{"id":474,"date":"2022-08-01T12:38:43","date_gmt":"2022-08-01T12:38:43","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=474"},"modified":"2022-08-01T12:38:43","modified_gmt":"2022-08-01T12:38:43","slug":"ddos-%ea%b3%b5%ea%b2%a9%ec%9d%b4-%eb%ac%b4%ec%97%87%ec%9d%b8%ea%b0%80","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ko\/%eb%94%94%eb%8f%84%ec%8a%a4\/ddos-%ea%b3%b5%ea%b2%a9%ec%9d%b4-%eb%ac%b4%ec%97%87%ec%9d%b8%ea%b0%80\/","title":{"rendered":"\ub514\ub3c4\uc2a4 \uacf5\uaca9\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694? \uc804\uccb4 \uac00\uc774\ub4dc"},"content":{"rendered":"<p>\ubd84\uc0b0 \uc11c\ube44\uc2a4 \uac70\ubd80(DDoS) \uacf5\uaca9\uc740 \uc5ec\ub7ec \ucd9c\ucc98\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ud2b8\ub798\ud53d\uc73c\ub85c \uc628\ub77c\uc778 \uc11c\ube44\uc2a4\ub97c \uc555\ub3c4\ud558\uc5ec \uc0ac\uc6a9\ud560 \uc218 \uc5c6\uac8c \ub9cc\ub4e4\ub824\ub294 \uc545\uc758\uc801\uc778 \uc2dc\ub3c4\uc785\ub2c8\ub2e4. \uc774 \uac00\uc774\ub4dc\ub294 DDoS \uacf5\uaca9\uc5d0 \ub300\ud574 \uc54c\uc544\uc57c \ud560 \ubaa8\ub4e0 \uac83\uacfc \ubc29\uc5b4 \ubc29\ubc95\uc744 \uac00\ub974\uccd0 \ub4dc\ub9bd\ub2c8\ub2e4.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-a-ddos-attack\"><strong>DDoS \uacf5\uaca9\uc774\ub780 \ubb34\uc5c7\uc785\ub2c8\uae4c?<\/strong><\/h2>\n\n\n<p>DDoS \uacf5\uaca9\uc740 \uc11c\ubc84\uc5d0 \ud2b8\ub798\ud53d\uc744 \ud3ed\uc8fc\uc2dc\ucf1c \uc5f0\uacb0\ub41c \uc628\ub77c\uc778 \uc11c\ube44\uc2a4 \ubc0f \uc0ac\uc774\ud2b8\uc5d0 \ub300\ud55c \uc811\uadfc\uc744 \ubc29\ud574\ud558\ub294 \ubd88\ubc95\uc801\uc778 \ud574\ud0b9\uc758 \ud55c \ud615\ud0dc\uc785\ub2c8\ub2e4.<\/p>\n\n\n\n<p>There are many reasons why people might want to launch a DDoS attack. Some people might be angry customers or hacktivists who want to bring down a company\u2019s servers just to make a statement. Others might do it for fun or in protest of something.<\/p>\n\n\n\n<p>Although DDoS attacks may be used to steal from a company, they are primarily a financial worry. For example, one firm\u2019s internet activities are disrupted or halted by a rival to steal clients. Another example is extortion, in which attackers target a firm and install hostware or ransomware on their servers before demanding that they pay a huge ransom to undo the damage.<\/p>\n\n\n\n<p>\ubd88\ud589\ud788\ub3c4, \uc778\ud130\ub137\uc774 \uae30\uc5c5\uacfc \uac1c\uc778\uc5d0\uac8c \uc810\uc810 \ub354 \uc911\uc694\ud574\uc9d0\uc5d0 \ub530\ub77c \ucd5c\uadfc \uba87 \ub144 \ub3d9\uc548 DDoS \uacf5\uaca9\uc740 \ub354 \ube48\ubc88\ud558\uace0 \uac15\ub825\ud574\uc84c\uc2b5\ub2c8\ub2e4. IoT \uae30\uae30\uc758 \uc99d\uac00\ub3c4 \uc774\uc5d0 \uae30\uc5ec\ud588\ub294\ub370, \uc774\ub7ec\ud55c \uae30\uae30 \uc911 \ub9ce\uc740 \uc218\uac00 \ud574\ud0b9\ud558\uae30 \uc26c\uc6cc \ubd07\ub137\uc744 \ub9cc\ub4e4\uc5b4 \uacf5\uaca9\uc744 \uc218\ud589\ud560 \uc218 \uc788\uae30 \ub54c\ubb38\uc785\ub2c8\ub2e4.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-does-a-ddos-attack-work\"><strong>DDoS \uacf5\uaca9\uc740 \uc5b4\ub5bb\uac8c \uc791\ub3d9\ud569\ub2c8\uae4c?