{"id":1837,"date":"2023-03-02T00:18:09","date_gmt":"2023-03-02T00:18:09","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1520"},"modified":"2023-03-02T00:18:09","modified_gmt":"2023-03-02T00:18:09","slug":"%ed%9a%a8%ec%9c%a8%ec%a0%81%ec%9d%b8-%eb%8b%a4%eb%8b%a8%ea%b3%84-%ed%94%bc%ec%8b%b1-%ec%82%ac%ec%9d%b4%ed%8a%b8-%ed%83%90%ec%a7%80-%eb%aa%a8%eb%8d%b8","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ko\/%ed%94%bc%ec%8b%b1\/%ed%9a%a8%ec%9c%a8%ec%a0%81%ec%9d%b8-%eb%8b%a4%eb%8b%a8%ea%b3%84-%ed%94%bc%ec%8b%b1-%ec%82%ac%ec%9d%b4%ed%8a%b8-%ed%83%90%ec%a7%80-%eb%aa%a8%eb%8d%b8\/","title":{"rendered":"\ud6a8\uc728\uc801\uc778 \ub2e4\ub2e8\uacc4 \ud53c\uc2f1 \uc6f9\uc0ac\uc774\ud2b8 \ud0d0\uc9c0 \ubaa8\ub378"},"content":{"rendered":"<p>Phishing is the most common method for cybercriminals to steal information today, and this cyberthreat is getting worse as more and more reports come in about privacy leaks and financial losses caused by this type of cyberattack. It\u2019s important to keep in mind that the way ODS detects phishing doesn\u2019t fully look at what makes phishing work.<\/p>\n\n\n\n<p>\ub610\ud55c, \ud0d0\uc9c0 \ubaa8\ub378\uc740 \uc18c\uc218\uc758 \ub370\uc774\ud130 \uc138\ud2b8\uc5d0\uc11c\ub9cc \uc798 \uc791\ub3d9\ud569\ub2c8\ub2e4. \uc2e4\uc81c \uc6f9 \ud658\uacbd\uc5d0\uc11c \uc0ac\uc6a9\ub418\uae30 \uc804\uc5d0 \uac1c\uc120\uc774 \ud544\uc694\ud569\ub2c8\ub2e4. \uc774 \ub54c\ubb38\uc5d0 \uc0ac\uc6a9\uc790\ub4e4\uc740 \ud53c\uc2f1 \uc6f9\uc0ac\uc774\ud2b8\ub97c \ube60\ub974\uace0 \uc815\ud655\ud558\uac8c \ucc3e\uc744 \uc218 \uc788\ub294 \uc0c8\ub85c\uc6b4 \ubc29\ubc95\uc744 \uc6d0\ud569\ub2c8\ub2e4. \uc774\ub97c \uc704\ud574 \uc0ac\ud68c \uacf5\ud559\uc758 \uc6d0\uce59\uc740 \ud2b9\ud788 \uc2e4\uc81c \uc6f9\uc5d0\uc11c \ud53c\uc2f1 \uc0ac\uc774\ud2b8\ub97c \ub2e4\uc591\ud55c \ub2e8\uacc4\uc5d0\uc11c \ud6a8\uacfc\uc801\uc73c\ub85c \uac10\uc9c0\ud560 \uc218 \uc788\ub294 \ud765\ubbf8\ub85c\uc6b4 \ud3ec\uc778\ud2b8\ub97c \uc81c\uacf5\ud569\ub2c8\ub2e4.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-history-of-phishing\">\ud53c\uc2f1\uc758 \uc5ed\uc0ac<\/h2>\n\n\n<p>Keep in mind that phishing is a common type of social engineering attack, which means that hackers use people\u2019s natural instincts, trust, fear, and greed to trick them into doing bad things. Research on cybersecurity shows that <a href=\"https:\/\/cyware.com\/news\/phishing-attacks-increase-350-percent-amid-covid-19-quarantine-5b95d3ca\" target=\"_blank\" rel=\"noreferrer noopener\">COVID-19 \uaca9\ub9ac \uae30\uac04 \ub3d9\uc548 \ud53c\uc2f1\uc774 350% \uc99d\uac00\ud588\uc2b5\ub2c8\ub2e4.