. ๋”๋ถˆ์–ด ์ตœ๊ทผ ๋ฐœํ‘œ๋œโ€˜๋ฏธ๋ž˜๋ฅผ

๋น„ํ•œ ์ธํ„ฐ๋„ท ๋ฐœ์ „๊ณ„ํšโ€™์—์„œ ์ œ์‹œํ•˜๊ณ  ์žˆ๋Š” ๋ฏธ๋ž˜

์ธํ„ฐ๋„ท ์ •์ฑ…์ด ๊ตญ๊ฐ€ ICT ์ธํ”„๋ผ ๊ตฌ์ถ• ๊ด€์ ์—์„œ ์–ด

๋– ํ•œ ์˜์˜๋ฅผ ์ฃผ๋Š”์ง€๋ฅผ ๋ถ„์„ํ•˜๊ณ , ํ–ฅํ›„ ์‹ค์ฒœ์ „๋žต์„

๋งˆ๋ จํ•˜๊ธฐ ์œ„ํ•ด ๋ฏธ๋ž˜์ธํ„ฐ๋„ท์ด ๊ตญ๊ฐ€์‚ฌํšŒ์— ๊ธฐ์—ฌํ•˜๋Š”

์—ญํ• ์„ ๋ช…ํ™•ํ•˜๊ฒŒ ์ œ์‹œํ•  ์ˆ˜ ์žˆ๋„๋ก ์ •์ฑ…์ ์œผ๋กœ ์—ฐ

๊ตฌ๋˜์–ด์•ผ ํ•  ๋ถ€๋ถ„์„ ๋…ผ์˜ํ•˜ ๋‹ค.

๋ณธ ์—ฐ๊ตฌ์˜ ํ•œ๊ณ„๋กœ๋Š” 2020๋…„์„ ๊ธฐ์ค€์œผ๋กœ ํ•œ๊ตญ์‚ฌํšŒ

์˜ ๋ณ€ํ™”์™€ IT ๋ฏธ๋ž˜ ํŠธ๋ Œ๋“œ ๋ณ€ํ™”๋ผ๋Š” ๋ฐฉ ํ•œ ์ฃผ์ œ๋ฅผ

๋„์ถœํ•˜๋‹ค ๋ณด๋‹ˆ ์ „๋ฌธ๊ฐ€ ๋ธํŒŒ์ด์™€ ์‹œ๋‚˜๋ฆฌ์˜ค ๋„์ถœ์—

ํ•œ ๋ณด๋‹ค ์ •๊ตํ•œ ๊ฒ€์ฆ์ด ์ด๋ฃจ์–ด์ง€์ง€ ๋ชปํ•œ ์ ์„ ๋“ค ์ˆ˜

์žˆ๋‹ค. ์ด๋Š” ํ–ฅํ›„ ์ถ”๊ฐ€์ ์ธ ์—ฐ๊ตฌ๋ฅผ ํ†ตํ•ด ๋ณด์™„ํ•ด์•ผ ํ• 

๋ถ€๋ถ„์ด๋ฉฐ, ๋ฏธ๋ž˜ ์ „๋ง๊ณผ ์ค‘์žฅ๊ธฐ ๋„คํŠธ์›Œํฌ ๋ฐœ์ „ ๋ฐฉํ–ฅ

์˜ ์—ฐ๊ณ„์„ฑ๋„ ์ œํ•œ๋œ ์ธ์›์˜ ์ „๋ฌธ๊ฐ€์—๊ฒŒ ๋ธํŒŒ์ด๋ฅผ ํ†ต

ํ•ด ์—ฐ๊ณ„์„ฑ ๊ฐ•๋„๋ฅผ ์˜ˆ์ธกํ•œ ์ ๋„ ์ฃผ๊ด€์ ์ธ ์š”์ธ์˜ ๊ฐœ

์ž… ๊ฐ€๋Šฅ์„ฑ์ด ๋†’์€ ๋‹จ์ ์„ ์ง€๋‹Œ๋‹ค. ๋ณธ ์—ฐ๊ตฌ๋Š” ์ „์ฒด์ 

์ธ ์ •์ฑ… ๋ฐฉํ–ฅ์„ฑ์„ ๋„์ถœํ•˜๊ธฐ ์œ„ํ•œ ์—ฐ๊ตฌ๋กœ ๊ฐ๊ฐ์˜ ์„ธ

๋ถ€ ์ •์ฑ… ์ฃผ์ œ์— ํ•ด ๋ณด๋‹ค ์ • ํ•œ ๋ฐฉ๋ฒ•๋ก ์„ ์‚ฌ์šฉํ•˜

์—ฌ ๊ฐ๊ด€์„ฑ์„ ๋†’์ด๋Š”๋ฐ ์ฃผ๋ ฅํ•  ํ•„์š”์„ฑ์ด ์žˆ๋‹ค.

ํ–ฅํ›„ ๋‹ค์–‘ํ•œ ํ•œ๊ตญ์‚ฌํšŒ์˜ ๋ณ€ํ™”์™€ IT์˜ ๋ฏธ๋ž˜ ์ „๋ง

๋ฐ ์ •์ฑ…์œผ๋กœ ์ œ์•ˆํ•ด ๋ณธโ€˜๋ฏธ๋ž˜ ๋„คํŠธ์›Œํฌ 2020โ€™,

โ€˜์Šค๋งˆํŠธ ๋„คํŠธ์›Œํฌ ๊ตฌ์ถ•โ€™์ด๋ผ๋Š” ์ค‘์žฅ๊ธฐ ์‹ค์ฒœ ์ „๋žต

์˜ ๊ฐœ๋…์— ํ•œ ํ† ์˜๊ฐ€ ์ง€์†์ ์œผ๋กœ ์ด๋ฃจ์–ด์ ธ ์ •์ฑ…

์ ์œผ๋กœ ๋ณด๋‹ค ์ •๊ตํ™”๋˜๊ธฐ๋ฅผ ๋ฐ”๋ผ๋ฉฐ, ์ •์ฑ… ์ œ์•ˆ์„ ๊ธฐ

๋ฐ˜์œผ๋กœ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท ์ค‘์‹ฌ์˜ ๋ฐ”๋žŒ์งํ•œ ๋ฏธ๋ž˜ ๊ตญ๊ฐ€์˜

์ธํ”„๋ผ ์ •์ฑ… ์ถ”์ง„์„ ํ†ตํ•ด ์ง€๊ธˆ๊นŒ์ง€ ์ด๋ฃจ์–ด ์˜จ ์ดˆ๊ณ 

์†์ •๋ณดํ†ต์‹  ์„ ๋„ ๊ตญ๊ฐ€์˜ ๋ช…์„ฑ์„ ์œ ์ง€ํ•˜๊ณ , ํ•œ ๋‹จ๊ณ„

๋” ๋„์•ฝํ•  ์ˆ˜ ์žˆ๋Š” ๊ณ„๊ธฐ๊ฐ€ ๋งˆ๋ จ๋˜๊ธฐ๋ฅผ ๊ธฐ ํ•œ๋‹ค.

์ œ ๊ถŒ ์ œ ํ˜ธ

110 ๋…„ ์›”

Page 112: nternet I Security - BIGBOOK

โ–ถ ์ฐธ๊ณ ๋ฌธํ—Œ

๊ตญ๋ฏผ๊ฑด๊ฐ•๋ณดํ—˜๊ณต๋‹จ (2010. 1). ใ€Ž์ตœ๊ทผ 6๋…„๊ฐ„ ๋…ธ์ธ์„ฑ์งˆ

ํ™˜์œผ๋กœ ์ธํ•œ ์ง„๋ฃŒ๋น„ 3.78๋ฐฐ ์ฆ๊ฐ€ใ€. ๊ตญ๋ฏผ๊ฑด๊ฐ•๋ณด

ํ—˜๊ด€๋ฆฌ๊ณต๋‹จ ๋ณด๋„์ž๋ฃŒ.

๊น€๋ฐฉ๋ฃกโˆ™ํ™ฉ์„ฑํ˜„โˆ™์กฐ ํ™˜ (2009). EU์˜ ๋ฏธ๋ž˜ ICT

์ „๋žต ๋™ํ–ฅ. ใ€Ž์ „์žํ†ต์‹ ๋™ํ–ฅ๋ถ„์„ใ€, 24(2), 84-96.

๊น€์‚ฌํ˜โˆ™์ตœ์ƒํ›ˆ (2010). ์žฌ๋‚œ์•ˆ์ „์ง€ํœ˜๋ฌด์„ ๋ง ๊ตฌ์ถ•

๋ฐฉ์•ˆ ์—ฐ๊ตฌ. ใ€Ž๋ฐฉ์†กํ†ต์‹ ์ •์ฑ…ใ€, 22(8), 1-46.

๋ฐฉ์†กํ†ต์‹ ์œ„์›ํšŒ (2011a). ใ€Ž์Šค๋งˆํŠธ์›Œํฌ ํ™œ์„ฑํ™” ์ถ”์ง„

๊ณ„ํšใ€. ์„œ์šธ: ๋ฐฉ์†กํ†ต์‹ ์œ„์›ํšŒ.

๋ฐฉ์†กํ†ต์‹ ์œ„์›ํšŒ (2011b). ใ€Ž๋ฏธ๋ž˜๋ฅผ ๋น„ํ•œ ์ธํ„ฐ๋„ท ๋ฐœ์ „

๊ณ„ํšใ€. ์„œ์šธ: ๋ฐฉ์†กํ†ต์‹ ์œ„์›ํšŒ.

์ด์›ํƒœ (2010). ใ€ŽํŠธ์œ„ํ„ฐ์˜ ์ •์น˜์‚ฌํšŒ์  ํ–ฅ๊ณผ ์‹œ์‚ฌ์ ใ€

(KISDI Premium Report 2010-6). ๊ณผ์ฒœ: ์ •

๋ณดํ†ต์‹ ์ •์ฑ…์—ฐ๊ตฌ์›.

์ •๊ตญํ™˜โˆ™๋ฌธ์ •์šฑโˆ™ํ™ํ•„๊ธฐ (2009). ใ€Ž์ „์ž์ •๋ถ€ ์„ ์ง„ํ™”๋ฅผ

์œ„ํ•œ ๊ณต๊ณต-๋ฏผ๊ฐ„ ํ˜‘์—…์ด‰์ง„๊ณผ ์—ญํ• ๋ถ„๋‹ด ๋ฐฉ์•ˆ ์—ฐ๊ตฌใ€.

๊ณผ์ฒœ: ์ •๋ณดํ†ต์‹ ์ •์ฑ…์—ฐ๊ตฌ์›.

์ง€์‹๊ฒฝ์ œ๋ถ€โˆ™์ •๋ณดํ†ต์‹ ์‚ฐ์—…์ง„ํฅ์› (2010). ใ€Ž2009๋…„

์ด๋Ÿฌ๋‹ ์‚ฐ์—…์‹คํƒœ์กฐ์‚ฌใ€. ๊ณผ์ฒœ: ์ง€์‹๊ฒฝ์ œ๋ถ€โˆ™์„œ์šธ:

์ •๋ณดํ†ต์‹ ์‚ฐ์—…์ง„ํฅ์›.

์ด๋ฌด์„ฑ (2009). ใ€Ž2009๋…„ํŒ ์ •๋ณดํ†ต์‹ ๋ฐฑ์„œ(ๅนณๆˆ21ๅนด

็‰ˆ ๆƒ…ๅ ฑ้€šไฟก็™ฝๆ›ธ)ใ€. ๋„์ฟ„: ์ด๋ฌด์„ฑ.

์ตœ๋ณด์‹โˆ™์žฅํ˜œ์ง„ (2008. 4. 1). ํ•œ๊ตญ์€ ์•„์ฃผ ํŠน๋ณ„ํ•˜๊ฒŒ

์œ„ํ—˜ํ•œ ์‚ฌํšŒ๋‹ค. ใ€Ž์กฐ์„ ์ผ๋ณดใ€.

ํ†ต๊ณ„์ฒญ (2010). ใ€Ž2010๋…„ ๊ณ ๋ น์žํ†ต๊ณ„ใ€. ์ „: ํ†ต๊ณ„์ฒญ.

ํ˜„ ๊ฒฝ์ œ์—ฐ๊ตฌ์› (2009). ใ€Ž์‚ฌ์ด๋ฒ„ํ…Œ๋Ÿฌ์˜ ์ƒ์‹œ ๊ฐ์‹œ

์ฒด๊ณ„๋ฅผ ๊ตฌ์ถ•ํ•˜์žใ€. ์šฉ์ธ: ํ˜„ ๊ฒฝ์ œ์—ฐ๊ตฌ์›.

ํ™ฉ์ฃผ์„ฑ ์™ธ (2010). ใ€Ž๋””์ง€ํ„ธ ์ปจ๋ฒ„์ „์Šค ๊ธฐ๋ฐ˜ ๋ฏธ๋ž˜์—ฐ๊ตฌ(โ…ก)

์ด๊ด„๋ณด๊ณ ์„œใ€. ๊ณผ์ฒœ: ์ •๋ณดํ†ต์‹ ์ •์ฑ…์—ฐ๊ตฌ์›.

ํ›„์ง€๊ฒฝ์ œ (2011). ใ€Ž์ฐจ์„ธ ํŒŒ์›Œ ๋””๋ฐ”์ด์Šค์™€ ํŒŒ์›Œ ๋ชจ๋“ˆ

๊ด€๋ จ๊ธฐ๊ธฐ ์‹œ์žฅ์˜ ํ˜„ํ™ฉ๊ณผ ์žฅ๋ž˜์ „๋ง 2011(ๆฌกไธ–ไปฃ

ใƒ‘ใƒฏ?ใƒ‡ใƒใ‚คใ‚น&ใƒ‘ใƒฏใ‚จใƒฌ?้€ฃๆฉŸๅ™จๅธ‚ๅ ดใฎ็พ?

ใจ??ๅฑ•ๆœ› 2011)ใ€. ๋„์ฟ„: ํ›„์ง€๊ฒฝ์ œ.

Atkinson, R., Castro D., & Ezell, S. (2009). The digital

road to recovery: A stimulus plan to create jobs,

boost productivity and revitalize America.

Information Technology and Innovation

Foundation. Retrieved from http://www.itif.org/

files/roadtorecovery.pdf

Castro, D., & Atkinson, R. (2009). Ten ideas for

policymakers to drive digital progress. IEEE

Internet Computing, 13(2), 69-73.

EFII (2010). White paper on the future Internet PPP

definition. Heidelberg, Germany: The European

Future Internet Initiative.

ESA & NTIA (2010). Exploring the digital nation:

Home broadband Internet adoption in the United

States. Washington, DC: Economics and Statistics

Administration & National Telecommunications

and Information Administration.

European Commission (2009). Seventh framework

programme (FP7). Retrieved from http://cordis.

europa.eu/fp7/home_en.html

FCC (2010). Connecting America: The national

broadband plan. Washington, DC: Federal

Communications Commission.

Mรผnchner Kreis et al. (2009). Prospects and

opportunities of information and communication

technologies(ICT) and media. Report presented to

Nationaler IT Gipfel 2009.

Pike Research (2010). Green data centers: Power

and cooling infrastructure, IT equipment,

monitoring and management: Business drivers,

market analysis and forecasts. Boulder, CO: Pike

research.

Schadler, T. (2009). US telecommuting forecast: 2009

to 2016. Cambridge, MA: Forrester Research.

Schudson, M. (1998). The good citizen: A history of

ํ•œ๊ตญ์‚ฌํšŒ ๋ณ€ํ™”์™€ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท ์ •์ฑ…์— ํ•œ ํƒ์ƒ‰์  ์—ฐ๊ตฌ

Internet and Information Security 111

Page 113: nternet I Security - BIGBOOK

American civic life. New York: Free Press.

UN (2010). World urbanization prospects: The 2009

revision. New York: United Nations.

์ œ ๊ถŒ ์ œ ํ˜ธ

112 ๋…„ ์›”

Page 114: nternet I Security - BIGBOOK

1. ๋ชฉ์ 

์ด ์ง€์นจ์€ ํ•œ๊ตญ์ธํ„ฐ๋„ท์ง„ํฅ์›(์ดํ•˜โ€œ์ง„ํฅ์›โ€์ด๋ผ

ํ•œ๋‹ค)์˜ ํ•™์ˆ ๋…ผ๋ฌธ์ง‘ใ€ŽInternet and Information

Securityใ€์— ๊ฒŒ์žฌํ•  ์—ฐ๊ตฌ๋…ผ๋ฌธ ๋“ฑ์˜ ํˆฌ๊ณ , ์‹ฌ์‚ฌ,

ํŽธ์ง‘ ๋ฐ ๋ฐœ๊ฐ„ ๋“ฑ์— ๊ด€ํ•œ ์ฃผ์š” ์‚ฌํ•ญ์„ ์ •ํ•จ์„ ๋ชฉ์ 

์œผ๋กœ ํ•œ๋‹ค.

2. ๋ฐœ๊ฐ„์ฃผ๊ธฐ

ใ€ŽInternet and Information Securityใ€๋Š” ์—ฐ 2ํšŒ

(5์›” 31์ผ, 11์›” 30์ผ) ๋ฐœ๊ฐ„ํ•จ์„ ์›์น™์œผ๋กœ ํ•œ๋‹ค.

1. ํŽธ์ง‘์œ„์›ํšŒ ๊ตฌ์„ฑ ๋ฐ ์šด

(1) ใ€ŽInternet and Information Securityใ€์˜ ๋ฐœ

๊ฐ„ ๊ณ„ํš, ํˆฌ๊ณ  ๋…ผ๋ฌธ์˜ ์‹ฌ์‚ฌ ๋ฐ ํŽธ์ง‘ ๋“ฑ์— ๊ด€ํ•œ

์ฃผ์š” ์‚ฌํ•ญ์„ ์‹ฌ์˜ํ•˜๊ธฐ ์œ„ํ•˜์—ฌ ํŽธ์ง‘์œ„์›ํšŒ๋ฅผ

์„ค์น˜ํ•œ๋‹ค.

(2) ํŽธ์ง‘์œ„์›ํšŒ๋Š” ํŽธ์ง‘์œ„์›์žฅ์„ ํฌํ•จํ•˜์—ฌ 11์ธ

๋‚ด์™ธ์˜ ํŽธ์ง‘์œ„์›์œผ๋กœ ๊ตฌ์„ฑํ•œ๋‹ค.

(3) ํŽธ์ง‘์œ„์›์žฅ์€ ์ธํ„ฐ๋„ท ๋ฐ ์ •๋ณด๋ณดํ˜ธ์— ๊ด€ํ•œ ์ „

๋ฌธ์ง€์‹๊ณผ ๊ฒฝํ—˜์ด ์žˆ๋Š” ์ž ์ค‘์—์„œ ํ•œ๊ตญ์ธํ„ฐ๋„ท

์ง„ํฅ์›์žฅ์ด ์œ„์ด‰ํ•˜๋ฉฐ, ํŽธ์ง‘์œ„์›์€ ํ•œ๊ตญ์ธํ„ฐ

๋„ท์ง„ํฅ์›์žฅ์ด ํŽธ์ง‘์œ„์›์žฅ๊ณผ ํ˜‘์˜ํ•˜์—ฌ ์ „๊ณต,

์—ฐ๊ตฌ๊ฒฝ๋ ฅ ๋ฐ ์ „๋ฌธ์„ฑ ๋“ฑ์„ ๊ณ ๋ คํ•˜์—ฌ ์œ„์ด‰ํ•œ๋‹ค.