<\/strong><\/h2>\n\n\n<p>DDoS \uacf5\uaca9\uc740 \ub9ce\uc740 \ud574\ud0b9\ub41c \ucef4\ud4e8\ud130\ub97c \uc0ac\uc6a9\ud558\uc5ec \uc6f9\uc0ac\uc774\ud2b8\ub098 \uc11c\ubc84\uc5d0 \ud2b8\ub798\ud53d\uc744 \ubcf4\ub0b4 \uc0ac\uc774\ud2b8\ub098 \uc11c\ubc84\uc758 \uae30\ub2a5\uc744 \uc5b4\ub835\uac8c \ub9cc\ub4dc\ub294 \uac83\uc785\ub2c8\ub2e4. \uc774\ub294 \ubd07\ub137\uc774\ub77c\ub294 \ubd07\uc758 \uc9d1\ud569\uc744 \uc0ac\uc6a9\ud558\uc5ec \uc6d0\uaca9\uc73c\ub85c \uc774\ub7ec\ud55c \ucef4\ud4e8\ud130\ub97c \uc81c\uc5b4\ud568\uc73c\ub85c\uc368 \uc218\ud589\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>After an established botnet, the attacker may send remote commands to each bot to direct an assault. This can overload the target\u2019s IP address with requests, resulting in a denial-of-service attack on routine traffic.<\/p>\n\n\n\n<p>\uac01 \ubd07\uc774 \uc778\ud130\ub137\uc0c1\uc758 \uc2e4\uc81c \uc7a5\uce58\uc774\uae30 \ub54c\ubb38\uc5d0 \ube44\uc815\uc0c1\uc801\uc778 \ud2b8\ub798\ud53d\uc774 \uc608\uc0c1\ub418\ub294\uc9c0 \uc5ec\ubd80\ub97c \ud310\ub2e8\ud558\uae30 \uc5b4\ub824\uc6b8 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-to-identify-a-ddos-attack\"><strong>DDoS \uacf5\uaca9 \uc2dd\ubcc4 \ubc29\ubc95<\/strong><\/h2>\n\n\n<p>The trickiest thing about a DDoS attack is that you can\u2019t see any warning signs. Usually, prominent hacking collectives will give warnings before they launch an attack, but most attackers will just order an assault without notice.<\/p>\n\n\n\n<p>People may not always tell you if they do not like the content on your website. They might be afraid to say anything. But if something is wrong, they will tell you. They might not tell you at first, but they will later. That\u2019s because people usually don\u2019t check your website as you do. You think everything is okay, but sometimes it is not. You need to be careful because sometimes there are problems that you cannot see at first.<\/p>\n\n\n\n<p>\ubd84\uc0b0 \uc11c\ube44\uc2a4 \uac70\ubd80 \uacf5\uaca9\uc758 \ucd9c\ucc98\ub97c \ucc3e\ub294 \uac83\uc740 \uc5b4\ub824\uc6b8 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uacf5\uaca9\uc740 \uc5ec\ub7ec \uc2dc\uac04 \ub3d9\uc548 \uc9c0\uc18d\ub420 \uc218 \uc788\uc73c\uba70 \uc989\uc2dc \uc911\ub2e8\ud560 \uc218 \uc5c6\uc744 \uc218\ub3c4 \uc788\uc2b5\ub2c8\ub2e4. \uc774\ub294 \uc218 \uc2dc\uac04 \ub3d9\uc548 \uc218\uc775\uacfc \uc11c\ube44\uc2a4\ub97c \uc783\uac8c \ub41c\ub2e4\ub294 \uac83\uc744 \uc758\ubbf8\ud569\ub2c8\ub2e4.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"mitigate-a-ddos-attack\"><strong>DDoS \uacf5\uaca9 \uc644\ud654<\/strong><\/h3>\n\n\n<p>DDoS \uacf5\uaca9\uc73c\ub85c\ubd80\ud130 \uc6f9\uc0ac\uc774\ud2b8\ub97c \ubcf4\ud638\ud558\ub294 \uac00\uc7a5 \uc88b\uc740 \ubc29\ubc95\uc740 \uac00\ub2a5\ud55c \ud55c \ube68\ub9ac \uc774\ub97c \uac10\uc9c0\ud558\ub294 \uac83\uc785\ub2c8\ub2e4. \ub2e4\uc74c\uacfc \uac19\uc740 \uc9d5\ud6c4\uac00 \ub098\ud0c0\ub098\uba74 \ud604\uc7ac DDoS \uacf5\uaca9\uc744 \ubc1b\uace0 \uc788\ub2e4\ub294 \uc758\ubbf8\uc785\ub2c8\ub2e4:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\ub290\ub9b0 \ub85c\ub529\u00a0<\/li>\n<li>\uc11c\ubc84\uac00 503 \uc751\ub2f5<\/li>\n<li>TTL \uc2dc\uac04 \ucd08\uacfc<\/li>\n<li>\uacfc\ub3c4\ud55c \uc2a4\ud338 \ub313\uae00<\/li>\n<li>\ub124\ud2b8\uc6cc\ud06c\uac00 \uac11\uc790\uae30 \ub04a\uae40<\/li>\n<li>\uc774\uc0c1\ud55c \uc2dc\uac04\ub300\uc5d0 \uae09\uc99d\ud558\ub294 \ud2b8\ub798\ud53d\uacfc \uac19\uc740 \uc77c\ubc18\uc801\uc778 \ud328\ud134\uc774 \uc788\uc74c<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-most-common-types-of-ddos-attacks\"><strong>\uac00\uc7a5 \uc77c\ubc18\uc801\uc778 DDoS \uacf5\uaca9 \uc720\ud615<\/strong><\/h2>\n\n\n<p>DDoS \uacf5\uaca9\uc740 \ubc94\uc8c4\uc790\ub4e4\uc774 \ub2e4\uc591\ud55c \ub124\ud2b8\uc6cc\ud06c \uc5f0\uacb0\uc744 \ub300\uc0c1\uc73c\ub85c \uc0ac\uc6a9\ud569\ub2c8\ub2e4. \uc5ec\ub7ec \uc720\ud615\uc758 DDoS \uacf5\uaca9\uc774 \uc5b4\ub5bb\uac8c \uc791\ub3d9\ud558\ub294\uc9c0 \uc774\ud574\ud558\ub824\uba74 \ub124\ud2b8\uc6cc\ud0b9\uc758 \uae30\ubcf8\uc744 \uc774\ud574\ud558\ub294 \uac83\uc774 \ud544\uc218\uc801\uc785\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uc778\ud130\ub137 \uc5f0\uacb0\uc740 \uacc4\uce35\uc774\ub77c\uace0\ub3c4 \ud558\ub294 \uc5ec\ub7ec \uac1c\uc758 \uad6c\ubcc4\ub418\ub294 \ubd80\ubd84\uc73c\ub85c \uad6c\uc131\ub429\ub2c8\ub2e4. \uac01 \uacc4\uce35\uc740 \ud2b9\uc815\ud55c \ubaa9\uc801\uc744 \uac00\uc9c0\uace0 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>OSI \ubaa8\ub378\uc740 \ub124\ud2b8\uc6cc\ud06c\uc758 \ub2e4\uc591\ud55c \ubd80\ubd84\uc774 \uc5b4\ub5bb\uac8c \uc5f0\uacb0\ub418\uc5b4 \uc788\ub294\uc9c0\ub97c \uadf8\ub798\ud53d\uc73c\ub85c \ub098\ud0c0\ub0b4\ub294 \ubc29\ubc95\uc785\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \ud604\uc7ac \uc778\ud130\ub137\uc740 TCP\/IP\ub77c\ub294 \ub354 \uac04\ub2e8\ud55c \uc2dc\uc2a4\ud15c\uc744 \uae30\ubc18\uc73c\ub85c \ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. OSI \ubaa8\ub378\uc740 \uc5ec\uc804\ud788 \uc0ac\uc6a9\ub418\uace0 \uc788\uc73c\uba70, \ub124\ud2b8\uc6cc\ud06c\uac00 \uc5b4\ub5bb\uac8c \uc791\ub3d9\ud558\ub294\uc9c0 \uc774\ud574\ud558\uace0 \uc7a0\uc7ac\uc801\uc778 \ubb38\uc81c\ub97c \ud574\uacb0\ud558\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub429\ub2c8\ub2e4.<\/p>\n\n\n\n<p>DDoS \uacf5\uaca9\uc5d0\ub294 \uc138 \uac00\uc9c0 \uc720\ud615\uc774 \uc788\uc2b5\ub2c8\ub2e4. \uccab \ubc88\uc9f8 \uc720\ud615\uc740 \uc7a5\uce58\uac00 \ud2b8\ub798\ud53d\uc73c\ub85c \uacfc\ubd80\ud558\ub418\ub294 \uacbd\uc6b0\uc785\ub2c8\ub2e4. \ub450 \ubc88\uc9f8 \uc720\ud615\uc740 \ub124\ud2b8\uc6cc\ud06c\uac00 \ud2b8\ub798\ud53d\uc73c\ub85c \uacfc\ubd80\ud558\ub418\ub294 \uacbd\uc6b0\uc785\ub2c8\ub2e4. \uc138 \ubc88\uc9f8 \uc720\ud615\uc740 \uacf5\uaca9\uc790\uac00 \uc5ec\ub7ec \uacf5\uaca9 \ubca1\ud130\ub97c \uc0ac\uc6a9\ud558\uc5ec \ub300\uc0c1\uc744 \uc555\ub3c4\ud558\ub294 \uacbd\uc6b0\uc785\ub2c8\ub2e4.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-481\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/osi-model-layers.png\" alt=\"OSI \ubaa8\ub378 \uacc4\uce35\" width=\"825\" height=\"737\" \/><\/figure>\n\n\n<h3 class=\"wp-block-heading\" id=\"application-layer-attacks\"><strong>\uc560\ud50c\ub9ac\ucf00\uc774\uc158 \uacc4\uce35 \uacf5\uaca9<\/strong><\/h3>\n\n\n<p>The user experience begins when a person first contacts the internet. Application layer DDoS attacks stop software from working so people can\u2019t see any content. Web servers are often targeted in these attacks, but other programs such as SIP voice services and BGP can also be attacked.