<\/a>. \ud53c\uc2f1\uc758 \ube44\uc6a9\uc740 \uc774\uc81c \uc804\ud1b5\uc801\uc778 \uc0ac\uc774\ubc84 \uacf5\uaca9 \ube44\uc6a9\uc758 1\/4\ub85c \ucd94\uc815\ub418\uc9c0\ub9cc, \uc218\uc775\uc740 \uacfc\uac70\uc758 \ub450 \ubc30\uc785\ub2c8\ub2e4. \ud53c\uc2f1 \uacf5\uaca9\uc740 \uc911\uac04 \uaddc\ubaa8\uc758 \uae30\uc5c5\uc5d0 \ud3c9\uade0 $1.6\ubc31\ub9cc \ub2ec\ub7ec\uc758 \ube44\uc6a9\uc744 \ucd08\ub798\ud558\uba70, \uc774 \uc0ac\uc774\ubc84 \uc704\ud611\uc740 \uace0\uac1d\uc744 \uc783\uae30 \uc27d\uac8c \ub9cc\ub4ed\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\ud53c\uc2f1 \uacf5\uaca9\uc740 \ub2e4\uc591\ud55c \ud615\ud0dc\ub85c \ub098\ud0c0\ub0a0 \uc218 \uc788\uc73c\uba70, \uc774\uba54\uc77c, \ubb38\uc790 \uba54\uc2dc\uc9c0, \uc18c\uc15c \ubbf8\ub514\uc5b4\uc640 \uac19\uc740 \uc5ec\ub7ec \uac00\uc9c0 \ubc29\ubc95\uc744 \uc0ac\uc6a9\ud558\uc5ec \uc0ac\ub78c\ub4e4\uacfc \uc18c\ud1b5\ud569\ub2c8\ub2e4. \uc5b4\ub5a4 \ucc44\ub110\uc744 \uc0ac\uc6a9\ud558\ub4e0 \uacf5\uaca9\uc790\ub4e4\uc740 \uc885\uc885 \uc720\uba85\ud55c \uc740\ud589, \uc2e0\uc6a9 \uce74\ub4dc \ud68c\uc0ac, \ub610\ub294 \uc804\uc790 \uc0c1\uac70\ub798 \uc0ac\uc774\ud2b8\ub85c \uac00\uc7a5\ud558\uc5ec \uc0ac\uc6a9\uc790\uac00 \ud53c\uc2f1 \uc0ac\uc774\ud2b8\uc5d0 \ub85c\uadf8\uc778\ud558\uace0 \ud6c4\ud68c\ud560 \ud589\ub3d9\uc744 \ud558\ub3c4\ub85d \uc720\ub3c4\ud558\uac70\ub098 \uac15\uc694\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>For example, a user might again get an instant message saying there\u2019s a problem with their bank account and be sent to a web link that looks a lot like the link the bank uses. The user doesn\u2019t think twice about putting his username and password into the fields that the criminal gives him. He makes a note of her information, which he then uses to get into the user\u2019s session.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-should-be-improved-in-antiphising-methods\">\uc548\ud2f0\ud53c\uc2f1 \ubc29\ubc95\uc5d0\uc11c \uac1c\uc120\ub418\uc5b4\uc57c \ud560 \uc810\uc740 \ubb34\uc5c7\uc778\uac00\uc694?<\/h2>\n\n\n<p>\uc774 \uc9c8\ubb38\uc5d0 \ub2f5\ud558\uae30 \uc704\ud574\uc11c\ub294 \ub2e4\uc74c \uadf8\ub9bc\uc5d0 \ub098\ud0c0\ub09c \uc804\ud615\uc801\uc778 \ud53c\uc2f1 \uacfc\uc815\uc744 \uc774\ud574\ud574\uc57c \ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/What-should-be-improved-in-Antiphising-methods-1-1024x466.jpg\" alt=\"\uc548\ud2f0\ud53c\uc2f1 \ubc29\ubc95\uc5d0\uc11c \uac1c\uc120\ub418\uc5b4\uc57c \ud560 \uc810\uc740 \ubb34\uc5c7\uc778\uac00\uc694?\" class=\"wp-image-1519\" width=\"769\" height=\"349\"\/><\/figure>\n\n\n\n<p>\ud604\uc7ac \uc8fc\ub958 \uc548\ud2f0\ud53c\uc2f1 \ubc29\ubc95\uc740 \uba38\uc2e0 \ub7ec\ub2dd \uae30\ubc18\uc758 \ud53c\uc2f1 \uc6f9\uc0ac\uc774\ud2b8 \ud0d0\uc9c0\uc785\ub2c8\ub2e4. \ud1b5\uacc4\uc801 \ud559\uc2b5\uc5d0 \uae30\ubc18\ud55c \uc774 \uc628\ub77c\uc778 \ud0d0\uc9c0 \ubaa8\ub4dc\ub294 \uc8fc\uc694 \uc548\ud2f0\ud53c\uc2f1 \ubc29\ubc95\uc774\uc9c0\ub9cc, \ubcf5\uc7a1\ud55c \uc6f9 \ud658\uacbd\uc5d0\uc11c\uc758 \uac15\uac74\uc131\uacfc \ud6a8\uc728\uc131\uc774 \uac1c\uc120\ub418\uc5b4\uc57c \ud569\ub2c8\ub2e4. \uba38\uc2e0 \ub7ec\ub2dd \uae30\ubc18 \uc548\ud2f0\ud53c\uc2f1 \ubc29\ubc95\uc758 \uc8fc\uc694 \ubb38\uc81c\uc810\uc740 \uc544\ub798\uc5d0 \uc694\uc57d\ub418\uc5b4 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\u2022 \uc548\ud2f0\ud53c\uc2f1 \ubc29\ubc95\uc5d0 \uc758\ud574 \uc810\uc810 \ub354 \ub9ce\uc740 \uae30\ub2a5\uc774 \uc81c\uac70\ub418\uace0 \uc788\uc9c0\ub9cc, \uc774\ub7ec\ud55c \uae30\ub2a5\uc774 \uc65c \uc81c\uac70\ub418\ub294\uc9c0\ub294 \uba85\ud655\ud558\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4. \uae30\uc874 \uae30\ub2a5\uc740 \ubbfc\uac10\ud55c \uc815\ubcf4\ub97c \ud6d4\uce58\uae30 \uc704\ud574 \uc2a4\ud478\ud551\uc744 \uc0ac\uc6a9\ud558\ub294 \ud53c\uc2f1\uc758 \ubcf8\uc9c8\uc744 \uc815\ud655\ud558\uac8c \ubc18\uc601\ud558\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4. \uacb0\uacfc\uc801\uc73c\ub85c \uae30\ub2a5\uc740 \ud2b9\uc815 \ub370\uc774\ud130 \uc138\ud2b8\ub098 \ube0c\ub77c\uc6b0\uc800 \ud50c\ub7ec\uadf8\uc778\uacfc \uac19\uc740 \uc81c\ud55c\uc801\uc774\uace0 \ud2b9\uc815\ud55c \uc2dc\ub098\ub9ac\uc624\uc5d0\uc11c\ub9cc \uc720\ud6a8\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\u2022 \uae30\uc874 \uc54c\uace0\ub9ac\uc998\uc740 \ubaa8\ub4e0 \uc6f9\uc0ac\uc774\ud2b8\ub97c \ub3d9\uc77c\ud558\uac8c \ucde8\uae09\ud558\uc5ec \ud1b5\uacc4 \ubaa8\ub378\uc774 \ube44\ud6a8\uc728\uc801\uc785\ub2c8\ub2e4. \uc989, \ub9ce\uc740 \uc218\uc758 \ubcf5\uc7a1\ud55c \uc6f9 \ud398\uc774\uc9c0\uac00 \uc788\ub294 \uc2e4\uc81c \uc6f9 \ud658\uacbd\uc5d0\uc11c \uc0ac\uc6a9\ud558\uae30\uc5d0 \ubaa8\ub378\uc774 \uc801\ud569\ud558\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\u2022 Most data sets don\u2019t have enough samples, and the diversity of the samples isn\u2019t taken into account. Also, the ratio of positive to negative samples isn\u2019t realistic. In general, models built from these kinds of data sets have a lot of overfitting, and the models\u2019 robustness needs to be improved.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-has-been-the-advance-in-antiphishing-methods\">\uc548\ud2f0\ud53c\uc2f1 \ubc29\ubc95\uc758 \ubc1c\uc804\uc740 \ubb34\uc5c7\uc778\uac00\uc694?<\/h2>\n\n\n<p>\uc9c0\ub09c \uba87 \ub144 \ub3d9\uc548 \uc0ac\ub78c\ub4e4\uc740 \uc2e4\uc81c \uc6f9 \ud658\uacbd\uc5d0\uc11c \uc791\ub3d9\ud558\ub294 \ub300\uaddc\ubaa8, \uc2e0\ub8b0\ud560 \uc218 \uc788\uace0 \ud6a8\uacfc\uc801\uc778 \uc548\ud2f0\ud53c\uc2f1 \ubc29\ubc95\uc744 \uac1c\ubc1c\ud558\ub824\uace0 \ub178\ub825\ud588\uc2b5\ub2c8\ub2e4. \uc774 \ubc29\ubc95\uc740 \ub2e4\uc74c \ud14c\uc2a4\ud2b8\uc5d0 \uc758\ud574 \uac1c\uc120\ub41c \ud1b5\uacc4\uc801 \uba38\uc2e0 \ub7ec\ub2dd \uc54c\uace0\ub9ac\uc998\uc5d0 \uae30\ubc18\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\u2022 Using a detailed analysis of the pattern of phishing attacks to find statistical functions for anti-phishing. The functions \u201ccounterfeit,\u201d \u201caffiliation,\u201d \u201ctheft,\u201d and \u201cassessment\u201d are all extracted by the current models. These are called <a href=\"https:\/\/www.ibm.com\/docs\/SSTTDS_11.0.0\/com.ibm.etools.mft.doc\/ak05600_.html#:~:text=CASE%20is%20a%20complex%20function,the%20path%20of%20subsequent%20processing.