(4) ํŽธ์ง‘์œ„์›์žฅ๊ณผ ํŽธ์ง‘์œ„์›์˜ ์ž„๊ธฐ๋Š” 2๋…„์œผ๋กœ

ํ•˜๋˜, ์—ฐ์ž„ํ•  ์ˆ˜ ์žˆ๋‹ค.

(5) ํŽธ์ง‘์œ„์›ํšŒ๋Š” ์žฌ์  ํŽธ์ง‘์œ„์› ๊ณผ๋ฐ˜์ˆ˜์˜ ์ฐฌ์„ฑ

์œผ๋กœ ์˜๊ฒฐํ•˜๊ณ , ๊ฐ€๋ถ€ ๋™์ˆ˜์ธ ๊ฒฝ์šฐ์—๋Š” ํŽธ์ง‘

์œ„์›์žฅ์ด ๊ฒฐ์ •ํ•œ๋‹ค.

(6) ์ง„ํฅ์›์€ ํŽธ์ง‘์œ„์›์žฅ ๋ฐ ํŽธ์ง‘์œ„์›์—๊ฒŒ ์†Œ์ •์˜

์ž๋ฌธ๋น„๋ฅผ ์ง€๊ธ‰ํ•  ์ˆ˜ ์žˆ๋‹ค.

1. ๋…ผ๋ฌธํˆฌ๊ณ 

(1) ใ€ŽInternet and Information Securityใ€์—

๊ฒŒ์žฌํ•  ๋…ผ๋ฌธ์˜ ์ฃผ์ œ๋Š” ์ธํ„ฐ๋„ท ๋ฐ ์ •๋ณด๋ณดํ˜ธ์™€

๊ด€๋ จ๋œ ๊ฒƒ์ด์–ด์•ผ ํ•˜๋ฉฐ, ๋…ผ๋ฌธํˆฌ๊ณ ์ž์˜ ์ž๊ฒฉ์€

์ œํ•œํ•˜์ง€ ์•Š๋Š”๋‹ค.

(2) ๋…ผ๋ฌธ์˜ ์›๊ณ ๋Š” ์ œ์ถœ๋œ ๋…ผ๋ฌธ์€ ๊ตญ๋‚ด์™ธ ๋‹ค๋ฅธ

ํ•™์ˆ ์ง€์— ๊ฒŒ์žฌ๋˜์—ˆ๊ฑฐ๋‚˜, ํ˜„์žฌ ๊ฒŒ์žฌ ์‹ฌ์˜ ์ค‘

์ด์–ด์„œ๋Š” ์•ˆ ๋œ๋‹ค.

(3) ์ œ์ถœ๋œ ๋…ผ๋ฌธ์€ ์˜คโˆ™ํƒˆ์ž์˜ ์ˆ˜์ •์„ ์ œ์™ธํ•œ

๋‚ด์šฉ์ƒ์˜ ํŽธ์ง‘๊ณผ ์ˆ˜์ •์„ ํ•˜์ง€ ์•Š๊ณ  ๊ฒŒ์žฌํ•จ์„

์›์น™์œผ๋กœ ํ•˜๋ฉฐ, ๋…ผ๋ฌธ์˜ ๋‚ด์šฉ์— ํ•œ ์ฑ…์ž„์€

๋…ผ๋ฌธํˆฌ๊ณ ์ž๊ฐ€ ์ง„๋‹ค.

(4) ๋…ผ๋ฌธ์€ ํ•œ ๋กœ ์ž‘์„ฑํ•˜๋ฉฐ, ๋ชจ๋“  ๋…ผ๋ฌธ์€ ํ•œ โˆ™

์–ด ์ดˆ๋ก๊ณผ ํ•œ โˆ™ ์–ด ์ฃผ์ œ์–ด๋ฅผ ๋ฐ˜๋“œ์‹œ

์ฒจ๋ถ€ํ•˜์—ฌ์•ผ ํ•œ๋‹ค.

(5) ์ €์ž๋Š” ์ œ1์ €์ž๋ฅผ ์ œ์ผ ์ฒ˜์Œ ๋ช…๊ธฐํ•˜๋ฉฐ, ๊ณต๋™

์ €์ž๋Š” ๋…ผ๋ฌธ์ž‘์„ฑ์— ํ•œ ๊ธฐ์—ฌ๋„๋ฅผ ๊ณ ๋ คํ•˜์—ฌ

๋ช…๊ธฐํ•œ๋‹ค.

(6) ใ€ŽInternet and Information Securityใ€์˜

์—ฐ๊ตฌ์œค๋ฆฌ ๋ฐ ์ €์ž‘๊ถŒ ๊ด€๋ จ์‚ฌํ•ญ์€ ์—ฐ๊ตฌ์œค๋ฆฌ์ง€

์นจ์—์„œ ์ •ํ•˜๋Š” ๋ฐ”์— ์˜ํ•œ๋‹ค.

(7) ๊ธฐํƒ€ ๋…ผ๋ฌธ์˜ ํˆฌ๊ณ ์— ๊ด€ํ•˜์—ฌ ํ•„์š”ํ•œ ์‚ฌํ•ญ์€

๋”ฐ๋กœ ์ •ํ•œ๋‹ค.

๋ฐœ๊ฐ„์ง€์นจ

Internet and Information Security 113

๋ฐœ๊ฐ„์ง€์นจ

Page 115: nternet I Security - BIGBOOK

2. ๋…ผ๋ฌธ ์‹ฌ์‚ฌ์œ„์›์˜ ์„ ์ • ๋ฐ ์‹ฌ์‚ฌ์˜๋ขฐ

(1) ํŽธ์ง‘์œ„์›์žฅ์€ ํˆฌ๊ณ ๋œ ๋…ผ๋ฌธ์˜ ์›๊ณ ๋ฅผ ํŽธ์ง‘์œ„์›

์—๊ฒŒ ํ• ๋‹นํ•˜๊ณ , ์‹ฌ์‚ฌ์œ„์›์„ ์ถ”์ฒœํ•˜๋„๋ก ํ•œ๋‹ค.

(2) ํ•ด๋‹น๋ถ„์•ผ ํŽธ์ง‘์œ„์›์€ ํ• ๋‹น๋œ ๋…ผ๋ฌธ๊ณผ ๊ด€๋ จํ•˜์—ฌ

์—ฐ๊ตฌ์‹ค์ ๊ณผ ์‹ค๋ฌด๊ฒฝํ—˜ ๋“ฑ์„ ๊ณ ๋ คํ•˜์—ฌ 3์ธ

์ด์ƒ์˜ ์‹ฌ์‚ฌ์œ„์›์„ ์ถ”์ฒœํ•œ๋‹ค.

(3) ํŽธ์ง‘์œ„์›์žฅ์€ ํŽธ์ง‘์œ„์›์ด ์ถ”์ฒœํ•œ ์‹ฌ์‚ฌ์œ„์› ์ค‘

3์ธ์„ ์„ ์ •ํ•˜์—ฌ ๋…ผ๋ฌธ์˜ ์‹ฌ์‚ฌ๋ฅผ ์˜๋ขฐํ•˜๋ฉฐ,

์‹ฌ์‚ฌ์œ„์›์„ ๋ณธ ํ•™์ˆ ์ง€์˜ ํŽธ์ง‘์œ„์›์œผ๋กœ ํ•  ์ˆ˜

์žˆ๋‹ค.

(4) ์‹ฌ์‚ฌ์œ„์›์€ ํˆฌ๊ณ ์ž์˜ ์ถœ์‹ ํ•™๊ต, ์†Œ์†๊ธฐ๊ด€

๋“ฑ์„ ๊ณ ๋ คํ•˜์—ฌ ๊ณต์ •ํ•˜๊ฒŒ ์„ ์ •ํ•˜์—ฌ์•ผ ํ•œ๋‹ค.

(5) ์ง„ํฅ์›์€ ์‹ฌ์‚ฌ์œ„์›์—๊ฒŒ ์†Œ์ •์˜ ๋…ผ๋ฌธ์‹ฌ์‚ฌ๋ฃŒ๋ฅผ

์ง€๊ธ‰ํ•  ์ˆ˜ ์žˆ๋‹ค.

3. ๋…ผ๋ฌธ์˜ ์‹ฌ์‚ฌ

(1) ๋…ผ๋ฌธ์˜ ์‹ฌ์‚ฌ๋ฅผ ์˜๋ขฐ ๋ฐ›์€ ์‹ฌ์‚ฌ์œ„์›์€โ€œ๋ฌด์ˆ˜์ •

๊ฒŒ์žฌโ€, โ€œ๋ถ€๋ถ„ ์ˆ˜์ • ํ›„ ๊ฒŒ์žฌโ€, โ€œ ํญ ์ˆ˜์ • ํ›„

์žฌ์‹ฌ์‚ฌโ€, โ€œ๊ฒŒ์žฌ ๋ถˆ๊ฐ€โ€์ค‘ ํ•˜๋‚˜์˜ ์‹ฌ์‚ฌ๊ฒฐ๊ณผ์™€

๊ด€๋ จ ์˜๊ฒฌ์„ ์ž‘์„ฑํ•˜์—ฌ, ์˜๋ขฐ ๋ฐ›์€ ๊ธฐ๊ฐ„(ํ†ต์ƒ

2์ฃผ์ผ) ๋‚ด์— ์ œ์ถœํ•˜์—ฌ์•ผ ํ•œ๋‹ค.

(2) ์œ„์ด‰๋ฐ›์€ ์‹ฌ์‚ฌ์œ„์›์ด ํŠน๋ณ„ํ•œ ์‚ฌ์œ  ์—†์ด 3์ฃผ์ผ

์ด๋‚ด์— ์‹ฌ์‚ฌ๊ฒฐ๊ณผ๋ฅผ ์ œ์ถœํ•˜์ง€ ์•Š๋Š” ๊ฒฝ์šฐ ํŽธ์ง‘

์œ„์›์žฅ์€ ํ•ด๋‹น๋ถ„์•ผ ํŽธ์ง‘์œ„์›๊ณผ ํ˜‘์˜ํ•˜์—ฌ ๋‹ค๋ฅธ

์‹ฌ์‚ฌ์œ„์›์„ ์„ ์ •ํ•˜๊ณ , ์‹ฌ์‚ฌ๋ฅผ ์˜๋ขฐํ•  ์ˆ˜ ์žˆ๋‹ค.

(3) ๋…ผ๋ฌธํˆฌ๊ณ ์ž์™€ ์‹ฌ์‚ฌ์œ„์›์€ ๊ฐ์ž์— ํ•ด ์ต๋ช…

์œผ๋กœ ์ฒ˜๋ฆฌ๋˜์–ด์•ผ ํ•œ๋‹ค.

4. ๋…ผ๋ฌธ์‹ฌ์‚ฌ์˜ ๊ธฐ์ค€

์‹ฌ์‚ฌ์œ„์›์€ ๋‹ค์Œ ๊ฐ ํ˜ธ์˜ ์‹ฌ์‚ฌ๊ธฐ์ค€์— ๋”ฐ๋ผ ๊ฐ๊ด€์ 

์ด๊ณ  ๊ณต์ •ํ•˜๊ฒŒ ๋…ผ๋ฌธ์„ ์‹ฌ์‚ฌํ•˜์—ฌ์•ผ ํ•œ๋‹ค.

โ‘  ๋…ผ๋ฌธ์˜ ์ฒด์žฌ ๋ฐ ์™„์„ฑ๋„

โ‘ก ์—ฐ๊ตฌ๋‚ด์šฉ์˜ ๋…์ฐฝ์„ฑ ๋ฐ ์ฐฝ์˜์„ฑ

โ‘ข ์—ฐ๊ตฌ๋‚ด์šฉ์˜ ์ค‘์š”์„ฑ ๋ฐ ์ธํ„ฐ๋„ท ์ •์ฑ…์—์˜ ๊ธฐ์—ฌ๋„

โ‘ฃ ์—ฐ๊ตฌ๋ฐฉ๋ฒ•์˜ ์ ํ•ฉ์„ฑ

โ‘ค ๊ธฐํƒ€ ํŽธ์ง‘์œ„์›ํšŒ๊ฐ€ ์ •ํ•˜๋Š” ์‚ฌํ•ญ

5. ๋…ผ๋ฌธ๊ฒŒ์žฌ์˜ ํŒ์ •

(1) ๋…ผ๋ฌธ๊ฒŒ์žฌ์˜ ํŒ์ •์€ ์•„๋ž˜์˜ ๊ธฐ์ค€์— ๋”ฐ๋ฅธ๋‹ค.

(2) ํ•ด๋‹น๋ถ„์•ผ ํŽธ์ง‘์œ„์›์€ ์‹ฌ์‚ฌ๊ฒฐ๊ณผ๋ฅผ ์ข…ํ•ฉํ•˜์—ฌ

์œ„ ํ‘œ์˜ ๊ธฐ์ค€์— ๋”ฐ๋ผ ๋…ผ๋ฌธ ๊ฒŒ์žฌ ์—ฌ๋ถ€๋ฅผ ํŒ์ •

ํ•˜๊ณ  ์ด๋ฅผ ํŽธ์ง‘์œ„์›ํšŒ์— ๋ณด๊ณ ํ•œ๋‹ค.

1. ์ˆ˜์ • ํŒ์ • ํˆฌ๊ณ ๋…ผ๋ฌธ์˜ ๊ฒŒ์žฌ

(1) ๋…ผ๋ฌธ๊ฒŒ์žฌ ํŒ์ • ๊ทœ์ •์— ์˜ํ•ดโ€œ์ˆ˜์ •โ€ํŒ์ •์„

ํ†ต๋ณด๋ฐ›์€ ๋…ผ๋ฌธํˆฌ๊ณ ์ž๋Š” ๊ธฐํ•œ ๋‚ด์— ์ˆ˜์ •โˆ™๋ณด

์™„๋œ ๋…ผ๋ฌธ๊ณผ ์ˆ˜์ • ์š”์ง€๋ฅผ ์ œ์ถœํ•˜์—ฌ์•ผ ํ•œ๋‹ค.

๋…ผ๋ฌธํˆฌ๊ณ ์ž๊ฐ€ ์ •๋‹นํ•œ ์‚ฌ์œ  ์—†์ด ๊ธฐํ•œ ๋‚ด์—

์ œ์ถœํ•˜์ง€ ์•Š๋Š” ๊ฒฝ์šฐ์—๋Š” ๋…ผ๋ฌธํˆฌ๊ณ ๋ฅผ ์ฒ ํšŒํ•œ

๊ฒƒ์œผ๋กœ ๋ณธ๋‹ค.

์ œ ๊ถŒ ์ œ ํ˜ธ

114 ๋…„ ์›”

๊ตฌ๋ถ„ ์ตœ์ข…๊ฒฐ๊ณผ ์‹ฌ์‚ฌํ‰๊ฐ€ ์ข…ํ•ฉ ์‹ฌ์‚ฌ์œ„์› 3์ธ์˜ ํ‰๊ฐ€

๋ฌด์ˆ˜์ • ๊ฒŒ์žฌ๋ฌด์ˆ˜์ • ๊ฒŒ์žฌ ํ‰๊ฐ€๊ฐ€

๊ฒŒ ์žฌ2์ธ ์ด์ƒ์ผ ๊ฒฝ์šฐ

๋ถ€๋ถ„ ์ˆ˜์ • ํ›„ ๋ถ€๋ถ„ ์ˆ˜์ • ํ›„ ๊ฒŒ์žฌ ํ‰๊ฐ€๊ฐ€

์ดˆ์‹ฌ๊ฒŒ์žฌ 2์ธ ์ด์ƒ์ผ ๊ฒฝ์šฐ

์žฌ์‹ฌ 1ํšŒ ํญ ์ˆ˜์ • ํ›„ ํญ ์ˆ˜์ • ํ›„ ์žฌ์‹ฌ์‚ฌ ํ‰๊ฐ€๊ฐ€

ํ—ˆ์šฉ ์žฌ์‹ฌ์‚ฌ 2์ธ ์ด์ƒ์ผ ๊ฒฝ์šฐ

๋ถˆ ๊ฐ€ ๊ฒŒ์žฌ ๋ถˆ๊ฐ€๊ฒŒ์žฌ ๋ถˆ๊ฐ€ ํ‰๊ฐ€๊ฐ€

2์ธ ์ด์ƒ์ผ ๊ฒฝ์šฐ

๊ฒŒ ์žฌ ๊ฒŒ์žฌ๊ฐ€ ํ‰๊ฐ€๊ฐ€ 2์ธ ์ด์ƒ์ผ ๊ฒฝ์šฐ

์žฌ์‹ฌ

๋ถˆ ๊ฐ€ ๊ฒŒ์žฌ๋ถˆ๊ฐ€ ํ‰๊ฐ€๊ฐ€ 2์ธ ์ด์ƒ์ผ ๊ฒฝ์šฐ

Page 116: nternet I Security - BIGBOOK

(2) ์žฌ์‹ฌ์€ ์ดˆ์‹ฌ์—์„œโ€œ๋ถ€๋ถ„ ์ˆ˜์ •โ€, โ€œ ํญ ์ˆ˜์ • ํ›„

์žฌ์‹ฌ์‚ฌโ€์˜ ํŒ์ •์„ ๋‚ด๋ฆฐ ์‹ฌ์‚ฌ์œ„์›์—๊ฒŒ ์˜๋ขฐ

ํ•จ์„ ์›์น™์œผ๋กœ ํ•˜๋ฉฐ, ํŽธ์ง‘์œ„์›ํšŒ์—์„œ ํ•„์š”

ํ•˜๋‹ค๊ณ  ํŒ๋‹จํ•˜๋Š” ๊ฒฝ์šฐ ๋‹ค๋ฅธ ์‹ฌ์‚ฌ์œ„์›์„ ์œ„

์ด‰ํ•  ์ˆ˜ ์žˆ๋‹ค.

(3) ์žฌ์‹ฌ์„ ์˜๋ขฐ๋ฐ›์€ ์‹ฌ์‚ฌ์œ„์›์€ ์™„๋ฃŒ์š”์ฒญ์ผ ์ด

๋‚ด์—โ€œ๊ฒŒ์žฌ๊ฐ€โ€๋˜๋Š”โ€œ๊ฒŒ์žฌ ๋ถˆ๊ฐ€โ€๋กœ ์žฌ์‹ฌ ์‹ฌ

์‚ฌ์„œ๋ฅผ ์ž‘์„ฑํ•˜์—ฌ ์ œ์ถœํ•˜์—ฌ์•ผ ํ•œ๋‹ค.