<\/p>\n\n\n\n<p>TCP\/IP \ud504\ub85c\ud1a0\ucf5c\uc740 \ub124\ud2b8\uc6cc\ud06c\uc0c1\uc758 \uc7a5\uce58 \uac04\uc5d0 \ub370\uc774\ud130\ub97c \uc804\uc1a1\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \uc774 \ud504\ub85c\ud1a0\ucf5c\uc740 DDoS \uacf5\uaca9\uc5d0 \ub9e4\uc6b0 \ucde8\uc57d\ud569\ub2c8\ub2e4. \uc774\ub294 \ub204\uad70\uac00\uac00 \ub3d9\uc2dc\uc5d0 \ub9ce\uc740 \ub370\uc774\ud130\ub97c \ubcf4\ub0b4\uc11c \uc7a5\uce58\ub97c \uacf5\uaca9\ud558\uace0 \uc791\ub3d9\uc744 \uba48\ucd9c \uc218 \uc788\ub2e4\ub294 \uac83\uc744 \uc758\ubbf8\ud569\ub2c8\ub2e4. \uc77c\ubd80 \uc0ac\ub78c\ub4e4\uc740 \uc774\uc5d0 \uc88c\uc808\ud560 \uc218 \uc788\uc9c0\ub9cc, \uc628\ub77c\uc778 \uac70\ub798\uc5d0 \uc548\uc804\ud55c \ud504\ub85c\ud1a0\ucf5c\uc744 \uc0ac\uc6a9\ud558\ub294 \uac83\uc740 \uc5ec\uc804\ud788 \uc911\uc694\ud569\ub2c8\ub2e4. \ud1b5\uc2e0\uc5d0 \uc554\ud638\ud654\ub97c \uc0ac\uc6a9\ud558\uba74 \uc591\uce21 \ubaa8\ub450 \ub3c4\uccad\uacfc \uac00\ub85c\ucc44\uae30\ub97c \ubc29\uc9c0\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ub300\ubd80\ubd84\uc758 DDoS \uacf5\uaca9\uc740 \ucd08\ub2f9 \ud6e8\uc52c \uc801\uc740 \ud328\ud0b7\uc744 \uc0ac\uc6a9\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>This attack would require using the specific protocol of the targeted application, which can involve handshakes and compliance. These kinds of assaults will be driven primarily by IoT gadgets that can\u2019t easily be spoofed.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"example-of-application%25c2%25a0ddos-attacks\"><strong>\uc560\ud50c\ub9ac\ucf00\uc774\uc158 DDoS \uacf5\uaca9\uc758 \uc608<\/strong><\/h3>\n\n\n<p><strong>HTTP \ud50c\ub7ec\ub4dc<\/strong><\/p>\n\n\n\n<p>\uc774\ub294 \uc5ec\ub7ec \ub2e4\ub978 \ucef4\ud4e8\ud130\ub85c\ubd80\ud130 \uc694\uccad\uc744 \uc218\ub77d\ud558\ub294 \uc11c\ubc84\uc785\ub2c8\ub2e4. \uc774 \ubc29\ubc95\uc740 \uc5ec\ub7ec PC\uc5d0\uc11c \ub3d9\uc2dc\uc5d0 \uc6f9 \ud398\uc774\uc9c0\ub97c \uc0c8\ub85c \uace0\uce68\ud558\ub294 \uac83\uacfc \uac19\uc774 \uc11c\ubc84\uc5d0 \ub9ce\uc740 HTTP \uc694\uccad\uc744 \ubcf4\ub0b4 \uacfc\ubd80\ud558\ub97c \uc77c\uc73c\ud0b5\ub2c8\ub2e4. \uacf5\uaca9\uc740 \uac04\ub2e8\ud558\uac70\ub098 \ubcf5\uc7a1\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\ud558\ub098\uc758 URL\uc740 \ub3d9\uc77c\ud55c \ubc94\uc704\uc758 \uacf5\uaca9 IP \uc8fc\uc18c, \ucc38\uc870 \uc0ac\uc774\ud2b8 \ubc0f \uc0ac\uc6a9\uc790 \uc5d0\uc774\uc804\ud2b8\ub97c \uc0ac\uc6a9\ud558\uc5ec \uc561\uc138\uc2a4\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc774\ub294 \uacf5\uaca9\uc790\uac00 \ub300\uc0c1 URL\uc744 \ucc3e\uace0 \uc0ac\uc6a9\ud558\ub294 \uac83\uc744 \ub354 \uc27d\uac8c \ub9cc\ub4ed\ub2c8\ub2e4. \ub354 \ubcf5\uc7a1\ud55c \ubcc0\ud615\uc740 \ub2e4\uc591\ud55c \ucc38\uc870\uc790\uc640 \uc0ac\uc6a9\uc790 \uc5d0\uc774\uc804\ud2b8\ub97c \uc0ac\uc6a9\ud558\uc5ec \ub2e4\uc591\ud55c URL\uc744 \ub300\uc0c1\uc73c\ub85c \ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p><strong>\ud504\ub85c\ud1a0\ucf5c \uacf5\uaca9<\/strong><\/p>\n\n\n\n<p>\ud504\ub85c\ud1a0\ucf5c \ud50c\ub7ec\ub4dc\ub294 \uc11c\ube44\uc2a4\ub098 \ub124\ud2b8\uc6cc\ud06c\uc5d0 \ub9ce\uc740 \ud2b8\ub798\ud53d\uc744 \ubcf4\ub0b4 \uc0ac\uc6a9\ud558\uae30 \uc5b4\ub835\uac8c \ub9cc\ub4dc\ub294 DDoS \uacf5\uaca9\uc785\ub2c8\ub2e4. \uacc4\uce35 3 \ubc0f \uacc4\uce35 4 \ud504\ub85c\ud1a0\ucf5c \uc2a4\ud0dd\uc758 \ucde8\uc57d\uc810\uc744 \uc545\uc6a9\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>DDoS \uacf5\uaca9\uc740 \uc885\uc885 \ubcf4\uc548\uc774 \ub0ae\uace0 \ubcf4\ud638\ub418\uc9c0 \uc54a\uc740 \ub9ce\uc740 \ud504\ub85c\ud1a0\ucf5c\uc744 \ub300\uc0c1\uc73c\ub85c \ud569\ub2c8\ub2e4. DDoS \uacf5\uaca9\uc740 \uc77c\ubc18\uc801\uc73c\ub85c \uc778\ud130\ub137 \ud1b5\uc2e0 \ud45c\uc900\uc744 \ub300\uc0c1\uc73c\ub85c \ud569\ub2c8\ub2e4. \uc774\ub294 \uc774\ub7ec\ud55c \uc2dc\uc2a4\ud15c \uc911 \ub9ce\uc740 \uc218\uac00 \uc804 \uc138\uacc4\uc801\uc73c\ub85c \uc0ac\uc6a9\ub418\uace0 \uc788\uc73c\uba70 \ube60\ub974\uac8c \uc218\uc815\ud558\uae30 \uc5b4\ub835\uae30 \ub54c\ubb38\uc785\ub2c8\ub2e4. \ub610\ud55c, \ub9ce\uc740 \ud504\ub85c\ud1a0\ucf5c\uc774 \ud604\uc7ac\uc758 \ubc84\uadf8\ub97c \ud574\uacb0\ud558\uae30 \uc704\ud574 \uc7ac\uac80\ud1a0\ub41c \ud6c4\uc5d0\ub3c4 \uace0\uc720\ud55c \ubcf5\uc7a1\uc131\uc744 \uac00\uc9c0\uace0 \uc788\uc5b4 \uc0c8\ub85c\uc6b4 \uc720\ud615\uc758 \ud504\ub85c\ud1a0\ucf5c \uacf5\uaca9 \ubc0f \ub124\ud2b8\uc6cc\ud06c \uacf5\uaca9\uc744 \ud5c8\uc6a9\ud558\ub294 \uc0c8\ub85c\uc6b4 \ucde8\uc57d\uc810\uc774 \ubc1c\uc0dd\ud569\ub2c8\ub2e4.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"examples-of-protocol-ddos-attacks\"><strong>\ud504\ub85c\ud1a0\ucf5c DDoS \uacf5\uaca9\uc758 \uc608<\/strong><\/h4>\n\n\n<p><strong>(BGP) \ud558\uc774\uc7ac\ud0b9<\/strong><\/p>\n\n\n\n<p>\ud074\ub77c\uc6b0\ub4dc \uae30\ubc18 \uc11c\ube44\uc2a4\uc5d0\ub294 \ub370\uc774\ud130 \ub3c4\ub451\ub4e4\uc774 \uc6d0\ud558\ub294 \ub9ce\uc740 \uc720\uc6a9\ud55c \uc815\ubcf4\uac00 \ud3ec\ud568\ub418\uc5b4 \uc788\uc2b5\ub2c8\ub2e4. \uc774\ub294 \uc774\ub7ec\ud55c \uc11c\ube44\uc2a4\uc5d0\uc11c \uc720\uc6a9\ud55c \uc815\ubcf4\ub97c \uc5bb\uc744 \uc218 \uc788\uae30 \ub54c\ubb38\uc785\ub2c8\ub2e4. \uc774\ub7ec\ud55c \uc81c\uacf5\uc5c5\uccb4 \uc911 \ud558\ub098\uc5d0\uc11c \ub370\uc774\ud130 \uc720\ucd9c\uc774 \ubc1c\uc0dd\ud558\uba74 \ub9e4\uc6b0 \uc704\ud5d8\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ub204\uad70\uac00\uac00 \ud074\ub77c\uc6b0\ub4dc\ubcf4\ub2e4 \ub192\uc740 \ud504\ub85c\ud1a0\ucf5c\uc744 \uc0ac\uc6a9\ud558\uc5ec \ud68c\uc0ac\uc5d0 DDoS \uacf5\uaca9\uc744 \uc2dc\uc791\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. BGP(\uacbd\uacc4 \uac8c\uc774\ud2b8\uc6e8\uc774 \ud504\ub85c\ud1a0\ucf5c)\ub294 \ub124\ud2b8\uc6cc\ud06c \uc8fc\uc18c \uacf5\uac04\uc5d0 \ub300\ud55c \uc815\ubcf4\ub97c \uc804\ub2ec\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>BGP \uc5c5\ub370\uc774\ud2b8\ub294 \ub124\ud2b8\uc6cc\ud06c \uac04 \uc815\ubcf4\ub97c \uacf5\uc720\ud558\ub294 \ub370 \uc0ac\uc6a9\ub429\ub2c8\ub2e4. \ub204\uad70\uac00\uac00 \uac00\uc9dc \uc5c5\ub370\uc774\ud2b8\ub97c \ubcf4\ub0b4\uba74 \ud2b8\ub798\ud53d\uc774 \ub2e4\ub978 \ub124\ud2b8\uc6cc\ud06c\ub85c \uc774\ub3d9\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc774\ub294 \ub9ac\uc18c\uc2a4\ub97c \uc18c\ubaa8\ud558\uace0 \ud63c\uc7a1\uc744 \ucd08\ub798\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc804 \uc138\uacc4 \uc218\ub9cc \uba85\uc758 \ub124\ud2b8\uc6cc\ud06c \uc6b4\uc601\uc790\uac00 \uc0ac\uc6a9\ud558\uae30 \ub54c\ubb38\uc5d0 BGP\uc758 \ub354 \uc548\uc804\ud55c \ubc84\uc804\uc73c\ub85c \uc5c5\uadf8\ub808\uc774\ub4dc\ud558\ub294 \uac83\uc740 \uc2dc\uac04\uacfc \ube44\uc6a9\uc774 \ub9ce\uc774 \ub4ed\ub2c8\ub2e4.