\" target=\"_blank\" rel=\"noreferrer noopener\">\u201cCASE\u201d functions<\/a>. \uc774 \ubaa8\ub378\uc740 \ud53c\uc2f1 \uacf5\uaca9\uc5d0\uc11c \uc0ac\ud68c \uacf5\ud559\uc774 \uc5b4\ub5bb\uac8c \uc0ac\uc6a9\ub418\ub294\uc9c0\uc640 \uc6f9\uc5d0\uc11c\uc758 \uad00\ub828\uc131\uacfc \ucf58\ud150\uce20\uc758 \ud488\uc9c8\uc744 \ubcf4\uc5ec\uc90d\ub2c8\ub2e4. CASE \ubaa8\ub378\uc740 \ud53c\uc2f1\uc758 \uc77c\ubd80\uc778 \uc2a4\ud478\ud551\uc744 \uace0\ub824\ud558\uc5ec \uae30\ub2a5\uc744 \uad6c\ubcc4\ud558\uace0 \uc77c\ubc18\ud654\ud560 \uc218 \uc788\ub3c4\ub85d \ud558\uba70, \ud6a8\uacfc\uc801\uc778 \ud53c\uc2f1 \ud0d0\uc9c0\ub97c \uc704\ud55c \uae30\ub2a5 \uc218\uc900\uc758 \uc9c0\uc6d0\uc744 \uc81c\uacf5\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\u2022 Because legitimate and phishing websites don\u2019t have the same amount of traffic, current detection models are based on a multi-stage security system. The idea behind models with multiple stages of detection is to ensure \u201cfast filtering and accurate recognition.\u201d During the quick filter stage, legitimate websites are weeded out. Accurate supervised recognition is then done by learning specific positive and negative samples in a smaller range. This philosophy of detection ensures high performance with a shorter detection time, which is more realistic for the real web.<\/p>\n\n\n\n<p>\u2022 \uc0c8\ub85c\uc6b4 \uc548\ud2f0\ud53c\uc2f1 \ubaa8\ub378\uc740 \uc2e4\uc81c \uc6f9 \ud658\uacbd\uc5d0 \ucd5c\ub300\ud55c \uac00\uae4c\uc6b4 \ub370\uc774\ud130 \uc138\ud2b8\ub97c \uad6c\ucd95\ud558\ub294 \ub370 \uae30\ubc18\uc744 \ub450\uace0 \uc788\uc73c\uba70, \ub2e4\uc591\ud55c \uc5b8\uc5b4, \ucf58\ud150\uce20 \ud488\uc9c8, \ube0c\ub79c\ub4dc\ub97c \ud3ec\ud568\ud569\ub2c8\ub2e4. \ub610\ud55c, \ud53c\uc2f1 \ud0d0\uc9c0\uac00 \ud074\ub798\uc2a4 \ubd88\uade0\ud615 \ubb38\uc81c\uc774\uae30 \ub54c\ubb38\uc5d0 \ub9ce\uc740 \uae0d\uc815\uc801 \ubc0f \ubd80\uc815\uc801 \uc0d8\ud50c\uc774 \ud63c\ud569\ub418\uc5b4 \ub9e4\uc6b0 \ucc3e\uae30 \uc5b4\ub835\ub2e4\uace0 \uc0dd\uac01\ub429\ub2c8\ub2e4. \uc774\ub7ec\ud55c \ubaa8\ub4e0 \uc694\uc18c\ub294 \uc2e4\uc81c \uc6f9 \ud658\uacbd\uc5d0\uc11c \uc798 \uc791\ub3d9\ud558\uace0 \uc0ac\uc6a9\ud560 \uc218 \uc788\ub294 \uc548\ud2f0\ud53c\uc2f1 \ud0d0\uc9c0 \ubaa8\ub378\uc744 \ub9cc\ub4dc\ub294 \uac83\uc744 \uc5b4\ub835\uac8c \ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>Even many Antiphishing models work by comparing URLs, titles, links, login boxes, copyright information, confidential terms, search engine information, and even the logos of the websites\u2019 brands, and it has been shown that they can be used to find phishing websites. In the past few years, more attention has been paid to visual spoofing features and evaluation features. But they haven\u2019t been strong enough to tell if a site is a Phishing site.<\/p>\n\n\n\n<p>\u201c<em><a href=\"https:\/\/docs.apwg.org\/reports\/APWG_Global_Phishing_Report_2015-2016.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">98% \uc774\uc0c1\uc758 \ud53c\uc2f1 \uc6f9\uc0ac\uc774\ud2b8\uac00 \uac00\uc9dc \ub3c4\uba54\uc778 \uc774\ub984\uc744 \uc0ac\uc6a9\ud569\ub2c8\ub2e4.