(4) ์ˆ˜์ •โˆ™๋ณด์™„๋œ ๋…ผ๋ฌธ์˜ ์ตœ์ข… ๊ฒŒ์žฌ ์—ฌ๋ถ€๋Š” ํ•ด๋‹น

ํŽธ์ง‘์œ„์›์˜ ํŒ๋‹จ์— ์˜๊ฑฐํ•˜์—ฌ, ํŽธ์ง‘์œ„์›ํšŒ์—์„œ

๊ฒฐ์ •ํ•œ๋‹ค.

2. ์žฌ์‹ฌ ํŒ์ • ํˆฌ๊ณ ๋…ผ๋ฌธ์˜ ๊ฒŒ์žฌ

๋…ผ๋ฌธ๊ฒŒ์žฌ ํŒ์ • ๊ทœ์ •์— ์˜ํ•ดโ€œ์žฌ์‹ฌโ€์˜ ํŒ์ •์„ ํ†ต๋ณด

๋ฐ›์€ ๋…ผ๋ฌธํˆฌ๊ณ ์ž๋Š” ๊ธฐํ•œ ๋‚ด์— ์ˆ˜์ •โˆ™๋ณด์™„๋œ ๋…ผ๋ฌธ๊ณผ

์ˆ˜์ • ์š”์ง€๋ฅผ ์ œ์ถœํ•˜์—ฌ์•ผ ํ•œ๋‹ค. ๋…ผ๋ฌธํˆฌ๊ณ ์ž๊ฐ€ ์ •๋‹นํ•œ

์‚ฌ์œ ์—†์ด 2๊ฐœ์›” ๋‚ด์— ์ œ์ถœํ•˜์ง€ ์•Š๋Š” ๊ฒฝ์šฐ์—๋Š”

๋…ผ๋ฌธํˆฌ๊ณ ๋ฅผ ์ฒ ํšŒํ•œ ๊ฒƒ์œผ๋กœ ๋ณธ๋‹ค.

3. ๊ฒŒ์žฌ ๋ถˆ๊ฐ€ ํŒ์ • ๋…ผ๋ฌธ์˜ ์‹ฌ์‚ฌ ์žฌ์‹ ์ฒญ

โ€œ๊ฒŒ์žฌ ๋ถˆ๊ฐ€โ€ํŒ์ •์„ ๋ฐ›์€ ์›๊ณ ๋Š” ๋…ผ๋ฌธ์˜ ๋‚ด์šฉ์„

๊ทผ๋ณธ์ ์œผ๋กœ ์ˆ˜์ •ํ•˜๊ณ โ€œ์žฌ์‹ ์ฒญโ€์ž„์„ ๋ช…๊ธฐํ•˜์—ฌ ๋‹ค์‹œ

๊ธฐ๊ณ ํ•  ์ˆ˜ ์žˆ๋‹ค.

4. ์ด์˜์‹ ์ฒญ ๋ฐ ์žฌ์‹ฌ์‚ฌ

(1) ๋…ผ๋ฌธํˆฌ๊ณ ์ž๋Š” ์‹ฌ์‚ฌ๊ณผ์ •์ด๋‚˜ ๊ฒฐ๊ณผ์— ๋ถˆ๋ณตํ•˜๋Š”

๊ฒฝ์šฐ ์ƒ์„ธํ•œ ์‚ฌ์œ ๋ฅผ ์ฒจ๋ถ€ํ•˜์—ฌ ์ด์˜๋ฅผ ์ œ๊ธฐํ•˜๊ณ 

์žฌ์‹ฌ์‚ฌ๋ฅผ ์š”๊ตฌํ•  ์ˆ˜ ์žˆ๋‹ค.

(2) ์ด์˜์ œ๊ธฐ ๋ฐ ์žฌ์‹ฌ์‚ฌ ์š”์ฒญ์€ ์„œ๋ฉด์œผ๋กœ๋งŒ ์ œ์ถœ

ํ•˜์—ฌ์•ผ ํ•œ๋‹ค.

(3) ํŽธ์ง‘์œ„์›ํšŒ๋Š” ์ด์˜ ์ œ๊ธฐ ์‚ฌ์œ ๋ฅผ ๊ฒ€ํ† ํ•œ ํ›„

์žฌ์‹ฌ์‚ฌ ์—ฌ๋ถ€๋ฅผ ๊ฒฐ์ •ํ•œ๋‹ค.

(4) ์žฌ์‹ฌ์‚ฌ์˜ ํ•„์š”์„ฑ์ด ์—†๋‹ค๊ณ  ํŒ๋‹จํ•˜๋Š” ๊ฒฝ์šฐ,

ํŽธ์ง‘์œ„์›ํšŒ๋Š” ๊ทธ ์‚ฌ์œ ๋ฅผ ์ด์˜ ์ œ๊ธฐ์ž์—๊ฒŒ

ํ†ต๋ณดํ•œ๋‹ค.

(5) ์žฌ์‹ฌ์‚ฌ์˜ ํ•„์š”์„ฑ์ด ์žˆ๋‹ค๊ณ  ํŒ๋‹จํ•˜๋Š” ๊ฒฝ์šฐ,

ํŽธ์ง‘์œ„์›ํšŒ๋Š” ์ œ5์กฐ ์ดํ•˜์— ์˜๊ฑฐ, ์ƒˆ๋กœ์šด ํˆฌ๊ณ 

๋…ผ๋ฌธ๊ณผ ๋™์ผํ•œ ์‹ฌ์‚ฌ๊ณผ์ •์„ ๊ฑฐ์น˜๊ฒŒ ํ•œ๋‹ค. ์ด๋•Œ

์‹ฌ์‚ฌ์œ„์›์€ ์›๋ž˜ ์‹ฌ์‚ฌ์œ„์›๊ณผ ์ค‘๋ณต๋˜์ง€ ์•Š๋„๋ก

์„ ์ •ํ•œ๋‹ค.

5. ๋…ผ๋ฌธ ๊ฒŒ์žฌ์— ํ•œ ์ตœ์ข…ํŒ๋‹จ

์‹ฌ์‚ฌ๋ฅผ ์™„๋ฃŒํ•œ ๋…ผ๋ฌธ์˜ ๊ฒŒ์žฌ์—ฌ๋ถ€์— ํ•ด ํŽธ์ง‘์œ„

์›ํšŒ์—์„œ ์ตœ์ข… ๊ฒฐ์ •ํ•œ๋‹ค.

1. ํ‘œ์ ˆ ์ง€์ ์˜ ์ฒ˜๋ฆฌ

(1) ํŽธ์ง‘์œ„์›ํšŒ๋Š” ํ‘œ์ ˆ์ด๋ž€ ์˜๊ฒฌ์ด ์ œ์‹œ๋˜๊ณ 

ํ‘œ์ ˆ์— ํ•ด์„œ ๋‹คํˆผ์˜ ์—ฌ์ง€๊ฐ€ ์žˆ๋‹ค๊ณ  ํŒ๋‹จํ•˜๋Š”

๊ฒฝ์šฐ์— ์‹ฌ์‚ฌ๋ฅผ ์ค‘๋‹จํ•œ๋‹ค.

(2) ์ด๋•Œ ํŽธ์ง‘์œ„์›ํšŒ๋Š” ํ‘œ์ ˆ ์ง€์  ๋‚ด์šฉ๊ณผ ๊ด€๋ จ

์ž๋ฃŒ๋ฅผ ๋…ผ๋ฌธํˆฌ๊ณ ์ž์—๊ฒŒ ํ†ต๋ณดํ•œ๋‹ค.

(3) ๋…ผ๋ฌธํˆฌ๊ณ ์ž๋Š” ๋‹คํˆผ์ด ํ•ด๊ฒฐ๋˜์—ˆ์Œ์„ ์ฆ๋น™ํ•˜๋Š”

๋‚ด์šฉ์˜ ์ž๋ฃŒ๋ฅผ ์ฒจ๋ถ€ํ•˜์—ฌ ์žฌํˆฌ๊ณ ํ•  ์ˆ˜ ์žˆ๋‹ค.

2. ์ €์ž‘์žฌ์‚ฐ๊ถŒ ์นจํ•ด

(1) ํŽธ์ง‘์œ„์›ํšŒ๋Š” ์ €์ž‘์žฌ์‚ฐ๊ถŒ์ด ์นจํ•ด๋˜์—ˆ๋‹ค๋Š”

์˜๊ฒฌ์ด ์ œ์‹œ๋˜๊ณ  ์ €์ž‘์žฌ์‚ฐ๊ถŒ์— ํ•ด ๋‹คํˆผ์˜

์—ฌ์ง€๊ฐ€์žˆ๋‹ค๊ณ ํŒ๋‹จ๋˜๋Š”๊ฒฝ์šฐ์‹ฌ์‚ฌ๋ฅผ์ค‘๋‹จํ•œ๋‹ค.

(2) ์ €์ž‘์žฌ์‚ฐ๊ถŒ ์นจํ•ด์— ๋”ฐ๋ฅธ ํŒ๋‹จ๊ณผ ๊ด€๋ จ ์กฐ์น˜๋Š”

์—ฐ๊ตฌ์œค๋ฆฌ์ง€์นจ์—์„œ ์ •ํ•œ ๋ฐ”์— ๋”ฐ๋ฅธ๋‹ค.

๋ฐœ๊ฐ„์ง€์นจ

Internet and Information Security 115

Page 117: nternet I Security - BIGBOOK

1. ํŒ๊ถŒ ๋“ฑ

(1) ใ€ŽInternet and Information Securityใ€์—

๊ฒŒ์žฌ๋œ ๋…ผ๋ฌธ์˜ ํŒ๊ถŒ์€ ์ง„ํฅ์›์— ๊ท€์†ํ•œ๋‹ค.

(2) ๋…ผ๋ฌธํˆฌ๊ณ ์ž๋Š” ๊ฒŒ์žฌ๋œ ๋…ผ๋ฌธ์„ ๋‹ค๋ฅธ ํ•™์ˆ ์ง€

๋˜๋Š” ๋ฐœ๊ฐ„๋ฌผ ๋“ฑ์— ๊ฒŒ์žฌํ•˜๊ฑฐ๋‚˜ ํ™œ์šฉํ•˜๊ณ ์ž ํ• 

๊ฒฝ์šฐ์—๋Š” ๋ฐ˜๋“œ์‹œใ€ŽInternet and Information

Securityใ€์— ๊ฒŒ์žฌ๋œ ๋…ผ๋ฌธ์ž„์„ ๋ฐํ˜€์•ผ ํ•œ๋‹ค.

2. ๋น„ ์œ ์ง€

ํŽธ์ง‘์œ„์›์žฅ ๋ฐ ํŽธ์ง‘์œ„์›, ์‹ฌ์‚ฌ์œ„์›์€ ํˆฌ๊ณ ๋…ผ๋ฌธ์˜

์‹ฌ์‚ฌโˆ™๊ฒŒ์žฌ์™€ ๋…ผ๋ฌธํˆฌ๊ณ ์ž์— ๊ด€ํ•œ ์‚ฌํ•ญ์„ ์ •๋‹นํ•œ

์ด์œ ์—†์ด ๋ˆ„์„คํ•˜์—ฌ์„œ๋Š” ์•ˆ ๋œ๋‹ค.

3. ๋ณด์น™

ใ€ŽInternet and Information Securityใ€์˜ ๋ฐœ๊ฐ„๊ณผ

๊ด€๋ จํ•˜์—ฌ ์ด ์ง€์นจ์—์„œ ์ •ํ•˜์ง€ ์•„๋‹ˆํ•œ ์‚ฌํ•ญ์€ ํŽธ์ง‘

์œ„์›ํšŒ์˜ ์‹ฌ์˜๋ฅผ ๊ฑฐ์ณ ๋”ฐ๋กœ ์ •ํ•œ๋‹ค.

์ œ ๊ถŒ ์ œ ํ˜ธ

116 ๋…„ ์›”

Page 118: nternet I Security - BIGBOOK

1. ๋ชฉ์ 

๋ณธ ์œค๋ฆฌ์ง€์นจ์€ ์ธํ„ฐ๋„ท์ง„ํฅ์›์—์„œ ๋ฐœ๊ฐ„ํ•˜๋Š” ํ•™์ˆ 

๋…ผ๋ฌธ์ง‘ใ€ŽInternet and Information Securityใ€์˜

์—ฐ๊ตฌ์œค๋ฆฌ๋ฅผ ์ œ๊ณ ํ•˜๊ณ  ์ง„์‹ค์„ฑ์„ ๋ช…ํ™•ํžˆ ๋ฐํžˆ๋„๋ก

์—ญํ• ๊ณผ ์ฑ…์ž„์˜ ์›์น™์„ ์ œ์‹œํ•˜๋Š”๋ฐ ๊ทธ ๋ชฉ์ ์ด ์žˆ๋‹ค.

2. ์ ์šฉ ์ƒ

์ด์ง€์นจ์€ใ€ŽInternet and Information Securityใ€์—

ํˆฌ๊ณ ํ•˜๋Š” ๋ชจ๋“  ์—ฐ๊ตฌ์ž ๋ฐ ์ด๋ฅผ ์ง€์›ํ•˜๊ณ  ๊ด€๋ฆฌํ•˜๋Š”

๋ณธ ๊ธฐ๊ด€์˜ ํŽธ์ง‘์œ„์›๊ณผ ์‹ฌ์‚ฌ์œ„์›์„ ๊ทธ ์ƒ์œผ๋กœ ํ•œ๋‹ค.

3. ์ ์šฉ๋ฒ”์œ„

๋ณธ ํ•™์ˆ ๋…ผ๋ฌธ์ง‘์„ ํ†ตํ•ด ํˆฌ๊ณ  ๋ฐ ๋ฐœํ‘œ๋˜๋Š” ๋ชจ๋“ 

๋…ผ๋ฌธ์€ ๋‹ค๋ฅธ ๋ฒ•๋ น์— ํŠน๋ณ„ํ•œ ๊ทœ์ •์ด ์žˆ๋Š” ๊ฒฝ์šฐ๋ฅผ

์ œ์™ธํ•˜๊ณ ๋Š” ๋ณธ ์ง€์นจ์„ ์ค€์ˆ˜ํ•˜์—ฌ์•ผ ํ•œ๋‹ค. ์ด ์ง€์นจ์„

์ ์šฉํ•˜๊ธฐ์–ด๋ ค์šด๋ถ„์•ผ์˜ํŠน์ˆ˜ํ•œ์‚ฌ์ •์ด์žˆ๋Š”๊ฒฝ์šฐ์—๋Š”

์ด๋ฅผ ๊ณ ๋ คํ•˜์—ฌ ์ ์šฉํ•  ์ˆ˜ ์žˆ๋‹ค.

4. ์—ฐ๊ตฌ๋ถ€์ •ํ–‰์œ„์˜ ๋ฒ”์œ„

์ด ์ง€์นจ์—์„œ ์ œ์‹œํ•˜๋Š” ์—ฐ๊ตฌ๋ถ€์ •ํ–‰์œ„(์ดํ•˜โ€œ๋ถ€์ •

ํ–‰์œ„โ€๋ผ ํ•œ๋‹ค)๋Š” ๋…ผ๋ฌธ์˜ ๋ฐœํ‘œ ๋ฐ ๊ฒŒ์žฌ์™€ ์—ฐ๊ตฌ์˜

์ œ์•ˆ, ์—ฐ๊ตฌ์˜ ์ˆ˜ํ–‰, ์—ฐ๊ตฌ๊ฒฐ๊ณผ์˜ ๋ณด๊ณ  ๋ฐ ๋ฐœํ‘œ ๋“ฑ์—์„œ

ํ–‰ํ•˜์—ฌ์ง„ ์œ„์กฐโˆ™๋ณ€์กฐโˆ™ํ‘œ์ ˆ, ๋ถ€๋‹นํ•œ ๋…ผ๋ฌธ์ €์ž ํ‘œ์‹œ,

์ค‘๋ณต๊ฒŒ์žฌ, ๊ณต์  ํ—ˆ์œ„์ง„์ˆ  ๋“ฑ์„ ๋งํ•˜๋ฉฐ ์•„๋ž˜์™€ ๊ฐ™๋‹ค.

(1) ์กด์žฌํ•˜์ง€ ์•Š๋Š” ๋ฐ์ดํ„ฐ ๋˜๋Š” ์—ฐ๊ตฌ๊ฒฐ๊ณผ ๋“ฑ์„

ํ—ˆ์œ„๋กœ ๋งŒ๋“ค์–ด ๋‚ด๋Š” ์œ„์กฐ ํ–‰์œ„

(2) ์—ฐ๊ตฌ๊ณผ์ •๋“ฑ์„์ธ์œ„์ ์œผ๋กœ์กฐ์ž‘ํ•˜๊ฑฐ๋‚˜๋ฐ์ดํ„ฐ๋ฅผ

์ž„์˜๋กœ ๋ณ€ํ˜•โˆ™์‚ญ์ œํ•จ์œผ๋กœ์จ ์—ฐ๊ตฌ๋‚ด์šฉ ๋˜๋Š”

๊ฒฐ๊ณผ๋ฅผ ์™œ๊ณกํ•˜๋Š” ๋ณ€์กฐ ํ–‰์œ„

(3) ํƒ€์ธ์˜์•„์ด๋””์–ด, ์—ฐ๊ตฌ๋‚ด์šฉ๋ฐ๊ฒฐ๊ณผ๋“ฑ์„์ •๋‹นํ•œ

์Šน์ธ ๋˜๋Š” ์ธ์šฉ ์—†์ด ๋„์šฉํ•˜๋Š” ํ‘œ์ ˆ ํ–‰์œ„

(4) ์—ฐ๊ตฌ๋‚ด์šฉ๋˜๋Š”๊ฒฐ๊ณผ์— ํ•˜์—ฌ๊ณผํ•™์ โˆ™๊ธฐ์ˆ ์ โˆ™

ํ•™์ˆ ์  ๊ณตํ—Œ ๋ฐ ๊ธฐ์—ฌ๋ฅผ ์‹ค์งˆ์ ์œผ๋กœ ์ œ๊ณตํ•œ

์‚ฌ๋žŒ์—๊ฒŒ ์ •๋‹นํ•œ ์ด์œ ์—†์ด ๋…ผ๋ฌธ์ €์ž ์ž๊ฒฉ์„

๋ถ€์—ฌํ•˜์ง€ ์•Š๊ฑฐ๋‚˜ ๊ณผํ•™์ โˆ™๊ธฐ์ˆ ์ โˆ™ํ•™์ˆ ์ 

๊ณตํ—Œ ๋˜๋Š” ๊ธฐ์—ฌ๋ฅผ ํ•˜์ง€ ์•Š์€ ์ž์—๊ฒŒ ๊ฐ์‚ฌ์˜

ํ‘œ์‹œ ๋˜๋Š” ์˜ˆ์šฐ ๋“ฑ์„ ์ด์œ ๋กœ ๋…ผ๋ฌธ์ €์ž ์ž๊ฒฉ์„

๋ถ€์—ฌํ•˜๋Š” ๋ถ€๋‹นํ•œ ๋…ผ๋ฌธ์ €์ž์˜ ํ‘œ์‹œ ํ–‰์œ„

(5) ๋™์ผํ•œ ๋‚ด์šฉ์˜ ๋…ผ๋ฌธ์„ ๋‘ ๊ฐœ ์ด์ƒ์˜ ํ•™์ˆ ์ง€์—

์ค‘๋ณต ๊ฒŒ์žฌํ•œ ํ–‰์œ„

(6) ๋ณธ์ธ์˜ ํ•™๋ ฅ, ๊ฒฝ๋ ฅ, ์ž๊ฒฉ, ์—ฐ๊ตฌ์—…์  ๋ฐ ๊ฒฐ๊ณผ

๋“ฑ์— ๊ด€ํ•œ ๊ณต์ ์„ ํ—ˆ์œ„ ์ง„์ˆ ํ•œ ํ–‰์œ„

(7) ๋ณธ์ธ๋˜๋Š”ํƒ€์ธ์˜๋ถ€์ •ํ–‰์œ„ํ˜์˜์— ํ•œ์กฐ์‚ฌ๋ฅผ

๊ณ ์˜๋กœ ๋ฐฉํ•ดํ•˜๊ฑฐ๋‚˜ ์ œ๋ณด์ž์—๊ฒŒ ์œ„ํ•ด๋ฅผ ๊ฐ€ํ•˜๋Š”

ํ–‰์œ„

(8) ํƒ€์ธ์—๊ฒŒ ์œ„์˜ ๋ถ€์ •ํ–‰์œ„๋ฅผ ํ–‰ํ•  ๊ฒƒ์„ ์ œ์•ˆโˆ™

๊ฐ•์š”ํ•˜๊ฑฐ๋‚˜ ํ˜‘๋ฐ•ํ•˜๋Š” ํ–‰์œ„

(9) ๊ธฐํƒ€, ๊ด€๋ จ ํ•™๊ณ„์—์„œ ํ†ต์ƒ์ ์œผ๋กœ ์šฉ์ธ๋˜๋Š”

๋ฒ”์œ„๋ฅผ ์‹ฌ๊ฐํ•˜๊ฒŒ ๋ฒ—์–ด๋‚œ ํ–‰์œ„

1. ์—ฐ๊ตฌ์˜ ์ง„์‹ค์„ฑ

(1) ๋…ผ๋ฌธํˆฌ๊ณ ์ž๋Š” ๋ชจ๋“  ์—ฐ๊ตฌ๋ฅผ ์ •์งํ•˜๊ณ  ์ง„์‹คํ•˜๊ฒŒ

์ˆ˜ํ–‰ํ•ด์•ผ ํ•œ๋‹ค.