<\/p>\n\n\n\n<p><strong>SYN \ud50c\ub7ec\ub4dc<\/strong><\/p>\n\n\n\n<p>TCP SYN \ud50c\ub7ec\ub4dc\ub294 \uc0c1\uc810 \uc55e\uc5d0\uc11c \uc8fc\ubb38\uc744 \ubc1b\ub294 \uacf5\uae09 \uc791\uc5c5\uc790\uc640 \uac19\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uc6b4\uc804\uc790\ub294 \uc694\uccad\uc744 \ubc1b\uc740 \ud6c4 \ud328\ud0a4\uc9c0\ub97c \ubc1b\uace0 \ud655\uc778\uc744 \uae30\ub2e4\ub9b0 \ud6c4 \uc55e\ucabd\uc73c\ub85c \uc6b4\ubc18\ud569\ub2c8\ub2e4. \uc9c1\uc6d0\uc740 \ud655\uc778 \uc5c6\uc774 \ub9ce\uc740 \ubc30\uc1a1 \uc694\uccad\uc744 \ubc1b\uc544 \ub354 \uc774\uc0c1 \ubc30\uc1a1\uc744 \uc218\ud589\ud560 \uc218 \uc5c6\uac8c \ub429\ub2c8\ub2e4. \uc774\ub294 \uadf8\ub4e4\uc774 \uc555\ub3c4\ub2f9\ud558\uac8c \ub9cc\ub4e4 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uc774 \uacf5\uaca9\uc5d0\uc11c \uacf5\uaca9\uc790\ub294 \ud53c\ud574\uc790\uc5d0\uac8c \ub9ce\uc740 \ud328\ud0b7\uc744 \ubcf4\ub0c5\ub2c8\ub2e4. \ud328\ud0b7\uc5d0\ub294 \uac00\uc9dc \uc8fc\uc18c\uac00 \uc788\uc2b5\ub2c8\ub2e4. \uadf8\ub4e4\uc740 \ub124\ud2b8\uc6cc\ud06c \uc5f0\uacb0\uc744 \uc2dc\uc791\ud558\uae30 \uc704\ud574 \ub450 \ucef4\ud4e8\ud130\uac00 \uc0ac\uc6a9\ud558\ub294 \ud578\ub4dc\uc170\uc774\ud06c\ub97c \uc545\uc6a9\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>An intruder\u2019s goal is to allow as many connection attempts as possible before shutting down its resources.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"volumetric-attacks\"><strong>\ubcfc\ub958\uba54\ud2b8\ub9ad \uacf5\uaca9<\/strong><\/h3>\n\n\n<p>\uc774 \uacf5\uaca9\uc740 \ub300\uc0c1\uacfc \ub098\uba38\uc9c0 \uc138\uacc4 \uc0ac\uc774\uc758 \uc778\ud130\ub137 \ub300\uc5ed\ud3ed\uc744 \ubaa8\ub450 \uc0ac\uc6a9\ud558\ub824\ub294 \uac83\uc785\ub2c8\ub2e4. \ub370\uc774\ud130\ub294 \uc99d\ud3ed \ub610\ub294 \ubd07\ub137\uc758 \uc694\uccad\uacfc \uac19\uc774 \uc5c4\uccad\ub09c \ud2b8\ub798\ud53d\uc744 \uc0dd\uc131\ud558\ub294 \ub2e4\ub978 \ubc29\ubc95 \uc911 \ud558\ub098\ub85c \ub300\uc0c1\uc744 \ud5a5\ud574 \uc804\uc1a1\ub429\ub2c8\ub2e4.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"examples-of-volumetric-attacks\"><strong>\ubcfc\ub958\uba54\ud2b8\ub9ad \uacf5\uaca9\uc758 \uc608<\/strong><\/h4>\n\n\n<p><strong>DNS \uc99d\ud3ed<\/strong><\/p>\n\n\n\n<p>The attacker sends small queries to a DNS server, but the server amplifies the query into a much larger payload that crashes the victim\u2019s servers. This type of attack is known as an amplification DDoS assault.<\/p>\n\n\n\n<p>DNS Amplification is a type of network assault in which the attacker sends messages to a victim\u2019s network using DNS servers. The packets may be amplified, making them more difficult to block.<\/p>\n\n\n\n<p>DNS amplification is an attack where someone tricks a DNS resolver into sending them a lot of information. This happens when they send a fake request to the DNS resolver with an address that is not real. Because so many people do this and there are so many DNS resolvers, the victim\u2019s network can quickly be overwhelmed.