<\/a>,\u201d <\/em>APWG\uc5d0 \ub530\ub974\uba74, \uc548\ud2f0\ud53c\uc2f1 \ubaa8\ub378\uc744 \uc704\ud574 \uc5f0\uad6c\uc790\ub4e4\uc740 URL \ubb38\uc790\uc5f4\uc5d0\uc11c \uc815\ubcf4\ub97c \uc0ac\uc6a9\ud569\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \ub3c4\uba54\uc778 \ub4f1\ub85d \ubc0f \ud574\uc0c1\ub3c4\uc640 \uac19\uc740 \ub3c4\uba54\uc778 \uc774\ub984 \ub4a4\uc758 \uc815\ubcf4\ub97c \uc5bb\ub294 \uac83\ub3c4 \ud53c\uc2f1 \ud0d0\uc9c0\uc5d0 \ub9e4\uc6b0 \uc911\uc694\ud569\ub2c8\ub2e4. \uc774 \uc815\ubcf4\ub294 \uc885\uc885 \ub3c4\uba54\uc778 \uc774\ub984\uc774 \ube0c\ub79c\ub4dc\uc640 \uad00\ub828\ub41c \uc11c\ube44\uc2a4\ub97c \uc81c\uacf5\ud560 \uc218 \uc788\ub294\uc9c0 \uc5ec\ubd80\ub97c \ubcf4\uc5ec\uc904 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ub530\ub77c\uc11c \uc548\ud2f0\ud53c\uc2f1 \uc5f0\uad6c\uc790\ub4e4\uc758 \uc8fc\uc694 \uc784\ubb34\ub294 \ud6a8\uacfc\uc801\uc778 \uae30\ub2a5\uc744 \ucc3e\ub294 \uac83\uc785\ub2c8\ub2e4. \uadf8\ub4e4\uc740 \uc0ac\ud68c \uacf5\ud559 \uacf5\uaca9\uc744 \uc870\uc0ac\ud558\uace0 \ud53c\uc2f1 \uacf5\uaca9\uc758 \ubaa8\ub4e0 \uce21\uba74\ubfd0\ub9cc \uc544\ub2c8\ub77c \uc6f9 \ucf58\ud150\uce20\uc758 \ud488\uc9c8\uacfc \uad00\ub828\uc131\uc744 \ud3ec\uad04\ud558\ub294 \uc644\uc804\ud558\uace0 \uc774\ud574\ud558\uae30 \uc26c\uc6b4 \uae30\ub2a5 \ud504\ub808\uc784\uc6cc\ud06c\ub97c \uc81c\uc548\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p><strong>\ub2e4\ub2e8\uacc4 \ud53c\uc2f1 \ud0d0\uc9c0<\/strong><\/p>\n\n\n\n<p><strong>\ub2e8\uacc4 1<\/strong>: \ud654\uc774\ud2b8\ub9ac\uc2a4\ud2b8 \ud544\ud130\ub9c1 \uc774 \ub2e8\uacc4\uc5d0\uc11c\ub294 \uc6f9\uc0ac\uc774\ud2b8\uc758 \ud53c\uc2f1 \ub3c4\uba54\uc778 \uc774\ub984\uc744 \uae30\ubc18\uc73c\ub85c \uc2e4\uc81c \uc6f9 \ud398\uc774\uc9c0\uc640 \uc758\uc2ec\uc2a4\ub7ec\uc6b4 \uc6f9 \ud398\uc774\uc9c0\ub97c \ubd84\ub9ac\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p><strong>\ub2e8\uacc4 2<\/strong>: \uac00\uc9dc \uccad\uad6c\uc11c\ub97c \ube60\ub974\uac8c \uc81c\uac70\ud558\ub294 \ub2e8\uacc4\uc785\ub2c8\ub2e4. \uc5ec\uae30\uc5d0\ub294 \ud0d0\uc9c0 \ubaa8\ub378\uc744 \uc0ac\uc6a9\ud558\uc5ec \uac00\uc9dc \uc81c\ubaa9 \uae30\ub2a5, \uac00\uc9dc \ud14d\uc2a4\ud2b8 \uae30\ub2a5, \uac00\uc9dc \uc2dc\uac01\uc801 \uae30\ub2a5\uc744 \uc81c\uac70\ud558\ub294 \uac83\uc774 \ud3ec\ud568\ub429\ub2c8\ub2e4. \ub9c8\uc9c0\ub9c9 \ub2e8\uacc4\ub294 \ubcc0\uacbd\ub41c \ubaa8\ub378\uc5d0 \uae30\ubc18\ud55c \ud6c8\ub828 \uae30\ubc18 \ud53c\uc2f1 \ud0d0\uc9c0\uc778 CASE \uae30\ub2a5\uc744 \uc0ac\uc6a9\ud558\uc5ec \uc815\ud655\ud55c \uc778\uc2dd, \ub3c4\ub09c, \uc81c\ud734, \ud3c9\uac00, \ud6c8\ub828 \ubc0f \ubaa8\ub378 \ud0d0\uc9c0\uc758 \uae30\ub2a5\uc744 \ucd94\ucd9c\ud558\uace0 \uacb0\ud569\ud558\ub294 \uac83\uc785\ub2c8\ub2e4.