(2) ๋…ผ๋ฌธํˆฌ๊ณ ์ž๋Š” ๋ชจ๋“  ์—ฐ๊ตฌํ–‰์œ„๊ฐ€ ํŽธ๊ฒฌ๊ณผ ์˜ˆ๋‹จ

์—†์ด ์ด๋ฃจ์–ด์ง€๋„๋ก ํ•˜์—ฌ์•ผ ํ•œ๋‹ค.

(3) ๋…ผ๋ฌธํˆฌ๊ณ ์ž๋Š” ์—ฐ๊ตฌ์˜ ๋‚ด์šฉ๊ณผ ๊ทธ ์ค‘์š”์„ฑ์—

์—ฐ๊ตฌ์œค๋ฆฌ์ง€์นจ

Internet and Information Security 117

์—ฐ๊ตฌ์œค๋ฆฌ์ง€์นจ

Page 119: nternet I Security - BIGBOOK

ํ•˜์—ฌ ๊ฐ๊ด€์ ์œผ๋กœ ์ •ํ™•ํ•˜๊ฒŒ ๊ธฐ์ˆ ํ•˜์—ฌ์•ผ ํ•˜๊ณ ,

์—ฐ๊ตฌ์˜ ๊ฒฐ๊ณผ๋ฅผ ์ž„์˜๋กœ ์ œ์™ธํ•˜๊ฑฐ๋‚˜ ์ฒจ๊ฐ€ํ•˜์ง€

๋ง์•„์•ผ ํ•œ๋‹ค. ๋˜ํ•œ ์ €์ž๋Š” ๋™์ผํ•œ ๋‚ด์šฉ์ด ์ด๋ฏธ

๋ฐœํ‘œ๋˜์ง€์•Š์•˜๋Š”๊ฐ€๋ฅผ์ตœ์„ ์„๋‹คํ•˜์—ฌํ™•์ธํ•˜์—ฌ์•ผ

ํ•œ๋‹ค.

2. ์—ฐ๊ตฌ์˜ ๊ฐ€์น˜ ํ™•๋ฆฝ

(1) ์—ฐ๊ตฌ๋…ผ๋ฌธ์—๋Š” ํ•™์ˆ ์ ์œผ๋กœ ์ถฉ๋ถ„ํ•œ ๊ฐ€์น˜๊ฐ€ ์žˆ๋Š”

๊ฒฐ๋ก ๊ณผ๊ทธ๊ฒƒ์„๋’ท๋ฐ›์นจํ• ์ˆ˜์žˆ๋Š”ํฌ๊ด„์ ์ธ๋…ผ๊ฑฐ๊ฐ€

์ข…ํ•ฉ์ ์œผ๋กœํฌํ•จ๋˜์–ด์žˆ์–ด์•ผํ•œ๋‹ค. ์ด๋ฏธ๋ฐœํ‘œํ•œ

๋…ผ๋ฌธ๊ณผ ๋™์ผํ•œ ๊ฒฐ๋ก ์„ ์ฃผ์žฅํ•˜๋Š” ์—ฐ๊ตฌ ๋…ผ๋ฌธ์„

ํˆฌ๊ณ ํ•˜๋Š” ๊ฒฝ์šฐ์—๋Š” ์ƒˆ๋กœ์šด ๋…ผ๊ฑฐ์— ์ค‘ ํ•œ

ํ•™์ˆ ์ ์ธ ๊ฐ€์น˜๊ฐ€ ์žˆ์–ด์•ผ๋งŒ ํ•œ๋‹ค.

(2) ์—ฐ๊ตฌ๋…ผ๋ฌธ์—๋Š” ์ถฉ๋ถ„ํ•œ ๊ฒฝํ—˜์„ ๊ฐ€์ง„ ์—ฐ๊ตฌ์ž๋“ค์ด

์—ฐ๊ตฌ์˜๋‚ด์šฉ์„๋ฐ˜๋ณตํ•˜์—ฌ์ˆ˜ํ–‰ํ• ์ˆ˜์žˆ์„์ •๋„๋กœ

์ž์„ธํ•œ ์„ค๋ช…์ด ํฌํ•จ๋˜์–ด ์žˆ์–ด์•ผ ํ•œ๋‹ค.

3. ์—ฐ๊ตฌ๊ฒฐ๊ณผ์˜ ์‚ฌํšŒ์  ๊ธฐ์—ฌ

์ €์ž๋Š” ์—ฐ๊ตฌ๋ฅผ ํ†ตํ•ด ์‚ฌํšŒ์  ์ด์ต์„ ์ฆ์ง„์‹œํ‚ค๊ณ 

๊ณต์ต์˜ ๊ธฐ์ค€์— ๋ถ€ํ•ฉํ•˜๋„๋ก ๋…ธ๋ ฅํ•ด์•ผ ํ•˜๋ฉฐ, ์ž์‹ ์˜

์—ฐ๊ตฌ๊ฐ€ ์‚ฌํšŒ์— ๋ฏธ์น  ํ–ฅ์„ ์ž๊ฐํ•˜๊ณ  ์ „๋ฌธ๊ฐ€๋กœ์„œ

์ฑ…์ž„์„ ๋‹คํ•˜์—ฌ์•ผ ํ•œ๋‹ค.

4. ์ธ์šฉ ๋ฐ ์ฐธ๊ณ  ํ‘œ์‹œ

(1) ์ €์ž๋Š” ์ถœ์ฒ˜ ํ‘œ์‹œ์™€ ์ฐธ๊ณ ๋ฌธํ—Œ ๋ชฉ๋ก ์ž‘์„ฑ์˜

์ •ํ™•์„ฑ์„ ๊ธฐํ•˜์—ฌ์•ผ ํ•œ๋‹ค. ์ €์ž๋Š” ์ธ์šฉ์˜ ๋ชจ๋“ 

์š”์†Œ(์ €์ž๋ช…, ํ•™์ˆ ์ง€์˜ ๊ถŒโˆ™ํ˜ธ์ˆ˜, ํŽ˜์ด์ง€,

์ถœ๊ฐ„๋…„๋„ ๋“ฑ)๋ฅผ ์› ๋…ผ๋ฌธ์—์„œ ์ง์ ‘ ํ™•์ธํ•ด์•ผ

ํ•˜๋ฉฐ ์ด์ฐจ ์ถœ์ฒ˜์— ์˜์กดํ•˜์ง€ ์•Š๋„๋ก ํ•ด์•ผ ํ•˜๊ณ ,

๋ถˆ๊ฐ€ํ”ผํ•œ ๊ฒฝ์šฐ์—๋Š” ์žฌ์ธ์šฉ์„ ๋ฐํžˆ๊ณ  ์ธ์šฉํ• 

์ˆ˜ ์žˆ๋‹ค.

(2) ์ €์ž๋Š”์›์น™์ ์œผ๋กœ๊ณตํ‘œ๋œ์ €์ž‘๋ฌผ์„์ธ์šฉํ•˜์—ฌ์•ผ

ํ•˜๋ฉฐ, ๊ณต๊ฐœ๋˜์ง€์•„๋‹ˆํ•œํ•™์ˆ ์ž๋ฃŒ์—๋…ผ๋ฌธ์‹ฌ์‚ฌ๋‚˜

์—ฐ๊ตฌ์ œ์•ˆ์„œ ์‹ฌ์‚ฌ ๋˜๋Š” ์‚ฌ์  ์ ‘์ด‰์„ ํ†ตํ•ด์„œ

์–ป์€ ์ž๋ฃŒ์˜ ๊ฒฝ์šฐ ํ•ด๋‹น ์ €์ž์˜ ๋™์˜๋ฅผ ์–ป์–ด

์ธ์šฉํ•˜์—ฌ์•ผ ํ•œ๋‹ค.

(3) ์ €์ž๋Š” ์—ฐ๊ตฌ์˜ ๋ฐฉํ–ฅ์„ ๊ฒฐ์ •ํ•˜๋Š”๋ฐ ์ค‘ ํ•œ

ํ–ฅ์„ ์ฃผ์—ˆ๊ฑฐ๋‚˜ ๋˜๋Š” ๋…์ž๊ฐ€ ์—ฐ๊ตฌ๋‚ด์šฉ์„

์ดํ•ดํ•˜๋Š”๋ฐ ๋„์›€์ด ๋  ์ˆ˜ ์žˆ๋Š” ์ค‘์š”ํ•œ ๊ณต๊ฐœ๋œ

๋ฌธํ—Œ์ด๋ผ๋ฉด ๊ด€๋ จ ์ €์ž๊ฐ€ ์ด๋ก ์ โˆ™๊ฒฝํ—˜์ ์œผ๋กœ

์•Œ์ˆ˜์žˆ๋Š”๊ฒฝ์šฐ๋ฅผ์ œ์™ธํ•˜๊ณ ๋Š”๋ชจ๋‘์ฐธ๊ณ ๋ฌธํ—Œ์—

ํฌํ•จ์‹œ์ผœ์•ผ ํ•œ๋‹ค.

5. ๊ณต๋™์—ฐ๊ตฌ

(1) ์ €์ž๋Š”๋‹ค๋ฅธ์—ฐ๊ตฌ์ž์™€๊ณต๋™์—ฐ๊ตฌ๋ฅผ์ˆ˜ํ–‰ํ• ๊ฒฝ์šฐ์—

์—ญํ• ๊ณผ ์ƒํ˜ธ๊ด€๊ณ„๋ฅผ ๋ถ„๋ช…ํžˆ ํ•˜๊ณ  ๊ทธ์— ๋”ฐ๋ฅธ

์ฑ…์ž„๊ณผ ์˜๋ฌด๋ฅผ ๋‹คํ•ด์•ผ ํ•œ๋‹ค.

(2) ์ €์ž๋Š” ์ž์‹ ์ด ์‹ค์ œ๋กœ ๊ณตํ—Œํ•œ ์—ฐ๊ตฌ์— ํ•ด์„œ๋งŒ

์—…์ ์œผ๋กœ ์ธ์ •๋ฐ›์„ ์ˆ˜ ์žˆ๋Š” ๊ถŒ๋ฆฌ๋ฅผ ๊ฐ€์ง€๋ฉฐ

๊ทธ์— ํ•ฉ๋‹นํ•œ ์ฑ…์ž„์„ ์ ธ์•ผ ํ•  ์˜๋ฌด๊ฐ€ ์žˆ๋‹ค.

(3) ๋…ผ๋ฌธ์˜ ์ฃผ์ €์ž๋Š” ๋ชจ๋“  ๊ณต์ €์ž๋กœ๋ถ€ํ„ฐ ๊ณต์ €์ž๋กœ

์ฐธ์—ฌํ•œ๋‹ค๋Š” ์‚ฌ์‹ค์— ํ•ด ๋ช…๋ฐฑํ•œ ๋™์˜๋ฅผ

๋ฐ›์•„์•ผ ํ•œ๋‹ค. ๋˜ํ•œ ์—ฐ๊ตฌ๊ฒฐ๊ณผ์— ํ•ด ํ•™์ˆ ์ 

๊ธฐ์—ฌ๋ฅผ ํ•˜์ง€ ์•Š์€ ์‚ฌ๋žŒ์€ ๊ณต์ €์ž๋กœ ํฌํ•จ๋˜์ง€

์•Š์•„์•ผ ํ•˜๋ฉฐ, ์—ฐ๊ตฌ์— ํ•˜์—ฌ ํ–‰์ •์ ์ธ ์ง€์›๊ณผ

๊ฐ™์ดํ•™์ˆ ์™ธ์ ์ธ์ง€์›์„ํ•ด์ค€์‚ฌ๋žŒ์ด๋‚˜๊ธฐ๊ด€์€

โ€œ๊ฐ์ฃผโ€๋˜๋Š”โ€œ์‚ฌ์˜โ€์— ๊ทธ ๋‚ด์šฉ์„ ํ‘œ์‹œํ•˜๋Š”

๊ฒƒ์ด ๋ฐ”๋žŒ์งํ•˜๋‹ค.

(4) ๊ณต์ €์ž์˜ ๋‚˜์—ด์ˆœ์„œ๋Š” ์›์น™์ ์œผ๋กœ ๊ณต๋™์ €์ž

๋“ค์˜ ํ˜‘์˜์— ์˜ํ•ด ๊ฒฐ์ •ํ•˜๋Š” ๊ฒƒ์ด ์ข‹๊ณ  ์—ฐ๊ตฌ์—

๊ธฐ์—ฌ๋ฅผ ๋งŽ์ด ํ•œ ์—ฐ๊ตฌ์ž๋ฅผ ์•ž์„ธ์šฐ๋Š” ๊ฒƒ์ด

๋ฐ”๋žŒ์งํ•˜๋‹ค.

์ œ ๊ถŒ ์ œ ํ˜ธ

118 ๋…„ ์›”

Page 120: nternet I Security - BIGBOOK

6. ์ค‘๋ณต ํˆฌ๊ณ  ๋ฐ ๊ฒŒ์žฌ

(1) ๋™์ผํ•œ ๋…ผ๋ฌธ์„ ๋ณต์ˆ˜์˜ ํ•™์ˆ ์ง€์— ๋™์‹œ์— ํˆฌ๊ณ 

ํ•˜์—ฌ ์‹ฌ์‚ฌ๋ฐ›์•„์„œ๋Š” ์•„๋‹ˆ ๋œ๋‹ค.

(2) ์„์‚ฌ๋˜๋Š”๋ฐ•์‚ฌํ•™์œ„๋…ผ๋ฌธ์—๊ทผ๊ฑฐํ•œ๊ฒฝ์šฐ์ €์ž๊ฐ€

ํŽธ์ง‘์œ„์›์žฅ์—๊ฒŒ ๊ณ ์ง€ํ•˜๊ณ  ๊ฐ์ฃผ๋ฅผ ํ†ตํ•ด ๋ฐํ˜€์•ผ

ํ•œ๋‹ค.

(3) ์ด๋ฏธ ์ถœํŒ๋œ ๋…ผ๋ฌธ, ์ €์ˆ , ์—ฐ๊ตฌ๋ณด๊ณ ์„œ์˜ ์ž๋ฃŒ

์ผ๋ถ€๋ฅผ ์‚ฌ์šฉํ•œ ๊ฒฝ์šฐ, ์ž๋ฃŒ์˜ ์ถœ์ฒ˜๋ฅผ ๋…ผ๋ฌธ์—

๋ฐํ˜€์•ผ ํ•œ๋‹ค. ๋‹จ, ๋…ผ๋ฌธ์˜ ๊ฒฝ์šฐ ๋ณธ ํ•™์ˆ ์ง€์˜

ํŽธ์ง‘์œ„์›ํšŒ์—๊ฒŒ ๊ธฐ ๋ฐœํ‘œ๋œ ๋…ผ๋ฌธ๊ณผ์˜ ์ฐจ๋ณ„์„ฑ์„

์„ค๋ช…ํ•˜๊ณ , ์ด์ค‘์ถœํŒ์— ํ•ด๋‹นํ•˜๋Š”์ง€ ์—ฌ๋ถ€๋ฅผ

ํ™•์ธํ•˜์—ฌ์•ผ ํ•œ๋‹ค.

(4) ์œ„ ํ•ญ๋ชฉ์„ ์–ด๊ธฐ๋Š” ๊ฒฝ์šฐ ์ค‘๋ณต๊ฒŒ์žฌ๋กœ ๊ฐ„์ฃผํ•  ์ˆ˜

์žˆ์œผ๋ฉฐ, ์ด์— ํ•œ ํ™•์ •์€ ์œค๋ฆฌ์œ„์›ํšŒ๊ฐ€ ๋‹ด

๋‹นํ•œ๋‹ค.

7. ๋…ผ๋ฌธ์˜ ์ˆ˜์ •

๋…ผ๋ฌธํˆฌ๊ณ ์ž๋Š” ๋…ผ๋ฌธ์˜ ์‹ฌ์‚ฌ๊ณผ์ •์—์„œ ์ œ์‹œ๋œ ํŽธ

์ง‘์œ„์›๊ณผ ์‹ฌ์‚ฌ์œ„์›์˜ ์˜๊ฒฌ์„ ๊ฐ€๋Šฅํ•œ ํ•œ ์ˆ˜์šฉํ•˜์—ฌ

๋…ผ๋ฌธ์— ๋ฐ˜ ๋˜๋„๋ก ๋…ธ๋ ฅํ•˜๊ณ , ์ด๋“ค์˜ ์˜๊ฒฌ์— ๋™์˜

ํ•˜์ง€ ์•Š์„ ๊ฒฝ์šฐ์—๋Š” ๊ทธ ๊ทผ๊ฑฐ์™€ ์ด์œ ๋ฅผ ์ƒ์„ธํ•˜๊ฒŒ

๊ธฐ์žฌํ•˜์—ฌ ์„œ๋ฉด์œผ๋กœ ํŽธ์ง‘์œ„์›ํšŒ์—๊ฒŒ ์•Œ๋ ค์•ผ ํ•œ๋‹ค.