<\/p>\n\n\n\n<p><strong>DDoS \uacf5\uaca9 \uc644\ud654<\/strong><\/p>\n\n\n\n<p>When a DDoS attack hits people, they are often confused. Many security systems do not give detailed information about the traffic coming in. The only thing that is certain about a DDoS is that your clients\u2019 online applications have been inaccessible because of a network outage. The issue worsens if an on-premises security device protects the targeted network.<\/p>\n\n\n\n<p>\uc624\ub798\ub41c \uc18c\ud504\ud2b8\uc6e8\uc5b4\ub97c \uc0ac\uc6a9\ud558\ub294 \ucef4\ud4e8\ud130\uac00 \uc788\ub294 \uacbd\uc6b0 \uc548\uc804\ud558\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4. \uc774\ub294 \uc54c\uc9c0 \ubabb\ud558\ub294 \ubcf4\uc548 \uc704\ud5d8\uc774 \uc788\uc744 \uc218 \uc788\uae30 \ub54c\ubb38\uc785\ub2c8\ub2e4. \uc774\ub97c \ud574\uacb0\ud558\ub824\uba74 \ucd5c\uc2e0 \ud328\uce58\uc640 \uc18c\ud504\ud2b8\uc6e8\uc5b4\ub85c \ucef4\ud4e8\ud130\ub97c \uc815\uae30\uc801\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8\ud574\uc57c \ud569\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \uc0c8\ub85c\uc6b4 \ucde8\uc57d\uc810\uc774 \uacc4\uc18d \ubc1c\uacac\ub418\uae30 \ub54c\ubb38\uc5d0 \uc774\ub294 \uc5b4\ub824\uc6b8 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ud574\ucee4\ub294 \uc774\ub7ec\ud55c \ucde8\uc57d\uc810\uc744 \uc0ac\uc6a9\ud558\uc5ec \ucef4\ud4e8\ud130\ub97c \ud574\ud0b9\ud558\uace0 \uc815\ubcf4\ub97c \ud6d4\uce60 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uc77c\ubd80 \uacf5\uaca9\uc790\ub294 DDoS\ub97c \uc0ac\uc6a9\ud558\uc5ec \ubaa9\ud45c\ub97c \ub2ec\uc131\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \uc5ec\ub7ec \uc7a5\uc560\ubb3c\uc774 \uc788\uc2b5\ub2c8\ub2e4. \uc628\ud504\ub808\ubbf8\uc2a4 \ubcf4\uc548 \uc194\ub8e8\uc158\uc740 \uacf5\uaca9\uc774 \ubc1c\uc0dd\ud558\ub294 \uac83\uc744 \ubc29\uc9c0\ud560 \uc218 \uc5c6\uc2b5\ub2c8\ub2e4. \uacf5\uaca9\uc774 \uc628\ud504\ub808\ubbf8\uc2a4 \ud544\ud130\ub9c1 \uc7a5\uce58\uc5d0 \ub3c4\ub2ec\ud558\uae30 \uc804\uc5d0 \ubcfc\ub958\uba54\ud2b8\ub9ad \uacf5\uaca9\uc774 \ub4e4\uc5b4\uc624\ub294 \uc778\ud130\ub137 \ud30c\uc774\ud504\ub97c \ub9c9\uace0 \uc0c1\uc704 ISP\uac00 \ubaa8\ub4e0 \ub4e4\uc5b4\uc624\ub294 \ud2b8\ub798\ud53d\uc744 \ucc28\ub2e8\ud558\uc5ec \ub300\uc0c1 \ub124\ud2b8\uc6cc\ud06c\ub97c \uc778\ud130\ub137\uc5d0\uc11c \ucc28\ub2e8\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.\u00a0<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-to-defend-against-ddos-attacks\">DDoS \uacf5\uaca9 \ubc29\uc5b4 \ubc29\ubc95<\/h2>\n\n\n<p>DDoS \uacf5\uaca9\uc744 \ubc29\uc5b4\ud558\ub294 \ubc29\ubc95\uc740 \uc5ec\ub7ec \uac00\uc9c0\uac00 \uc788\uc2b5\ub2c8\ub2e4. \uac00\uc7a5 \uc911\uc694\ud55c \uac83\uc740 \uacf5\uaca9\uc744 \ubc1b\uae30 \uc804\uc5d0 \uacc4\ud68d\uc744 \uc138\uc6b0\ub294 \uac83\uc785\ub2c8\ub2e4.