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\">\uacb0\ub860\uc801\uc73c\ub85c<\/h2>\n\n\n<p>\ub2e4\ub2e8\uacc4 \ud0d0\uc9c0\uc5d0 \uae30\ubc18\ud55c \uc774 \ud53c\uc2f1 \ubc29\uc9c0 \uc811\uadfc \ubc29\uc2dd\uc73c\ub85c 2022\ub144\uc5d0\ub294 \uc911\uad6d \ubaa8\ubc14\uc77c\uc5d0\uc11c 883\uac74, \uc911\uad6d \uc740\ud589\uc5d0\uc11c 86\uac74, \ud398\uc774\uc2a4\ubd81\uc5d0\uc11c 19\uac74, \uc560\ud50c\uc5d0\uc11c 13\uac74\uc758 \ud53c\uc2f1 \uacf5\uaca9\uc774 \ubc1c\uc0dd\ud560 \uac83\uc785\ub2c8\ub2e4. \uc774\ub294 CASE \ubaa8\ub378\uc774 \ud53c\uc2f1\uc758 \uc2a4\ud478\ud551 \ubcf8\uc9c8\uc744 \ubc18\uc601\ud558\ub294 \uae30\ub2a5 \uacf5\uac04\uc744 \ud3ec\uad04\ud558\uace0, \uae30\ub2a5\uc744 \uad6c\ubcc4\ud558\uace0 \uc77c\ubc18\ud654\ud560 \uc218 \uc788\ub3c4\ub85d \ud558\uba70, \uae30\ub2a5 \uc218\uc900\uc5d0\uc11c \ud6a8\uacfc\uc801\uc778 \ud53c\uc2f1 \ud0d0\uc9c0 \uc9c0\uc6d0\uc744 \uc81c\uacf5\ud568\uc744 \ubcf4\uc5ec\uc90d\ub2c8\ub2e4.<\/p>","protected":false},"excerpt":{"rendered":"<p>\ud53c\uc2f1\uc740 \uc624\ub298\ub0a0 \uc0ac\uc774\ubc84 \ubc94\uc8c4\uc790\ub4e4\uc774 \uc815\ubcf4\ub97c \ud6d4\uce58\ub294 \uac00\uc7a5 \uc77c\ubc18\uc801\uc778 \ubc29\ubc95\uc774\uba70, \uac1c\uc778 \uc815\ubcf4 \uc720\ucd9c \ubc0f \uae08\uc735 \uc815\ubcf4 \uc720\ucd9c\uc5d0 \ub300\ud55c \uc2e0\uace0\uac00 \uc810\uc810 \ub354 \ub9ce\uc774 \uc811\uc218\ub418\uba74\uc11c \uc774 \uc0ac\uc774\ubc84 \uc704\ud611\uc740 \uc810\uc810 \ub354 \uc2ec\uac01\ud574\uc9c0\uace0 \uc788\uc2b5\ub2c8\ub2e4. <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ko\/%ed%94%bc%ec%8b%b1\/%ed%9a%a8%ec%9c%a8%ec%a0%81%ec%9d%b8-%eb%8b%a4%eb%8b%a8%ea%b3%84-%ed%94%bc%ec%8b%b1-%ec%82%ac%ec%9d%b4%ed%8a%b8-%ed%83%90%ec%a7%80-%eb%aa%a8%eb%8d%b8\/\"><span class=\"screen-reader-text\">\ud6a8\uc728\uc801\uc778 \ub2e4\ub2e8\uacc4 \ud53c\uc2f1 \uc6f9\uc0ac\uc774\ud2b8 \ud0d0\uc9c0 \ubaa8\ub378<\/span> <strong>\uacc4\uc18d \uc77d\uae30<\/strong><\/a><\/p>","protected":false},"author":1,"featured_media":1527,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[],"class_list":["post-1837","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-phishing","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protect Your Data with an Efficient Phishing Detection Model<\/title>\n<meta name=\"description\" content=\"Learn how a phishing detection model can help you prevent phishing attacks. Keep your sensitive data safe from cybercriminals.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ko\/\ud53c\uc2f1\/\ud6a8\uc728\uc801\uc778-\ub2e4\ub2e8\uacc4-\ud53c\uc2f1-\uc0ac\uc774\ud2b8-\ud0d0\uc9c0-\ubaa8\ub378\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect Your Data with an Efficient Phishing Detection Model\" \/>\n<meta property=\"og:description\" content=\"Learn how a phishing detection model can help you prevent phishing attacks. Keep your sensitive data safe from cybercriminals.