8. ์ €์ž‘๊ถŒ ์นจํ•ด์˜ ์œ ํ˜•

(1) ใ€ŽInternet and Information Securityใ€์—์„œ๋Š”

๋‹ค์Œ ๊ฐ ํ˜ธ์˜ ์‚ฌํ•ญ์„ ์ €์ž‘๊ถŒ ์นจํ•ดํ–‰์œ„๋กœ

๊ฐ„์ฃผํ•œ๋‹ค.

โ‘  ์ผ๋ถ€๋‹จ์–ด, ์†Œ๋Ÿ‰์˜๊ตฌ์ ˆ, ์ƒˆ๋กœ์šดํ‘œํ˜„์„์ถ”๊ฐ€

ํ•˜ ๋”๋ผ๋„ ์ธ์šฉ๋ถ€ํ˜ธ ์—†์ด ๋„์šฉํ•œ ๊ฒฝ์šฐ

โ‘ก ๋งŽ์€ ๋‚ด์šฉ์„ ์›๋ฌธ ๊ทธ ๋กœ ์‚ฌ์šฉํ•˜๋ฉด์„œ ์ž์„ธ

ํ•˜๊ฒŒ ์ถœ์ฒ˜๋ฅผ ๋ฐํžˆ์ง€ ์•Š์€ ๊ฒฝ์šฐ

โ‘ข ์›๋ฌธ์˜๋‚ด์šฉ์„์ธ์šฉํ•จ์—์žˆ์–ด์„œ๊ทธ๋™์ผ์„ฑ์„

ํ›ผ์†ํ•˜์—ฌ ์ธ์šฉํ•˜๋Š” ๊ฒฝ์šฐ

(2) ใ€ŽInternet and Information Securityใ€์—์„œ๋Š”

๋„๋ฆฌ ์•Œ๋ ค์ง„ ํƒ€์ธ์˜ ์•„์ด๋””์–ด๋ฅผ ๋ˆ„๊ตฌ์˜

๊ฒƒ์ธ์ง€ ๋ฐํžˆ์ง€ ์•„๋‹ˆํ•˜๊ณ  ์‚ฌ์šฉํ•˜๊ฑฐ๋‚˜ ๋˜๋Š”

์ž์‹ ์˜ ๊ฒƒ์œผ๋กœ ์†์ด๋Š” ํ–‰์œ„๋„ ์ €์ž‘๊ถŒ ์นจํ•ด์—

์ค€ํ•˜๋Š” ๊ฒƒ์œผ๋กœ ๋ณธ๋‹ค.

9. ์ €์ž‘๊ถŒ ์นจํ•ด ํ™•์ •

ใ€ŽInternet and Information Securityใ€์— ์ด๋ฏธ

๊ฒŒ์žฌ๋˜์—ˆ๊ฑฐ๋‚˜, ์‹ฌ์‚ฌ ์ค‘์— ์ €์ž‘๊ถŒ ์นจํ•ด์˜ํ˜น์ด ์ œ๊ธฐ๋œ

๋…ผ๋ฌธ์— ํ•œ์ €์ž‘๊ถŒ์นจํ•ด์—ฌ๋ถ€์˜ํ™•์ •์€์œค๋ฆฌ์œ„์›ํšŒ๊ฐ€

๋‹ด๋‹นํ•œ๋‹ค. ํŒ์ •์— ํ•œ ํ•ฉ์˜๊ฐ€ ์ด๋ฃจ์–ด์ง€์ง€ ์•Š์„

๊ฒฝ์šฐ ํ‘œ๊ฒฐ๋กœ ๊ฒฐ์ •ํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ ์ด ๊ฒฝ์šฐ ์žฌ์ ์œ„์›

๊ณผ๋ฐ˜์ˆ˜ ์ด์ƒ์˜ ์ฐฌ์„ฑ์œผ๋กœ ์˜๊ฒฐํ•œ๋‹ค.

1. ๊ธฐ๋ณธ์ ์ธ ์ฑ…์ž„๊ณผ ์˜๋ฌด

ํŽธ์ง‘์œ„์›์€ ํˆฌ๊ณ ๋œ ๋…ผ๋ฌธ์˜ ๊ฒŒ์žฌ ์—ฌ๋ถ€๋ฅผ ๊ฒฐ์ •ํ•˜๋Š”

์˜์‚ฌ๊ฒฐ์ •๊ณผ ๊ด€๋ จ๋œ ๋ชจ๋“  ํ–‰์œ„์— ์ฑ…์ž„์„ ์ง€๋ฉฐ,

๋…ผ๋ฌธํˆฌ๊ณ ์ž์˜ ์ธ๊ฒฉ๊ณผ ํ•™์ž๋กœ์„œ์˜ ๋…๋ฆฝ์„ฑ์„ ์กด์ค‘

ํ•˜์—ฌ์•ผ ํ•œ๋‹ค.

2. ๊ณตํ‰์ทจ๊ธ‰ ์˜๋ฌด

(1) ํŽธ์ง‘์œ„์›์€ ํ•™์ˆ ์ง€ ๊ฒŒ์žฌ๋ฅผ ์œ„ํ•ด ํˆฌ๊ณ ๋œ ๋…ผ๋ฌธ์˜

์ทจ๊ธ‰์— ์žˆ์–ด ์งˆ์  ์ˆ˜์ค€๊ณผ ํˆฌ๊ณ  ์ง€์นจ์— ๊ทผ๊ฑฐ

ํ•˜์—ฌ ๊ณตํ‰ํ•˜๊ฒŒ ์ทจ๊ธ‰ํ•˜์—ฌ์•ผ ํ•œ๋‹ค.

(2) ํŽธ์ง‘์œ„์›์€ ํˆฌ๊ณ ๋œ ๋…ผ๋ฌธ์˜ ๊ฒŒ์žฌ๊ฐ€ ๊ฒฐ์ •๋ 

๋•Œ๊นŒ์ง€๋Š” ์‹ฌ์‚ฌ์œ„์› ์ด์™ธ์˜ ๋‹ค๋ฅธ ์‚ฌ๋žŒ์—๊ฒŒ

์ €์ž์— ํ•œ ์‚ฌํ•ญ์ด๋‚˜ ๋…ผ๋ฌธ์˜ ๋‚ด์šฉ์„ ๊ณต๊ฐœ

์—ฐ๊ตฌ์œค๋ฆฌ์ง€์นจ

Internet and Information Security 119

Page 121: nternet I Security - BIGBOOK

ํ•˜์—ฌ์„œ๋Š” ์•„๋‹ˆ ๋œ๋‹ค.

3. ์‹ฌ์‚ฌ์˜๋ขฐ์‹œ ์˜๋ฌด

(1) ํŽธ์ง‘์œ„์›์€ ํˆฌ๊ณ ๋œ ๋…ผ๋ฌธ์˜ ํ‰๊ฐ€๋ฅผ ํ•ด๋‹น ๋ถ„์•ผ์˜

์ „๋ฌธ์  ์ง€์‹๊ณผ ๊ณต์ •ํ•œ ํŒ๋‹จ ๋Šฅ๋ ฅ์„ ์ง€๋‹Œ

์‹ฌ์‚ฌ์œ„์›์—๊ฒŒ ์˜๋ขฐํ•˜์—ฌ์•ผ ํ•œ๋‹ค.

(2) ์‹ฌ์‚ฌ์˜๋ขฐ์‹œ์—๋Š” ํˆฌ๊ณ ์ž์˜ ์ถœ์‹ ํ•™๊ต, ์†Œ์†๊ธฐ๊ด€

๋“ฑ์„ ๊ณ ๋ คํ•˜์—ฌ ๊ฐ€๋Šฅํ•œ ํ•œ ๊ฐ๊ด€์ ์ด๊ณ  ๊ณต์ •ํ•œ

ํ‰๊ฐ€๊ฐ€ ์ด๋ฃจ์–ด์งˆ ์ˆ˜ ์žˆ๋„๋ก ๋…ธ๋ ฅํ•˜์—ฌ์•ผ ํ•œ๋‹ค.

(3) ๊ฐ™์€ ๋…ผ๋ฌธ์— ํ•œ ํ‰๊ฐ€๊ฐ€ ์‹ฌ์‚ฌ์œ„์›๊ฐ„์— ํ˜„์ €

ํ•˜๊ฒŒ ์ฐจ์ด๊ฐ€ ๋‚  ๊ฒฝ์šฐ์—๋Š” ํ•ด๋‹น ๋ถ„์•ผ์˜ ์ œ3์˜

์ „๋ฌธ๊ฐ€์—๊ฒŒ ์ž๋ฌธ์„ ๋ฐ›์„ ์ˆ˜ ์žˆ๋‹ค.

4. ๋น„๊ณต๊ฐœ์˜๋ฌด

ํŽธ์ง‘์œ„์›์€ํˆฌ๊ณ ๋œ๋…ผ๋ฌธ์˜๊ฒŒ์žฌ๊ฐ€๊ฒฐ์ •๋ ๋•Œ๊นŒ์ง€๋Š”

์‹ฌ์‚ฌ์ž ์ด์™ธ์˜ ์‚ฌ๋žŒ์—๊ฒŒ ๋…ผ๋ฌธํˆฌ๊ณ ์ž์— ํ•œ ์‚ฌํ•ญ

์ด๋‚˜ ๋…ผ๋ฌธ์˜ ๋‚ด์šฉ์„ ๊ณต๊ฐœํ•˜์—ฌ์„œ๋Š” ์•ˆ ๋œ๋‹ค.

1. ๊ธฐ๋ณธ์  ์˜๋ฌด

(1) ์‹ฌ์‚ฌ์œ„์›์€ ํŽธ์ง‘์œ„์›ํšŒ๊ฐ€ ์˜๋ขฐํ•˜๋Š” ๋…ผ๋ฌธ์„

์‹ฌ์‚ฌ๊ทœ์ •์ด ์ •ํ•œ ๊ธฐ๊ฐ„ ๋‚ด์— ์„ฑ์‹คํ•˜๊ฒŒ ํ‰๊ฐ€ํ•˜๊ณ 

ํ‰๊ฐ€ ๊ฒฐ๊ณผ๋ฅผ ๋ณธ ํ•™์ˆ ์ง€ ํŽธ์ง‘์œ„์›ํšŒ์— ํ†ต๋ณด

ํ•˜์—ฌ์•ผ ํ•œ๋‹ค.

(2) ๋งŒ์•ฝ ์‹ฌ์‚ฌ์œ„์› ์Šค์Šค๋กœ ๋…ผ๋ฌธ์˜ ๋‚ด์šฉ์„ ํ‰๊ฐ€

ํ•˜๊ธฐ์— ์ ์ž„์ž๊ฐ€ ์•„๋‹ˆ๋ผ๊ณ  ํŒ๋‹จ๋  ๊ฒฝ์šฐ์—๋Š”

๋ณธ ํ•™์ˆ ์ง€ ํŽธ์ง‘์œ„์›ํšŒ์— ์ง€์ฒด์—†์ด ๊ทธ ์‚ฌ์‹ค์„

ํ†ต๋ณดํ•˜์—ฌ์•ผ ํ•œ๋‹ค.

2. ํ‰๊ฐ€์˜๊ฒฌ ์ž‘์„ฑ์‹œ ์˜๋ฌด

(1) ์‹ฌ์‚ฌ์œ„์›์€ ์ „๋ฌธ ์ง€์‹์ธ์œผ๋กœ์„œ์˜ ์ €์ž์˜

์ธ๊ฒฉ๊ณผ ๋…๋ฆฝ์„ฑ์„ ์กด์ค‘ํ•˜์—ฌ์•ผ ํ•œ๋‹ค.

(2) ํ‰๊ฐ€๊ฒฐ๊ณผ๋ฅผ ํŽธ์ง‘์œ„์›ํšŒ์— ํ†ต๋ณดํ•  ์‹œ์—๋Š”

๋…ผ๋ฌธ์— ํ•œ ์ž์‹ ์˜ ํŒ๋‹จ์„ ๋ฐํžˆ๋˜, ๋ณด์™„์ด

ํ•„์š”ํ•˜๋‹ค๊ณ  ์ƒ๊ฐ๋˜๋Š” ๋ถ€๋ถ„์— ํ•ด์„œ๋Š” ๊ทธ

์ด์œ ๋„ ํ•จ๊ป˜ ์ƒ์„ธํžˆ ์„ค๋ช…ํ•˜์—ฌ์•ผ ํ•œ๋‹ค. ๊ฐ€๊ธ‰์ 

์ •์ค‘ํ•˜๊ณ  ๋ถ€๋“œ๋Ÿฌ์šด ํ‘œํ˜„์„ ์‚ฌ์šฉํ•˜๊ณ , ์ €์ž๋ฅผ

๋น„ํ•˜ ๋˜๋Š” ๋ชจ์š•ํ•˜๋Š” ํ‘œํ˜„์€ ํ”ผํ•ด์•ผ ํ•œ๋‹ค.

3. ๊ณต์ •ํ‰๊ฐ€ ์˜๋ฌด

(1) ์‹ฌ์‚ฌ์œ„์›์€ ๋…ผ๋ฌธ์„ ํ‰๊ฐ€ํ•จ์— ์žˆ์–ด ์‚ฌ์ ์ธ

ํŽธ๊ฒฌ์„ ํ”ผํ•ด์•ผ ํ•œ๋‹ค. ์‚ฌ์  ์ƒ์ถฉ์„ ํฌํ•จํ•œ

์ดํ•ด ์ƒ์ถฉ์˜ ๊ด€๊ณ„๊ฐ€ ์žˆ๋‹ค๋ฉด ์ฆ‰์‹œ ์ด ์‚ฌ์‹ค์„

ํŽธ์ง‘์œ„์›ํšŒ์— ํ†ต๋ณดํ•˜์—ฌ์•ผ ํ•œ๋‹ค.

(2) ์‹ฌ์‚ฌ์œ„์›์€ ๋…ผ๋ฌธ์„ ํ‰๊ฐ€ํ•จ์— ์žˆ์–ด ๊ฐœ์ธ์ ์ธ

ํ•™์ˆ ์  ์‹ ๋…์„ ๋– ๋‚˜ ๊ฐ๊ด€์  ๊ธฐ์ค€์— ์˜ํ•ด

๊ณต์ •ํ•˜๊ฒŒ ํ‰๊ฐ€ํ•˜์—ฌ์•ผ ํ•œ๋‹ค. ์‹ฌ์‚ฌ์ž ๋ณธ์ธ์˜

๊ด€์ ์ด๋‚˜ ํ•ด์„๊ณผ ์ƒ์ถฉ๋œ๋‹ค๋Š” ์ด์œ ๋กœ ๋…ผ๋ฌธ์„

ํƒˆ๋ฝ์‹œ์ผœ์„œ๋Š” ์•„๋‹ˆ ๋œ๋‹ค.

4. ๋น„ ์ค€์ˆ˜ ์˜๋ฌด

(1) ์‹ฌ์‚ฌ์œ„์›์€ ๋ฐœ๊ฐ„์ง€์นจ์ƒ ๋น„ ์œ ์ง€ ์กฐํ•ญ์„

์ค€์ˆ˜ํ•˜์—ฌ์•ผ ํ•œ๋‹ค.

(2) ํ‰๊ฐ€๋ฅผ ์œ„ํ•ด ํŠน๋ณ„ํžˆ ์กฐ์–ธ์„ ๊ตฌํ•˜๋Š” ๊ฒฝ์šฐ๋ฅผ

์ œ์™ธํ•˜๊ณ ๋Š” ๋…ผ๋ฌธ์„ ๋‹ค๋ฅธ ์‚ฌ๋žŒ์—๊ฒŒ ๋ณด์—ฌ์ฃผ๊ฑฐ๋‚˜

๋…ผ๋ฌธ ๋‚ด์šฉ์— ํ•˜์—ฌ ๋‹ค๋ฅธ ์‚ฌ๋žŒ๊ณผ ๋…ผ์˜ํ•˜์ง€

์•Š์•„์•ผ ํ•œ๋‹ค.

(3) ๋˜ํ•œ ๋…ผ๋ฌธ์ด ๊ฒŒ์žฌ๋œ ํ•™์ˆ ์ง€๊ฐ€ ์ถœํŒ๋˜๊ธฐ ์ „์—

๋…ผ๋ฌธ์˜ ๋‚ด์šฉ์„ ์ธ์šฉํ•ด์„œ๋Š” ์•„๋‹ˆ ๋œ๋‹ค.

(4) ์‹ฌ์‚ฌ์œ„์›์€ ์—ฐ๊ตฌ์œค๋ฆฌ๋ฅผ ์กด์ค‘ํ•˜์—ฌ ๋ถ€์ •ํ–‰์œ„๋ฅผ

ํ•˜์ง€ ๋ง์•„์•ผ ํ•œ๋‹ค.

์ œ ๊ถŒ ์ œ ํ˜ธ

120 ๋…„ ์›”

Page 122: nternet I Security - BIGBOOK

1. ์ œ๋ณดโˆ™์‹ฌ์‚ฌ์ค‘๋‹จ

(1) ์ œ๋ณด์ž๋Š”ใ€ŽInternet and Information

Securityใ€์˜ ํŽธ์ง‘์œ„์›ํšŒ์— ์—ฐ๊ตฌ์œค๋ฆฌ ์œ„๋ฐ˜

์‚ฌํ•ญ์„ ์„œ๋ฉด ๋˜๋Š” ์ „์ž์šฐํŽธ ๋“ฑ์˜ ๋ฐฉ๋ฒ•์œผ๋กœ

์ œ๋ณดํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์‹ค๋ช…์œผ๋กœ ์ œ๋ณดํ•จ์„ ์›์น™์œผ๋กœ

ํ•œ๋‹ค. ๋‹จ, ์ต๋ช…์œผ๋กœ ์ œ๋ณดํ•˜๊ณ ์ž ํ•  ๊ฒฝ์šฐ์—๋Š”

์„œ๋ฉด ๋˜๋Š” ์ „์ž์šฐํŽธ์œผ๋กœ ๋…ผ๋ฌธ๋ช… ๋ฐ ๊ตฌ์ฒด์ ์ธ

์œ„๋ฐ˜ํ–‰์œ„์˜ ๋‚ด์šฉ๊ณผ ์ฆ๊ฑฐ๋ฅผ ํฌํ•จํ•˜์—ฌ ์ œ์ถœํ•œ

๊ฒฝ์šฐ ์ด๋ฅผ ์‹ค๋ช… ์ œ๋ณด์— ์ค€ํ•˜์—ฌ ์ฒ˜๋ฆฌํ•  ์ˆ˜ ์žˆ๋‹ค.

(2) ์—ฐ๊ตฌ์œค๋ฆฌ์ง€์นจ์˜ ์œ„๋ฐฐ๋กœ ์ œ๋ณด๋œ ๋…ผ๋ฌธ์ด ์‹ฌ์‚ฌ

์ค‘์ธ ๊ฒฝ์šฐ ์‹ฌ์‚ฌ๋ฅผ ์ค‘๋‹จํ•œ๋‹ค.

2. ์œค๋ฆฌ์œ„์›ํšŒ ๊ตฌ์„ฑ

(1) ใ€ŽInternet and Information Securityใ€์™€

๊ด€๋ จ๋œ ์—ฐ๊ตฌ์œค๋ฆฌ ์œ„๋ฐ˜์ด ์ ‘์ˆ˜๋œ ๊ฒฝ์šฐ, ํŽธ์ง‘์œ„

์›์žฅ์€ ๋ณธ ์—ฐ๊ตฌ์œค๋ฆฌ์ง€์นจ์„ ๊ธฐ์ดˆ๋กœ ํ•˜์—ฌ ์—ฐ๊ตฌ

์œค๋ฆฌ ์œ„๋ฐ˜ ์—ฌ๋ถ€์™€ ์ ํ•ฉํ•œ ์—ฐ๊ตฌ์ง„์‹ค์„ฑ ๊ฒ€์ฆ์„

๋ชฉ์ ์œผ๋กœ ํŽธ์ง‘์œ„์›์žฅ์€ ์œค๋ฆฌ์œ„์›ํšŒ๋ฅผ ์†Œ์ง‘ํ•˜

์—ฌ์•ผ ํ•œ๋‹ค.

(2) ์œค๋ฆฌ์œ„์›ํšŒ๋Š” ํŽธ์ง‘์œ„์›์žฅ ์ด์™ธ์˜ 4์ธ์œผ๋กœ

๊ตฌ์„ฑํ•˜๋ฉฐ, ์œ„์›์€ ํŽธ์ง‘์œ„์›ํšŒ์˜ ์ถ”์ฒœ์„ ๋ฐ›์•„

ํŽธ์ง‘์œ„์›์žฅ์ด ์ž„๋ช…ํ•œ๋‹ค.

(3) ์œค๋ฆฌ์œ„์›ํšŒ๋ฅผ ์†Œ์ง‘ํ•˜๊ณ ์ž ํ•  ๋•Œ์—๋Š” ์œ„์›์žฅ์€

์‹ฌ์˜์•ˆ๊ฑด์˜ ๊ฐœ์š”๋ฅผ ์†Œ์ง‘ 5์ผ ์ „๊นŒ์ง€ ์œ„์›๋“ค

์—๊ฒŒ ํ†ต์ง€ํ•˜์—ฌ์•ผ ํ•œ๋‹ค.

(4) ์œค๋ฆฌ์œ„์›ํšŒ ์œ„์›์žฅ์€ ๋‹น์—ฐ์ง์œผ๋กœ ํŽธ์ง‘์œ„์›์žฅ์ด

๋งก๋Š”๋‹ค.

3. ์‚ฌ์‹ค์กฐ์‚ฌ ๋ฐ ์˜๊ฒฐ๊ธฐํ•œ

(1) ์œค๋ฆฌ์œ„์›ํšŒ๋Š” ์ œ๋ณด๊ฐ€ ์žˆ๋Š” ๊ฒฝ์šฐ ์ง€์ฒด์—†์ด ๊ทธ์—

๊ด€ํ•œ ์‚ฌ์‹ค์กฐ์‚ฌ๋ฅผ ํ•˜์—ฌ์•ผ ํ•˜๋ฉฐ, ์ด ๊ฒฝ์šฐ ์‹ฌ์˜

์ƒ์ž์—๊ฒŒ ์ถฉ๋ถ„ํ•œ ์†Œ๋ช…์˜ ๊ธฐํšŒ๋ฅผ ์ œ๊ณตํ•˜์—ฌ์•ผ

ํ•œ๋‹ค.

(2) ์œค๋ฆฌ์œ„์›ํšŒ๋Š” ์ œ๋ณด๊ฐ€ ์žˆ์—ˆ๋˜ ๋‚ ๋กœ๋ถ€ํ„ฐ 60์ผ

์ด๋‚ด์— ์‹ฌ์˜ ์˜๊ฒฐํ•˜์—ฌ์•ผ ํ•œ๋‹ค.

(3) ์œค๋ฆฌ์œ„์›ํšŒ๋Š” ์œค๋ฆฌ์ง€์นจ ์œ„๋ฐ˜์œผ๋กœ ๋ณด๊ณ ๋œ

์‚ฌ์•ˆ์— ํ•˜์—ฌ ์ œ๋ณด์ž, ํ”ผ์กฐ์‚ฌ์ž, ์ฆ์ธ, ์ฐธ๊ณ ์ธ

๋ฐ ์ฆ๊ฑฐ์ž๋ฃŒ ๋“ฑ์„ ํ†ตํ•˜์—ฌ ํญ๋„“๊ฒŒ ์กฐ์‚ฌ๋ฅผ

์‹ค์‹œํ•œ ํ›„, ์œค๋ฆฌ์ง€์นจ ์œ„๋ฐ˜์ด ์‚ฌ์‹ค๋กœ ํŒ์ •๋˜๋Š”

๊ฒฝ์šฐ ๋ถ€์ •ํ–‰์œ„ ๊ด€๋ จ์ž์— ํ•˜์—ฌ ์ ์ ˆํ•œ

์ œ์žฌ์กฐ์น˜๋ฅผ ๊ฑด์˜ํ•  ์ˆ˜ ์žˆ๋‹ค.

4. ํšŒ์˜๊ณต๊ฐœ ์—ฌ๋ถ€

(1) ์œค๋ฆฌ์œ„์›ํšŒ์˜ ํšŒ์˜๋Š” ๊ณต๊ฐœํ•˜์ง€ ์•„๋‹ˆํ•œ๋‹ค.

(2) ์œค๋ฆฌ์œ„์›ํšŒ ์œ„์›์€ ์ •๋‹นํ•œ ์‚ฌ์œ ์—†์ด ์—ฐ๊ตฌ์œค๋ฆฌ

์œ„๋ฐ˜์— ํ•œ ์กฐ์‚ฌ์™€ ๊ด€๋ จํ•˜์—ฌ ์ธ์ง€ํ•œ ์‚ฌ์‹ค์„

์™ธ๋ถ€์— ๋ˆ„์„คํ•˜์—ฌ์„œ๋Š” ์•„๋‹ˆ ๋œ๋‹ค.

5. ์˜๊ฒฐ๋‚ด์šฉ ํ†ต๋ณด

์œค๋ฆฌ์œ„์›ํšŒ๊ฐ€ ์œค๋ฆฌ์œ„๋ฐ˜ ์‚ฌ์•ˆ์— ๊ด€ํ•˜์—ฌ ๊ฒฐ์ •์„

ํ•˜ ์„ ๋•Œ์—๋Š” ํŽธ์ง‘์œ„์›์žฅ์ด ๊ฒฐ์ • ์„ ๊ณ  ํ›„ 2์ผ

์ด๋‚ด์— ์‹ฌ์˜ ์ƒ์ž์—๊ฒŒ ๊ทธ ๊ฒฐ๊ณผ๋ฅผ ํ†ต๋ณดํ•˜์—ฌ์•ผ ํ•œ๋‹ค.

6. ์žฌ์‹ฌ์ฒญ๊ตฌ ๋ฐ ๋ฐ˜๋ก ๊ถŒ

์—ฐ๊ตฌ์œค๋ฆฌ๋ฅผ ์œ„๋ฐ˜ํ•œ ๊ฒƒ์œผ๋กœ ํ†ต๋ณด๋ฐ›์€ ์ž๋Š”, ๊ฒฐ๊ณผ๋ฅผ

ํ†ต๋ณด๋ฐ›์€ ํ›„ 14์ผ ์ด๋‚ด์— ์—ฐ๊ตฌ์œค๋ฆฌ์œ„์›ํšŒ์˜ ์กฐ์‚ฌ

๊ฒฐ๊ณผ์— ํ•˜์—ฌ ๋ฐ˜๋ก ์ด๋‚˜ ์žฌ์‹ฌ์„ ์ฒญ๊ตฌํ•  ์ˆ˜ ์žˆ๋Š”

๊ถŒ๋ฆฌ๋ฅผ ๊ฐ€์ง„๋‹ค.

7. ์—ฐ๊ตฌ์œค๋ฆฌ์œ„๋ฐ˜ ์กฐ์น˜

์กฐ์‚ฌ๊ฒฐ๊ณผ ์—ฐ๊ตฌ์œค๋ฆฌ์œ„๋ฐ˜์ด ํ™•์ •๋  ๊ฒฝ์šฐ, ์ด๋ฅผ

์—ฐ๊ตฌ์œค๋ฆฌ์ง€์นจ

Internet and Information Security 121

Page 123: nternet I Security - BIGBOOK

๋‹น์‚ฌ์ž์—๊ฒŒ ํ†ต์ง€ํ•˜๊ณ  ๋‹ค์Œ๊ณผ ๊ฐ™์ด ์กฐ์น˜ํ•œ๋‹ค.

(1) ์—ฐ๊ตฌ์œค๋ฆฌ๋ฅผ ์œ„๋ฐ˜ํ•œ ๋…ผ๋ฌธ์€ ๋ณธ ํ•™์ˆ ์ง€ ๊ฒŒ์žฌ๋ฅผ

๋ถˆํ—ˆํ•˜๊ณ , ์ด๋ฏธ ๊ฒŒ์žฌ๋œ ๋…ผ๋ฌธ์˜ ๊ฒฝ์šฐ์—๋Š” ๋…ผ๋ฌธ

๋ชฉ๋ก๋ฐํ™ˆํŽ˜์ด์ง€๊ฒ€์ƒ‰์‚ฌ์ดํŠธ์—์„œ์‚ญ์ œํ•˜๊ณ ์ด

์‚ฌ์‹ค์„ ๊ณต๊ฐœ์ ์œผ๋กœ ๊ณต๊ฐœํ•œ๋‹ค.

(2) ์—ฐ๊ตฌ์œค๋ฆฌ๋ฅผ ์œ„๋ฐ˜ํ•œ ๋…ผ๋ฌธ์ด ํƒ€ ์ €๋„์— ๊ฒŒ์žฌ

๋˜์—ˆ์„ ๋•Œ์—๋Š” ํ•ด๋‹น์ €๋„ ํŽธ์ง‘์œ„์›์žฅ์ด๋‚˜ ๊ด€๋ จ

ํ•™์ˆ ๊ธฐ๊ด€์— ๊ณต์ง€ํ•œ๋‹ค.

(3) ์—ฐ๊ตฌ์œค๋ฆฌ๋ฅผ ์œ„๋ฐ˜ํ•œ ๋…ผ๋ฌธ์˜ ์ €์ž์—๊ฒŒ๋Š” ์ดํ›„

3๋…„๊ฐ„ ๋ณธ ํ•™์ˆ ์ง€์— ํ•œ ๋…ผ๋ฌธํˆฌ๊ณ ๋ฅผ ๊ธˆ์ง€ํ•˜๋Š”

๋“ฑ์˜ ํ•ฉ๋‹นํ•œ ์ง•๊ณ„์กฐ์น˜๋ฅผ ๋‚ด๋ฆฐ๋‹ค.

(4) ์ œ๋ณด์ž๊ฐ€ ์˜๋„์ ์ด๊ฑฐ๋‚˜ ์ค‘ ํ•œ ๊ณผ์‹ค๋กœ ํ—ˆ์œ„

์ œ๋ณด๋ฅผ ํ•˜ ์„ ๊ฒฝ์šฐ, ์‘์กฐ์น˜๋ฅผ ๊ฑด์˜ํ•  ์ˆ˜

์žˆ๋‹ค.

(5) ํŽธ์ง‘์œ„์›์ด ์ง€์ผœ์•ผ ํ•˜๋Š” ์œค๋ฆฌ์ง€์นจ์„ ์œ„๋ฐ˜ํ• 

๊ฒฝ์šฐ ํŽธ์ง‘์œ„์›ํšŒ์˜ ๋…ผ์˜๋ฅผ ๊ฑฐ์ณ ์œ„์›์ง์„

ํ•ด์ด‰ํ•  ์ˆ˜ ์žˆ๋‹ค.

(6) ์‹ฌ์‚ฌ์œ„์›์ด ์ง€์ผœ์•ผ ํ•˜๋Š” ์œค๋ฆฌ์ง€์นจ์„ ์œ„๋ฐ˜ํ• 

๊ฒฝ์šฐ ํŽธ์ง‘์œ„์›ํšŒ๋Š” ์‹ฌ์‚ฌ์˜๋ขฐ๋ฅผ ์ค‘๋‹จํ•˜๊ณ 

์ƒˆ๋กœ์šด ์‹ฌ์‚ฌ์œ„์›์„ ์œ„์ด‰ํ•  ์ˆ˜ ์žˆ๋‹ค.

8. ์—ฐ๊ตฌ์œค๋ฆฌ ํ™•์•ฝ

๋…ผ๋ฌธํˆฌ๊ณ ์ž๋ฅผ ๋น„๋กฏํ•œ ๋‹ด๋‹น ํŽธ์ง‘์œ„์›, ์‹ฌ์‚ฌ์ž์˜

์—ฐ๊ตฌ์œค๋ฆฌ์ง€์นจ ์ค€์ˆ˜๋ฅผ ํ™•์ธํ•˜๊ธฐ ์œ„ํ•ด ์—ฐ๊ตฌ์œค๋ฆฌ ํ™•

์•ฝ์„ ์˜๋ฌดํ™”ํ•œ๋‹ค.

9. ๊ธฐํƒ€

๋ณธ ์ง€์นจ์— ๋ช…์‹œ๋˜์ง€ ์•Š์€ ์‚ฌํ•ญ์€ ๊ด€๋ก€์— ๋”ฐ๋ฅด๊ณ ,

๊ทธ ์™ธ์˜ ์‚ฌํ•ญ์€ ํŽธ์ง‘์œ„์›ํšŒ์—์„œ ๋…ผ์˜ํ•˜์—ฌ ๊ฒฐ์ •ํ•œ๋‹ค.

์ œ ๊ถŒ ์ œ ํ˜ธ

122 ๋…„ ์›”

Page 124: nternet I Security - BIGBOOK

1. ๋ชฉ์ 

์ด ์ง€์นจ์€ ํ•œ๊ตญ์ธํ„ฐ๋„ท์ง„ํฅ์›(์ดํ•˜โ€œ์ง„ํฅ์›โ€์ด๋ผ

ํ•œ๋‹ค)์—์„œ ๋ฐœ๊ฐ„ํ•˜๋Š” ํ•™์ˆ ์ง€์ธใ€ŽInternet and

Information Securityใ€์˜ ์›๊ณ ํˆฌ๊ณ ์— ๊ด€ํ•œ ์‚ฌํ•ญ์„

์ •ํ•จ์„ ๋ชฉ์ ์œผ๋กœ ํ•œ๋‹ค.

2. ์›๊ณ ๋‚ด์šฉ

๋ณธ ํ•™์ˆ ์ง€์— ๊ฒŒ์žฌํ•  ์›๊ณ ๋Š” ์ธํ„ฐ๋„ท ๋ฐ ์ •๋ณด๋ณดํ˜ธ์™€

๊ด€๋ จ๋˜๋Š” ๋ถ„์•ผ์˜ ์—ฐ๊ตฌ์— ํ•œํ•˜๋ฉฐ, ๋‹ค๋ฅธ ํ•™์ˆ ์ง€ ๋˜๋Š”

๊ฐ„ํ–‰๋ฌผ์— ๋ฐœํ‘œ๋˜์ง€ ์•Š์€ ๋…์ฐฝ์ ์ธ ๊ฒƒ์ด์–ด์•ผ ํ•œ๋‹ค.

๋…ผ๋ฌธ ํˆฌ๊ณ ์˜ ์ž๊ฒฉ์ œํ•œ์€ ์—†๋‹ค.

3. ์›๊ณ ์ ‘์ˆ˜

(1) ๋ณธ ํ•™์ˆ ์ง€์˜ ์ถœํŒ์€ ์—ฐ๊ฐ„ 2ํšŒ๋ฅผ ์›์น™์œผ๋กœ ํ•˜๋ฉฐ,

์ถœํŒ์‹œ๊ธฐ๋Š” 1ํ˜ธ๋Š” 5์›” 31์ผ, 2ํ˜ธ๋Š” 11์›” 30์ผ๋กœ

ํ•œ๋‹ค. ์›๊ณ  ์ ‘์ˆ˜ ๋งˆ๊ฐ์ผ์€ ์ถœํŒ์ผ 2.5๊ฐœ์›”

์ „์œผ๋กœ ํ•œ๋‹ค.

(2) ์›๊ณ ๋ฅผ ์ œ์ถœํ•  ๋•Œ๋Š” ๋…ผ๋ฌธํˆฌ๊ณ ์‹ ์ฒญ์„œ๋ฅผ ์ฒจ๋ถ€

ํ•˜์—ฌ ์ด๋ฉ”์ผ([email protected])๋กœ๋งŒ ์ œ์ถœ

ํ•˜์—ฌ์•ผ ํ•œ๋‹ค.

(3) ๋…ผ๋ฌธํˆฌ๊ณ ์‹ ์ฒญ์„œ๋Š” ํ•œ๊ตญ์ธํ„ฐ๋„ท์ง„ํฅ์› ํ™ˆํŽ˜์ด์ง€

(http://www.kisa.or.kr)์—์„œ ๋‹ค์šด๋ฐ›์•„์„œ

์ž‘์„ฑํ•œ๋‹ค.

(4) ์ œ์ถœ์›๊ณ ๋Š” ํ•œ ๋˜๋Š” MS ์›Œ๋“œ ํ”„๋กœ๊ทธ๋žจ์„

์‚ฌ์šฉํ•˜์—ฌ ์ง„ํฅ์› ์›๊ณ ์ž‘์„ฑ ์š”๋ น์— ๋”ฐ๋ผ ์ž‘์„ฑ

ํ•˜์—ฌ์•ผ ํ•˜๋ฉฐ ์ด ์–‘์‹์— ๋งž์ง€ ์•Š๊ฑฐ๋‚˜ ํ•œ โˆ™

์–ด ์ดˆ๋ก, ์ฐธ๊ณ ๋ฌธํ—Œ ๋“ฑ ์ค‘์š”ํ•œ ๋ถ€๋ถ„์ด ๋น ์ง„

์›๊ณ ๋Š” ์‹ฌ์‚ฌํ•˜์ง€ ์•Š๊ณ  ๋ฐ˜์†กํ•˜์—ฌ ์–‘์‹์„

๊ฐ–์ถ”์–ด ์ œ์ถœํ•˜๊ฒŒ ํ•  ์ˆ˜ ์žˆ๋‹ค.