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ko\/\ud53c\uc2f1\/\ud6a8\uc728\uc801\uc778-\ub2e4\ub2e8\uacc4-\ud53c\uc2f1-\uc0ac\uc774\ud2b8-\ud0d0\uc9c0-\ubaa8\ub378\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-02T00:18:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Efficient-Multistage-Phishing-Website-Detection-Model-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"760\" \/>\n\t<meta property=\"og:image:height\" content=\"388\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\uae00\uc4f4\uc774\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data2\" content=\"6\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Efficient Multistage Phishing Website Detection Model\",\"datePublished\":\"2023-03-02T00:18:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/\"},\"wordCount\":1270,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Efficient-Multistage-Phishing-Website-Detection-Model-1.jpg\",\"articleSection\":[\"Phishing\"],\"inLanguage\":\"ko-KR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/\",\"url\":\"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/\",\"name\":\"Protect Your Data with an Efficient Phishing Detection Model\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Efficient-Multistage-Phishing-Website-Detection-Model-1.jpg\",\"datePublished\":\"2023-03-02T00:18:09+00:00\",\"description\":\"Learn how a phishing detection model can help you prevent phishing attacks. Keep your sensitive data safe from cybercriminals.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Efficient-Multistage-Phishing-Website-Detection-Model-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Efficient-Multistage-Phishing-Website-Detection-Model-1.jpg\",\"width\":760,\"height\":388,\"caption\":\"Efficient Multistage Phishing Website Detection Model\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Efficient Multistage Phishing Website Detection Model\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/ko\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\ud6a8\uc728\uc801\uc778 \ud53c\uc2f1 \ud0d0\uc9c0 \ubaa8\ub378\ub85c \ub370\uc774\ud130\ub97c \ubcf4\ud638\ud558\uc138\uc694.","description":"\ud53c\uc2f1 \ud0d0\uc9c0 \ubaa8\ub378\uc774 \ud53c\uc2f1 \uacf5\uaca9\uc744 \ubc29\uc9c0\ud558\ub294 \ub370 \uc5b4\ub5bb\uac8c \ub3c4\uc6c0\uc774 \ub418\ub294\uc9c0 \uc54c\uc544\ubcf4\uc138\uc694. \uc0ac\uc774\ubc84 \ubc94\uc8c4\uc790\ub85c\ubd80\ud130 \ubbfc\uac10\ud55c \ub370\uc774\ud130\ub97c \uc548\uc804\ud558\uac8c \ubcf4\ud638\ud558\uc138\uc694.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ko\/\ud53c\uc2f1\/\ud6a8\uc728\uc801\uc778-\ub2e4\ub2e8\uacc4-\ud53c\uc2f1-\uc0ac\uc774\ud2b8-\ud0d0\uc9c0-\ubaa8\ub378\/","og_locale":"ko_KR","og_type":"article","og_title":"Protect Your Data with an Efficient Phishing Detection Model","og_description":"Learn how a phishing detection model can help you prevent phishing attacks. Keep your sensitive data safe from cybercriminals.","og_url":"https:\/\/securitybriefing.net\/ko\/\ud53c\uc2f1\/\ud6a8\uc728\uc801\uc778-\ub2e4\ub2e8\uacc4-\ud53c\uc2f1-\uc0ac\uc774\ud2b8-\ud0d0\uc9c0-\ubaa8\ub378\/","og_site_name":"Security Briefing","article_published_time":"2023-03-02T00:18:09+00:00","og_image":[{"width":760,"height":388,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Efficient-Multistage-Phishing-Website-Detection-Model-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"\uae00\uc4f4\uc774":"security","\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"6\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Efficient