4. ์›๊ณ ์ž‘์„ฑ

(1) ํ•™์ˆ ์ง€ ์›๊ณ ์ž‘์„ฑ์€ใ€Ž๋…ผ๋ฌธ ์ž‘์„ฑ์š”๋ นใ€์— ๋”ฐ๋ผ

์ž‘์„ฑํ•˜์—ฌ์•ผ ํ•œ๋‹ค.

(2) ์ œ์ถœ๋œ ์›๊ณ ๋Š” ์†Œ์ •์˜ ์‹ฌ์‚ฌ๋ฅผ ๊ฑฐ์น˜๋ฉฐ, ํŽธ์ง‘

์œ„์›์ด ์ˆ˜์ •์„ ์š”์ฒญํ•  ๊ฒฝ์šฐ, ์›๊ณ ์ œ์ถœ์ž๋Š”

์ด์— ์‘ํ•˜๊ฑฐ๋‚˜ ๋‚ฉ๋“ํ•  ๋งŒํ•œ ๋‹ต๋ณ€์„ ์„œ๋ฉด์œผ๋กœ

์ œ์ถœํ•ด์•ผ ํ•œ๋‹ค.

(3) ์‹ฌ์‚ฌ๊ฒฐ๊ณผ๋ถ€์ ๊ฒฉํŒ์ •์ด๋‚ด๋ ค์กŒ๊ฑฐ๋‚˜์ˆ˜์ •์ œ์˜์—

ํ•œ ๋‹ต๋ณ€์ด ์—†๋Š” ๊ฒฝ์šฐ ํŽธ์ง‘์œ„์›ํšŒ๋Š” ์›๊ณ 

๊ฒŒ์žฌ๋ฅผ ๊ฑฐ๋ถ€ํ•  ์ˆ˜ ์žˆ๋‹ค.

(4) ๋…ผ๋ฌธ์˜ ๊ฒŒ์žฌ์—ฌ๋ถ€๋Š” ํŽธ์ง‘์œ„์›ํšŒ์˜ ์‹ฌ์‚ฌ๋ฅผ ๊ฑฐ์ณ

์ตœ์ข… ๊ฒฐ์ •ํ•œ๋‹ค.

5. ๋…ผ๋ฌธ๋ฐœํ‘œ

(1) ์ตœ์ข… ๊ฒŒ์žฌ ์›๊ณ ๋Š” ์ง„ํฅ์› ํ™ˆํŽ˜์ด์ง€๋ฅผ ํ†ตํ•ด

์ „๋ฌธ์„ ๊ณต๊ฐœํ•˜๋ฉฐ, ํ•™์ˆ ์ง€์— ๊ฒŒ์žฌํ•œ๋‹ค.

(2) ๊ฒŒ์žฌ๋œ ๋…ผ๋ฌธ์˜ ์ €์ž‘๊ถŒ์€ ์ง„ํฅ์›์— ๊ท€์†๋˜๋ฉฐ,

์ง„ํฅ์›์˜ ์Šน์ธ์—†์ด ๋ฌด๋‹จ๋ณต์ œ ํ•  ์ˆ˜ ์—†๋‹ค.

์›๊ณ ํˆฌ๊ณ ์ง€์นจ ๋ฐ ๋…ผ๋ฌธ ์ž‘์„ฑ์š”๋ น

Internet and Information Security 123

์›๊ณ ํˆฌ๊ณ ์ง€์นจ

Page 125: nternet I Security - BIGBOOK

1. ์›๊ณ  ์ž‘์„ฑ์–‘์‹

(1) ์›๊ณ ๋ถ„๋Ÿ‰ : ๊ทธ๋ฆผ๊ณผ ํ‘œ๋ฅผ ํฌํ•จํ•˜์—ฌ A4 ๊ธฐ์ค€

(์žฅ๋‹น 1,200์ž ๋‚ด์™ธ) 20๋งค ๋‚ด์™ธ(ํ•œ ๋ฌธ์ดˆ๋ก

์€ 500์ž ์ด๋‚ด, ์–ด์ดˆ๋ก์€ 200๋‹จ์–ด ์ด๋‚ด,

๊ตญ๋ฌธโˆ™ ๋ฌธ ํ‚ค์›Œ๋“œ 5~7๊ฐœ ์ด๋‚ด)

(2) ํ”„๋กœ๊ทธ๋žจ : ํ•œ 97 ์ด์ƒ ๋˜๋Š” MS ์›Œ๋“œ 97

์ด์ƒ ๊ถŒ์žฅ

(3) ํŽธ์ง‘์šฉ์ง€ : A4(210mm ร— 297mm) ์šฉ์ง€์—ฌ

๋ฐฑ ์œ„์ชฝ/์•„๋ž˜์ชฝ 20/15, ๋จธ๋ฆฌ๋ง/๊ผฌ๋ฆฌ๋ง

15/15, ์™ผ์ชฝ/์˜ค๋ฅธ์ชฝ 30/30

(4) ๋‹จ ํŽธ ์ง‘ : 1๋‹จ

(5) ๋ฌธ๋‹จ๋ชจ์–‘ : ์—ฌ๋ฐฑ ์™ผ์ชฝ/์˜ค๋ฅธ์ชฝ 0, ์œ„/์•„๋ž˜ ๊ฐ„

๊ฒฉ 0, ๋‚ฑ๋ง๊ฐ„๊ฒฉ 0

(6) ์ž๋ชจ์–‘ : ํ•œ ์‹ ๋ช…์กฐ, ํฌ๊ธฐ 10pt(๊ฐ์ฃผ๋Š”

9pt), ์ค„๊ฐ„๊ฒฉ 200, ์–‘์ชฝํ˜ผํ•ฉ, ์žฅํ‰ 100, ์ž๊ฐ„ 0

2. ์ œ๋ชฉ ๋ฒˆํ˜ธ ๋ถ™์ž„

(1) ๋…ผ๋ฌธ์€ ํ•œ ๋˜๋Š” ์–ด๋กœ ์ž‘์„ฑํ•˜๋ฉฐ ํ•œ ์ œ๋ชฉ,

์–ด ์ œ๋ชฉ, ํ•œ ๋ฌธ ์ดˆ๋ก, ๊ตญ๋ฌธ ํ‚ค์›Œ๋“œ, ์–ด

์ดˆ๋ก, ๋ฌธ ํ‚ค์›Œ๋“œ, ๋ณธ๋ฌธ, ์ฐธ๊ณ ๋ฌธํ—Œ์˜ ์ˆœ์„œ๋กœ

๋‚˜๋ˆ„์–ด ์ž‘์„ฑํ•œ๋‹ค.

(2) ๋ชฉ์ฐจ์˜ ์žฅ, ์ ˆ, ํ•ญ, ๋ชฉ ๋“ฑ์˜ ํ‘œ์‹œ๋Š” โ… , 1, 1),

(1), โ‘ ์˜ ์ˆœ์„œ์— ๋”ฐ๋ฅธ๋‹ค.

(3) ๋ณธ๋ฌธ์€ ํ•œ ์ „์šฉ์„ ์›์น™์œผ๋กœ ํ•˜๊ณ , ๋ถˆ๊ฐ€ํ”ผ

ํ•˜๋‹ค๊ณ  ์ธ์ •๋  ๊ฒฝ์šฐ์—๋งŒ ํ•œ์ž์™€ ์™ธ๋ž˜์–ด๋ฅผ

ํ•œ ์›๋ฌธ ์˜† ๊ด„ํ˜ธ ์†์— ๊ฐ™์ด ์“ฐ๋„๋ก ํ•œ๋‹ค.

3. ํ‘œ์™€ ๊ทธ๋ฆผ

(1) ํ‘œ์™€ ๊ทธ๋ฆผ์—๋Š” <ํ‘œ 1>, [๊ทธ๋ฆผ 1]๊ณผ ๊ฐ™์ด ์ œ๋ชฉ

์ด๋‚˜ ์„ค๋ช…์„ ๋ถ™์—ฌ์•ผ ํ•˜๋ฉฐ, ๋ณธ๋ฌธ์— ํ•ด๋‹น ํ‘œ์™€

๊ทธ๋ฆผ์˜ ๋ฒˆํ˜ธ๋ฅผ ๋ช…๊ธฐํ•˜๊ณ  ์„ค๋ช…ํ•œ๋‹ค.

(์˜ˆ : <ํ‘œ 1>์—์„œ ๋ณผ ์ˆ˜ ์žˆ๋“ฏ์ด...)

(2) ํ‘œ์˜ ์ œ๋ชฉ์€ ํ‘œ์˜ ์œ„์—, ๊ทธ๋ฆผ์˜ ์ œ๋ชฉ์€ ๊ทธ๋ฆผ

์•„๋ž˜์— ์จ๋„ฃ๋Š”๋‹ค.

(3) ํ‘œ์™€ ๊ทธ๋ฆผ์€ ์›๋ณธ ๊ทธ ๋กœ๋ฅผ ๋ณต์‚ฌ, ์ธ์‡„ํ•  ์ˆ˜

์žˆ๋„๋ก ์„ ๋ช…ํ•˜๊ฒŒ ๊ทธ๋ฆฐ๋‹ค.

(4) ํ‘œ์™€ ๊ทธ๋ฆผ์— ๋„์‹, ํ™”์‚ดํ‘œ ๋“ฑ์„ ์‚ฌ์šฉํ•˜ ์„

๋•Œ๋Š” ๊ฐœ์ฒด๋ฅผ ๋ฌถ๊ณ , ๋ฐ˜๋“œ์‹œ ๋ฌธ์„œ์— ํฌํ•จ์‹œํ‚จ๋‹ค.

4. ์ฃผ, ์ธ์šฉ, ์ธ์šฉ๋ฌธํ—Œ

(1) ์ฐธ๊ณ ํ•œ ์ฑ…์— ํ•œ ์ฃผ์„์€ ๋ณธ๋ฌธ ์ฃผ๋กœ ํ•˜๋ฉฐ,

๋‹จ, ๋ณด์ถฉ์ ์ธ ๋‚ด์šฉ์ด๋‚˜ ์„ค๋ช…์ด ํ•„์š”ํ•œ ๊ฒฝ์šฐ

์—๋Š” ๊ฐ์ฃผ๋ฅผ ์‚ฌ์šฉํ•œ๋‹ค. ๋ณธ๋ฌธ์ฃผ์˜ ํ‘œ๊ธฐ๋Š” ๋‹ค

์Œ๊ณผ ๊ฐ™์ด ํ•œ๋‹ค.

- ํ•œ ๊ถŒ์ผ ๊ฒฝ์šฐ : ํ™๊ธธ๋™, 2005, p.57

- ๋‘ ๊ถŒ ์ด์ƒ์ผ ๊ฒฝ์šฐ : ํ™๊ธธ๋™, 2004,

pp.35-45; ์ด๋ชฝ๋ฃก, 2005, p.120

- ์ธ์šฉ์ฑ…์˜ ์ €์ž๊ฐ€ 2์ธ ์ดํ•˜์ธ ๊ฒฝ์šฐ ์ €์ž์˜

์ด๋ฆ„์„ ๋ชจ๋‘ ๋ช…๊ธฐ : ํ™๊ธธ๋™โˆ™์ด๋ชฝ๋ฃก,

2008, p.26; Pan & Kosicki, 1993, p.55

- 3์ธ ์ด์ƒ์ธ ๊ฒฝ์šฐ ํ™๊ธธ๋™ ์™ธ, Williams et

al.๋กœ ํ‘œ๊ธฐ

(2) ๋ณธ๋ฌธ์—์„œ ๋‘ ๋ช… ์ด์ƒ์˜ ์ €์ž๋ฅผ ์ธ์šฉํ•  ๊ฒฝ์šฐ,

๊ฐ€๋‚˜๋‹ค ๋˜๋Š” ์•ŒํŒŒ๋ฒณ์ˆœ์œผ๋กœ ์ œ์‹œํ•œ๋‹ค. ์ €์ž๊ฐ€

๊ฐ™๊ณ  ์—ฐ๋„๊ฐ€ ๋‹ค๋ฅธ ๋ฌธํ—Œ์„ ํ•จ๊ป˜ ์–ธ๊ธ‰ํ•  ๋•Œ์—๋Š”

์—ฐ๋„๋งŒ ๋‚˜์—ดํ•œ๋‹ค.

- ์ด๋ชฝ๋ฃก, 1999; ํ™๊ธธ๋™, 1990

- Pan & Kosicki, 1993; Schefele, 1999

- Gogel, 1984, 1990; James, 1996a, 1996b

์ œ ๊ถŒ ์ œ ํ˜ธ

124 ๋…„ ์›”

๋…ผ๋ฌธ ์ž‘์„ฑ์š”๋ น

Page 126: nternet I Security - BIGBOOK

5. ์ฐธ๊ณ ๋ฌธํ—Œ ์ž‘์„ฑ

(1) ๋ณธ๋ฌธ์— ์ธ์šฉํ•˜๊ฑฐ๋‚˜ ์–ธ๊ธ‰ํ•œ ๋ฌธํ—Œ๋งŒ์„ ์ œ์‹œํ•œ๋‹ค.

(2) ์ฐธ๊ณ ๋ฌธํ—Œ์€ํ•œ๊ตญ์–ด, ๋™์–‘์–ด(์ผ๋ณธ์–ด, ์ค‘๊ตญ์–ด๋“ฑ),

์„œ์–‘์–ด ์ˆœ์œผ๋กœ ํ•˜๋˜, ๋ฒˆ์—ญ์„œ(์˜ˆ: ํ•œ ๋กœ ๋ฒˆ์—ญ๋œ

๋ฌธ์„œ)๋Š” ํ•ด๋‹น ์›์–ด ๋ฌธํ—Œ์œผ๋กœ ๋ถ„๋ฅ˜ํ•œ๋‹ค.

(3) ํ•œ , ํ•œ์ž, ์ผ๋ณธ์–ด๋กœ ๋œ ์ €์ž๋ช…์€ ๊ฐ€๋‚˜๋‹ค์ˆœ

์œผ๋กœ, ์„œ์–‘ ๋ฌธํ—Œ ์ €์ž๋ช…์€ ์•ŒํŒŒ๋ฒณ์ˆœ์œผ๋กœ

๋‚˜์—ดํ•œ๋‹ค. ์ค‘๊ตญ์–ด๋‚˜ ์ผ๋ณธ์–ด ์ €์ž๋ช…์€ ํ•œ์ž์˜

ํ•œ ์‹ ํ‘œ๊ธฐ์— ๋”ฐ๋ผ ๋ฐฐ์—ดํ•˜๋˜, ์›์–ด ํ‘œ๊ธฐ๋ฅผ

์•Œ ๋•Œ์—๋Š” ๊ด„ํ˜ธ ์†์— ๋ช…๊ธฐํ•œ๋‹ค.

(4) ์ฐธ๊ณ ๋ฌธํ—Œ ์ž‘์„ฑ์–‘์‹์€ APA(๋ฏธ๊ตญ์‹ฌ๋ฆฌํ•™ํšŒ)

์–‘์‹์— ๋”ฐ๋ฅธ๋‹ค. ์ฐธ๊ณ ๋ฌธํ—Œ ์ž‘์„ฑ์˜ ๊ตฌ์ฒด์ ์ธ

์˜ˆ๋Š” ์•„๋ž˜์™€ ๊ฐ™๋‹ค.

๊ฐ€. ์ €์„œ์˜ ๊ฒฝ์šฐ

์„ฑ๋™๊ทœโˆ™๋ผ๋„์‚ผ (2000). ใ€Ž์ธํ„ฐ๋„ท๊ณผ ์ปค

๋ฎค๋‹ˆ์ผ€์ด์…˜ใ€. ์„œ์šธ: ํ•œ์˜ฌ.

Castells, M. (2001). The Internet

galaxy: Reflections on the

Internet, business, and society.

New York: Oxford University

Press.

๋‚˜. ํŽธ์ง‘๋œ ์ฑ… ์†์˜ ์ธ ๊ฒฝ์šฐ

๊ถŒ ์ค€ (2000). ์ €์ž‘๊ถŒ ์นจํ•ด์— ํ•œ ์˜จ๋ผ์ธ

์„œ๋น„์Šค ์ œ๊ณต์ž์˜ ์ฑ…์ž„. ใ€Ž์ธํ„ฐ๋„ท๊ณผ ๋ฒ•๋ฅ ใ€

(pp. 64-102). ์„œ์šธ: ํ˜„์•”์‚ฌ.

McNamee, S., & Shotter, J. (2004).

Dialogue, creativity, and change.

In R. Anderson, L. A. Baxter & K.

N. Cissna (Eds.), Dialogue: Theorizing

difference in communication studies

(pp. 21-38). Thousand Oaks, CA:

Sage.

๋‹ค. ๋ฒˆ์—ญ์„œ์˜ ๊ฒฝ์šฐ

Anderson, C. (2006). The long Tail:

Why the future of business is

selling less of more. ์ดํ˜ธ์ค€ ์—ญ

(2006). ใ€Ž๋กฑํ…Œ์ผ ๊ฒฝ์ œํ•™ใ€. ์„œ์šธ: ๋žœ๋คํ•˜

์šฐ์Šค์ฝ”๋ฆฌ์•„.

Laplace, P. S. (1951). A philosophical

essay of probabilities (F. W.

Truscott & F. L. Emory, Trans.).

New York: Dover.

๋ผ. ํ•™์ˆ ์ง€์˜ ๊ฒฝ์šฐ

ํ•œ์ •ํฌโˆ™์žฅํ™œ์‹โˆ™๊น€์ข…๊ธฐ (2001). ์ธํ„ฐ๋„ท

๋น„์ฆˆ๋‹ˆ์Šค ์›น์‚ฌ์ดํŠธ์˜ ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ์ •์ฑ…

ํ˜„ํ™ฉ. ใ€Ž์ •๋ณด๋ณดํ˜ธํ•™ํšŒ์ง€ใ€, 11(4), 35-43.

Lu, J., Yao, J. E., & Yu, C. S.

(2005). Personal innovativeness,

social influences and adoption of

wireless Internet services via

mobile technology. Journal of

Strategic Information Systems,

14(3), 245-268.

๋งˆ. ๋ณด๊ณ ์„œ์˜ ๊ฒฝ์šฐ

์ดํ˜ธ โˆ™์ •์€ํฌโˆ™์ด์žฅํ˜ (2007). ใ€Ž์›น

2.0์‹œ ๋””์ง€ํ„ธ ์ฝ˜ํ…์ธ ์˜ ์‚ฌํšŒ์  ํ™•์‚ฐ

๊ฒฝ๋กœ ์—ฐ๊ตฌใ€(์—ฐ๊ตฌ๋ณด๊ณ  07-03). ๊ณผ์ฒœ: ์ •๋ณด

ํ†ต์‹ ์ •์ฑ…์—ฐ๊ตฌ์›.

ํ•œ๊ตญ์ธํ„ฐ๋„ท์ง„ํฅ์› (2008). ใ€Ž2008 ํ•œ๊ตญ

์ธํ„ฐ๋„ท๋ฐฑ์„œใ€. ์„œ์šธ: ํ•œ๊ตญ์ธํ„ฐ๋„ท์ง„ํฅ์›.

Frankel, S., Eydt, B., Owens, L., &

Scarfone, K. (2007). Establishing

wireless robust security networks

(NIST Publication No. 800-97).

Gaithersburg, MD: National Institute

of Standards and Technology.

๋ฐ”. ํ•™์œ„๋…ผ๋ฌธ์˜ ๊ฒฝ์šฐ

์ด์›ํƒœ (2004). ใ€Ž์ธํ„ฐ๋„ท ์ •์น˜์ฐธ์—ฌ์— ๊ด€ํ•œ

์—ฐ๊ตฌ: 2004๋…„ ํ•œ๊ตญ์˜ 17 ์ด์„ ์ •๊ตญ์„

์›๊ณ ํˆฌ๊ณ ์ง€์นจ ๋ฐ ๋…ผ๋ฌธ ์ž‘์„ฑ์š”๋ น

Internet and Information Security 125

Page 127: nternet I Security - BIGBOOK

์ค‘์‹ฌ์œผ๋กœใ€, ์„œ๊ฐ• ํ•™๊ต ํ•™์› ๋ฐ•์‚ฌํ•™์œ„

๋…ผ๋ฌธ.

Ryerson, J. F. (1983). Effective

management training: Two models.

Unpublished masterโ€™s thesis, Clarke

College of Technology, Potsdam, NY.

์‚ฌ. ์‹ ๋ฌธ๊ธฐ์‚ฌ์˜ ๊ฒฝ์šฐ

์ •์ง„์šฑ (2010. 2. 3). ์Šค๋งˆํŠธํฐ์œผ๋กœ ์ธํ„ฐ

๋„ท๋ชฐ ๊ด€๋ฆฌ. ใ€Ž์ „์ž์‹ ๋ฌธใ€.

Gardner, H. (1981, September). Do

babies sing a universal song.

Psychology Today, 70-76. (์žก์ง€ ๊ธฐ

์‚ฌ์ผ ๋•Œ)

์•„. ์ธํ„ฐ๋„ท์ž๋ฃŒ์˜ ๊ฒฝ์šฐ

ํ•ด๋‹น ๊ธฐ๊ด€(๊ฐœ์ธ) ํ™ˆํŽ˜์ด์ง€ ์‚ฌ์ดํŠธ๋ช…๋งŒ ์“ฐ์ง€

์•Š๊ณ  ์‹ค์ œ๋กœ ์ฐธ๊ณ ํ•œ ์ž๋ฃŒ์˜ ์ด๋ฆ„๊ณผ ์ฃผ์†Œ๋ฅผ

๋ชจ๋‘ ํ‘œ๊ธฐํ•œ๋‹ค. ๋งจ๋์— ๋งˆ์นจํ‘œ๋Š” ์ฐ์ง€

์•Š๋Š”๋‹ค. ์ €์ž, ์ œ์ž‘์ผ์‹œ, ์ฃผ์ œ, ๊ฐ„ํ–‰๋ฌผ

์ œ๋ชฉ, ํ˜ธ์ˆ˜, ์›น์ฃผ์†Œ์ˆœ์œผ๋กœ ์‚ฌ์šฉํ•œ๋‹ค.

ํ•œ๊ตญ์ธํ„ฐ๋„ท์ง„ํฅ์›(2009). ์›น์‚ฌ์ดํŠธ๊ฐœ๋ฐœโˆ™

์šด ์„ ์œ„ํ•œ ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ ๊ฐ€์ด๋“œ.

http://www.cyberprivacy.or.kr/pri

vacy.html

ENISA (2010). Security issues in cross-

border electronic authentication.

Retrieved from http://www.enisa.europa.

eu/act/it/eid/xborderauth/at_

download/fullReport

์ œ ๊ถŒ ์ œ ํ˜ธ

126 ๋…„ ์›”

Page 128: nternet I Security - BIGBOOK

ํ•œ๊ตญ์ธํ„ฐ๋„ท์ง„ํฅ์›์—์„œ ๋ฐœํ–‰ํ•˜๋Š”ใ€ŒInternet and Information Security (IIS)ใ€๋Š” ์ธํ„ฐ๋„ท์— ํ•œ ์ด๋ก ์ ,

์ฒ ํ•™์  ๊ธฐ์ดˆ๋ฅผ ๊ฐ•ํ™”ํ•˜๊ณ , ์ธํ„ฐ๋„ท ํ™˜๊ฒฝ์—์„œ ์ œ๊ธฐ๋˜๋Š” ํ˜„์•ˆ์— ํ•œ ๊ทผ๋ณธ์  ์ง„๋‹จ๊ณผ ํ•จ๊ป˜ ์‹ฌ๋„ ๊นŠ์€ ์‘๋ฐฉ์•ˆ์„

๋ชจ์ƒ‰ํ•˜๋Š” ์ „๋ฌธ์ง€์ž…๋‹ˆ๋‹ค(2012๋…„๋ถ€ํ„ฐ ์—ฐ 4ํšŒ ๋ฐœ๊ฐ„). IIS์— ๊ฒŒ์žฌํ•  ๋…ผ๋ฌธ์„ ๋‹ค์Œ๊ณผ ๊ฐ™์ด ๊ณต๊ฐœ๋ชจ์ง‘ ํ•˜์˜ค๋‹ˆ ๊ด€์‹ฌ

์žˆ๋Š” ๋ถ„๋“ค์˜ ๋งŽ์€ ํˆฌ๊ณ  ๋ฐ”๋ž๋‹ˆ๋‹ค.

1. ๋…ผ๋ฌธ๋ชจ์ง‘

ํˆฌ๊ณ  ๋…ผ๋ฌธ์€ ์ „์ž์šฐํŽธ([email protected])์„ ํ†ตํ•ด ์—ฐ์ค‘ ์ƒ์‹œ ์ ‘์ˆ˜ํ•˜๋ฉฐ, ์ผ๋ฐ˜๋…ผ๋ฌธ(์ธํ„ฐ๋„ท ๋ฐ ์ •๋ณด๋ณดํ˜ธ

๋ถ„์•ผ ์ž์œ ์ฃผ์ œ)๊ณผ ๊ธฐํš๋…ผ๋ฌธ(์•„๋ž˜ ํ‘œ ์ฐธ์กฐ)์„ ํ•จ๊ป˜ ๋ชจ์ง‘ํ•ฉ๋‹ˆ๋‹ค.

2.๋…ผ๋ฌธ์ œ์ถœ์ฒ˜

๋…ผ๋ฌธํˆฌ๊ณ ์‹ ์ฒญ์„œ(ํ™ˆํŽ˜์ด์ง€ ๊ฒŒ์‹œ)์™€ ํ•จ๊ป˜ ์ „์ž์šฐํŽธ([email protected])์œผ๋กœ ์ œ์ถœํ•ฉ๋‹ˆ๋‹ค.

์ž์„ธํ•œ ์‚ฌํ•ญ์€ IIS ํ•™์ˆ ์ง€ ํ™ˆํŽ˜์ด์ง€(www.kisa.or.kr/public/library/journal.jsp)๋ฅผ ์ฐธ์กฐ ๋˜๋Š”

IIS ์‚ฌ๋ฌด๊ตญ(02-405-6516)์œผ๋กœ ๋ฌธ์˜ํ•˜์‹œ๊ธฐ ๋ฐ”๋ž๋‹ˆ๋‹ค.

2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด2012๋…„ใ€ŽInternet and Information Securityใ€๋…ผ๋ฌธ๊ณต๋ชจ์•ˆ๋‚ด

โ€ป ์‹ฌ์‚ฌ ํ›„ ์ฑ„ํƒ๋œ ๋…ผ๋ฌธ์— ํ•ด์„œ๋Š” ์†Œ์ •์˜ ์›๊ณ ๋ฃŒ๋ฅผ ์ง€๊ธ‰ํ•ฉ๋‹ˆ๋‹ค.

โ€ป ์›๊ณ ๋ถ„๋Ÿ‰์€ ํ•œ ์˜ ๊ฒฝ์šฐ A4 20ํŽ˜์ด์ง€ ๋‚ด์™ธ(์žฅ๋‹น 1,200์ž ๋‚ด์™ธ)๋ฅผ ๊ถŒ์žฅํ•ฉ๋‹ˆ๋‹ค

(์›๊ณ  ํŽธ์ง‘๊ธฐ์ค€ ๋ฐ ์ž์„ธํ•œ ๋‚ด์šฉ์€ IIS ๋…ผ๋ฌธ์ž‘์„ฑ์š”๋ น์„ ์ฐธ์กฐ)

โ€ป ํ•™์ˆ ๋…ผ๋ฌธ์— ์š”๊ตฌ๋˜๋Š” ํ˜•์‹โˆ™์ฒด๊ณ„๋ฅผ ๊ฐ–์ถ”๊ณ , ๋‹ค๋ฅธ ํ•™์ˆ ์ง€ ๋ฐ ๊ฐ„ํ–‰๋ฌผ์— ๋ฐœํ‘œ๋˜์ง€ ์•Š์€ ๋‚ด์šฉ์ด์–ด์•ผ ํ•ฉ๋‹ˆ๋‹ค.

๊ถŒํ˜ธ์ˆ˜(๋ฐœ๊ฐ„์‹œ๊ธฐ)๊ธฐํš๋…ผ๋ฌธ ์ผ๋ฐ˜๋…ผ๋ฌธ

์ฃผ ์ œ ์ ‘์ˆ˜๊ธฐ๊ฐ„ ์ฃผ ์ œ ์ ‘์ˆ˜๊ธฐ๊ฐ„

์ œ3๊ถŒ ์ œ2ํ˜ธ

(โ€™12๋…„ 4์›”๋ง ๋ฐœ๊ฐ„)

๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ

(๋ฒ•์ โˆ™์ •์ฑ…์ โˆ™๊ธฐ์ˆ ์  ์ฑ… ๋“ฑ)~โ€™12. 2. 15

์ œํ•œ์—†์Œ

(๋ฒ•์ œ๋„โˆ™์ •์น˜๊ฒฝ์ œ

โˆ™์‚ฌํšŒ๋ฌธํ™”โˆ™๊ธฐ์ˆ  ๋ถ„์•ผ ๋“ฑ)

์—ฐ์ค‘

์ ‘์ˆ˜

์ œ3๊ถŒ ์ œ3ํ˜ธ

(โ€™12๋…„ 7์›”๋ง ๋ฐœ๊ฐ„)ํด๋ผ์šฐ๋“œ ์„œ๋น„์Šค ~โ€™12.5. 15

์ œ3๊ถŒ ์ œ4ํ˜ธ

(โ€™12๋…„ 10์›”๋ง ๋ฐœ๊ฐ„)

์Šค๋งˆํŠธ ์„œ๋น„์Šค

(์Šค๋งˆํŠธ์›Œํฌ, ์Šค๋งˆํŠธTV ๋“ฑ)~โ€™12. 8. 15

์ œ4๊ถŒ ์ œ1ํ˜ธ

(โ€™13๋…„ 1์›”๋ง ๋ฐœ๊ฐ„)์‚ฌ๋ฌผ์ง€๋Šฅํ†ต์‹ (M2M) ~โ€™12. 11. 15

Page 129: nternet I Security - BIGBOOK

ํ•œ๊ตญ์ธํ„ฐ๋„ท์ง„ํฅ์›์—์„œ ๋ฐœํ–‰ํ•˜๋Š”

โ€œInternet and Information Securityโ€๋Š”

๊ตญ๋‚ด์™ธ ์ธํ„ฐ๋„ท ๋ฐ ์ •๋ณด๋ณดํ˜ธ ๊ด€๋ จ ๋ฒ•์ œ๋„,

์‚ฌํšŒ๋ฌธํ™”, ๊ธฐ์ˆ  ๋“ฑ์˜ ๋™ํ–ฅ์„ ์‹ฌ์ธต ๋ถ„์„ํ•˜๊ณ ,

ํ•œ๊ตญ์˜ ๋ฐ”๋žŒ์งํ•œ ์ธํ„ฐ๋„ท ์ •์ฑ…๋ฐฉํ–ฅ ์ˆ˜๋ฆฝ์—

๊ธฐ์—ฌํ•  ์ƒˆ๋กœ์šด ์—ฐ๊ตฌ์„ฑ๊ณผ๋ฅผ ์†Œ๊ฐœํ•˜๋Š”

ํ•™์ˆ ์ง€์ž…๋‹ˆ๋‹ค. ๋ณธ ์ €๋„์— ํ•™, ์—ฐ๊ตฌ๊ธฐ๊ด€,

์ •๋ถ€๊ธฐ๊ด€ ์ „๋ฌธ๊ฐ€ ์—ฌ๋Ÿฌ๋ถ„๋“ค์˜ ๋งŽ์€

๊ธฐ๊ณ ๋ฅผ ๋ฐ”๋ž๋‹ˆ๋‹ค.

www.kisa.or.kr

๏ฟฝ ํŽธ์ง‘์œ„์›ํšŒ

์œ„์›์žฅ :

์œ„ ์› :

์žฅ์„๊ถŒ ํ•œ์–‘ ๊ฒฝ ํ•™๋ถ€ ๊ต์ˆ˜

์‹ ๋ฏผ์ˆ˜ ํ•œ์–‘ ๊ฒฝ ํ•™๋ถ€ ๊ต์ˆ˜

์˜คํฌ๊ตญ ํ•œ์–‘ ์ปดํ“จํ„ฐ๊ณตํ•™๊ณผ ๊ต์ˆ˜

์œค์„ฑ์ด ๊ฒฝํฌ ์ •์น˜์™ธ๊ตํ•™๊ณผ ๊ต์ˆ˜

์ด๊ฒฝ์ „ ๊ฒฝํฌ ๊ฒฝ ํ•™๋ถ€ ๊ต์ˆ˜

์ด์ž„ ์ˆœ์ฒœํ–ฅ ์ปดํ“จํ„ฐํ•™๋ถ€ ๊ต์ˆ˜

์žฅ์„ฑํ˜ธ ๋ฐฐ์žฌ ์ •์น˜์™ธ๊ตํ•™๊ณผ ๊ต์ˆ˜

์ • ์‹ ์›๊ด‘ ์ปดํ“จํ„ฐ๊ณตํ•™๊ณผ ๊ต์ˆ˜

์ •์ค€ํ˜„ ๋‹จ๊ตญ ๋ฒ•๊ณผ ํ•™ ๊ต์ˆ˜

์กฐํ™”์ˆœ ์—ฐ์„ธ ์ •์น˜์™ธ๊ตํ•™๊ณผ ๊ต์ˆ˜

์ตœ์„ ๊ทœ ๋ช…์ง€ ๋””์ง€ํ„ธ๋ฏธ๋””์–ดํ•™๊ณผ ๊ต์ˆ˜

ํ™ฉ์žฅ์„  ์ค‘์•™ ๊ด‘๊ณ ํ™๋ณดํ•™๊ณผ ๊ต์ˆ˜

์ด์žฌ์ผ ํ•œ๊ตญ์ธํ„ฐ๋„ท์ง„ํฅ์› ์ธํ„ฐ๋„ท์œตํ•ฉ์ •์ฑ…๋‹จ์žฅ

๏ฟฝ ๋ฐœํ–‰์ธ : ์„œ์ข…๋ ฌํ•œ๊ตญ์ธํ„ฐ๋„ท์ง„ํฅ์›์›์žฅ

์„œ ์ข… ๋ ฌ

IIS ํŽธ์ง‘์œ„์›ํšŒ

์†กํŒŒ์‚ฌ00007

2010๋…„ 5์›” 26์ผ

2011๋…„ 11์›” 30์ผ

ํ•œ๊ตญ์ธํ„ฐ๋„ท์ง„ํฅ์›

138-803 ์„œ์šธ์‹œ ์†กํŒŒ๊ตฌ ์ค‘ ๋กœ 109 ๋™๋นŒ๋”ฉ

Tel: (02)405-4118, Fax: (02)405-5119

email: [email protected]

ํ˜ธ์ •์”จ์•คํ”ผ Tel: (02)2277-4718

๋ฐœ ํ–‰ ์ธ

ํŽธ ์ง‘ ์ธ

๋“ฑ ๋ก ๋ฒˆ ํ˜ธ

๋“ฑ ๋ก ๋…„ ์›” ์ผ

๋ฐœ ํ–‰ ์ผ

๋ฐœ ํ–‰ ์ฒ˜

์ œ ์ž‘

:

:

:

:

:

:

:

Internet and Information Security

Internet &Information

Security

Page 130: nternet I Security - BIGBOOK

2011 11์ œ2๊ถŒ ์ œ2ํ˜ธ

Internet & Information Security Internet & Information Security

Internet &Inform

ation Security

์ œ2๊ถŒ

์ œ2ํ˜ธ

2011๏ฟฝ11

ISSN 2093-9612

โ— Click ๊ธฐ๋ฐ˜์˜ ๊ธฐ๋ณธ MOFI ํ…Œ์ŠคํŠธ๋ฒ ๋“œ ๊ตฌ์ถ• ์ •ํšŒ์ง„, ์ด์žฌ์šฉ, ๊น€๋ณ‘์ฒ 

โ— ํ”„๋กœ๊ทธ๋žจํ™” ๋ฐ ๊ฐ€์ƒํ™”๋ฅผ ์ง€์›ํ•˜๋Š” ์ปดํ“จํŒ…/๋„คํŠธ์›Œํ‚น ์ธํ”„๋ผ์ƒ์˜

๋ฏธ๋ž˜์ง€ํ–ฅ์ ์ธ ์„œ๋น„์Šค ํ•ฉ์„ฑ ๋ฐฉ๋ฒ•๋“ค ๊น€์ข…์›, ํ•œ์ƒ์šฐ

โ— ๋น… ๋ฐ์ดํ„ฐ์™€ ๊ณต๊ณต ๋ฐ์ดํ„ฐ ํ™œ์šฉ ์ด๋งŒ์žฌ

โ— ๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ ํญ์ฆํ˜„์ƒ๊ณผ ์ฝ˜ํ…์ธ  ์ค‘์‹ฌ ๋„คํŠธ์›Œํ‚น ๊ธฐ์ˆ  ์ด ์„

โ— ํ•œ๊ตญ์‚ฌํšŒ ๋ณ€ํ™”์™€ ๋ฏธ๋ž˜์ธํ„ฐ๋„ท ์ •์ฑ…์— ํ•œ ํƒ์ƒ‰์  ์—ฐ๊ตฌ ๊น€์‚ฌํ˜, ์ตœ์ƒํ›ˆ

โ— Implementation of Basic MOFI Testbed using Click Whoi-Jin Jung, Jae-Yong Lee, Byung-Chul Kim

โ— Futuristic Service Composition Approaches over a Programmable/VirtualizedComputing/Networking Infrastructure JongWon Kim, Sang Woo Han

โ— Big Data and the Utilization of Public Data Manjai Lee

โ— Data Traffic Explosion and Content-Centric Networking Technologies Young-Seok Lee

โ— Exploratory Research on the Future Internet Policy according to the Changes in Korean Society Sa-Hyuk Kim, Sang-Hoon Choi

ํŠน์ง‘ : ๋ฏธ๋ž˜์ธํ„ฐ๋„ท