Multistage Phishing Website Detection Model","datePublished":"2023-03-02T00:18:09+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/"},"wordCount":1270,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Efficient-Multistage-Phishing-Website-Detection-Model-1.jpg","articleSection":["Phishing"],"inLanguage":"ko-KR"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/","url":"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/","name":"\ud6a8\uc728\uc801\uc778 \ud53c\uc2f1 \ud0d0\uc9c0 \ubaa8\ub378\ub85c \ub370\uc774\ud130\ub97c \ubcf4\ud638\ud558\uc138\uc694.","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Efficient-Multistage-Phishing-Website-Detection-Model-1.jpg","datePublished":"2023-03-02T00:18:09+00:00","description":"\ud53c\uc2f1 \ud0d0\uc9c0 \ubaa8\ub378\uc774 \ud53c\uc2f1 \uacf5\uaca9\uc744 \ubc29\uc9c0\ud558\ub294 \ub370 \uc5b4\ub5bb\uac8c \ub3c4\uc6c0\uc774 \ub418\ub294\uc9c0 \uc54c\uc544\ubcf4\uc138\uc694. \uc0ac\uc774\ubc84 \ubc94\uc8c4\uc790\ub85c\ubd80\ud130 \ubbfc\uac10\ud55c \ub370\uc774\ud130\ub97c \uc548\uc804\ud558\uac8c \ubcf4\ud638\ud558\uc138\uc694.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Efficient-Multistage-Phishing-Website-Detection-Model-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Efficient-Multistage-Phishing-Website-Detection-Model-1.jpg","width":760,"height":388,"caption":"Efficient Multistage Phishing Website Detection Model"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/phishing\/efficient-multistage-phishing-website-detection-model\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Efficient Multistage Phishing Website Detection Model"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"\ubcf4\uc548","image":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin\uc740 \uc815\ubd80 \uae30\uc220\uc758 \uc120\uc784 \uc2a4\ud0dc\ud504 \uc791\uac00\uc785\ub2c8\ub2e4. \uc774\uc804\uc5d0\ub294 PYMNTS\uc640 \ubca0\uc774 \uc2a4\ud14c\uc774\ud2b8 \ubc30\ub108\uc5d0 \uae00\uc744 \uc37c\uc73c\uba70 \uce74\ub124\uae30 \uba5c\ub860\uc5d0\uc11c \ubb38\uc608\ucc3d\uc791 \ud559\uc0ac \ud559\uc704\ub97c \ubc1b\uc558\uc2b5\ub2c8\ub2e4. \ud604\uc7ac \ubcf4\uc2a4\ud134 \uc678\uacfd\uc5d0 \uac70\uc8fc\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/ko\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/1837","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/comments?post=1837"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/1837\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media\/1527"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media?parent=1837"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/categories?post=1837"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/tags?post=1837"}],"curies":[{"name":"\uc6cc\ub4dc\ud504\ub808\uc2a4 (wp)","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}