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"increase-bandwidth\">\ub300\uc5ed\ud3ed \uc99d\uac00<\/h3>\n\n\n<p>\ud638\uc2a4\ud305 \uc778\ud504\ub77c\uac00 \ub9ce\uc740 \ud2b8\ub798\ud53d\uc744 \ucc98\ub9ac\ud560 \uc218 \uc788\ub3c4\ub85d \ud558\ub294 \uac83\uc740 DDoS \uacf5\uaca9\uc73c\ub85c\ubd80\ud130 \uc790\uc2e0\uc744 \ubcf4\ud638\ud558\uae30 \uc704\ud574 \ud560 \uc218 \uc788\ub294 \uac00\uc7a5 \uc911\uc694\ud55c \uc77c \uc911 \ud558\ub098\uc785\ub2c8\ub2e4. \uc774\ub294 \ub204\uad70\uac00\uac00 \uc6f9\uc0ac\uc774\ud2b8\ub97c \ud574\ud0b9\ud560 \ub54c \ubc1c\uc0dd\ud560 \uc218 \uc788\ub294 \uc608\uae30\uce58 \uc54a\uc740 \ud2b8\ub798\ud53d \uae09\uc99d\uc5d0 \ub300\ube44\ud574\uc57c \ud55c\ub2e4\ub294 \uac83\uc744 \uc758\ubbf8\ud569\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \ub300\uc5ed\ud3ed\uc744 \ub298\ub9b0\ub2e4\uace0 \ud574\uc11c \ud56d\uc0c1 DDoS \uacf5\uaca9\uc73c\ub85c\ubd80\ud130 \ubcf4\ud638\ub418\ub294 \uac83\uc740 \uc544\ub2d9\ub2c8\ub2e4.<\/p>\n\n\n\n<p>When you increase your bandwidth, it becomes harder for attackers to break into your website. However, you can improve your website\u2019s security by using a variety of measures.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"set-serverlevel-ddos-mitigation\">\uc11c\ubc84 \uc218\uc900\uc758 DDoS \uc644\ud654 \uc124\uc815<\/h3>\n\n\n<p>Some web hosts have DDoS mitigation software on the server level. This function is not always available, so you should ask your web host if they offer it. If they do, find out if it\u2019s a complimentary service or if there is a charge for it. The availability of this service depends on the provider and hosting plan.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"move-to-cloudbased-hosting\">\ud074\ub77c\uc6b0\ub4dc \uae30\ubc18 \ud638\uc2a4\ud305\uc73c\ub85c \uc774\ub3d9<\/h3>\n\n\n<p>\ud074\ub77c\uc6b0\ub4dc \uae30\ubc18 \ud638\uc2a4\ud305\uc740 \ud074\ub77c\uc6b0\ub4dc \ucef4\ud4e8\ud305\uc744 \uc0ac\uc6a9\ud558\uc5ec \uc11c\ube44\uc2a4\ub97c \uc81c\uacf5\ud558\ub294 \uc6f9 \ud638\uc2a4\ud305 \uc720\ud615\uc785\ub2c8\ub2e4. \ud074\ub77c\uc6b0\ub4dc \uae30\ubc18 \ud638\uc2a4\ud305\uc740 \uc804\ud1b5\uc801\uc778 \uc6f9 \ud638\uc2a4\ud305\ubcf4\ub2e4 \ud655\uc7a5 \uac00\ub2a5\ud558\uace0 \ub354 \uc2e0\ub8b0\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\ud074\ub77c\uc6b0\ub4dc \uae30\ubc18 \ud638\uc2a4\ud305\uc758 \uc774\uc810 \uc911 \ud558\ub098\ub294 DDoS \uacf5\uaca9\uc5d0 \ub354 \uc800\ud56d\ub825\uc774 \uc788\uc744 \uc218 \uc788\ub2e4\ub294 \uac83\uc785\ub2c8\ub2e4. \uc774\ub294 \ud074\ub77c\uc6b0\ub4dc \uc81c\uacf5\uc5c5\uccb4\uac00 DDoS \uacf5\uaca9\uc744 \ud761\uc218\ud558\uace0 \ubc29\uc5b4\ud560 \uc218 \uc788\ub294 \ub9ac\uc18c\uc2a4\ub97c \uac00\uc9c0\uace0 \uc788\uae30 \ub54c\ubb38\uc785\ub2c8\ub2e4.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"rate-limiting\">\uc18d\ub3c4 \uc81c\ud55c<\/h3>\n\n\n<p>\uc11c\ubc84\uac00 \uc77c\uc815 \uc2dc\uac04 \ub0b4\uc5d0 \uc218\ub77d\ud560 \uc694\uccad \uc218\ub97c \uc81c\ud55c\ud558\uba74 \uc11c\ube44\uc2a4 \uac70\ubd80 \uacf5\uaca9\uc744 \ubc29\uc9c0\ud558\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub420 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc18d\ub3c4 \uc81c\ud55c\uc740 \uc6f9 \uc2a4\ud06c\ub798\ud37c\uac00 \uc815\ubcf4\ub97c \ud6d4\uce58\ub294 \uac83\uc744 \ubc29\uc9c0\ud558\uace0 \ubb34\ucc28\ubcc4 \ub85c\uadf8\uc778 \uc2dc\ub3c4\ub97c \uc904\uc774\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub420 \uc218 \uc788\uc9c0\ub9cc, \uc790\uccb4\uc801\uc73c\ub85c \uace0\uae09 DDoS \uacf5\uaca9\uc744 \ucc98\ub9ac\ud558\uae30\uc5d0\ub294 \ucda9\ubd84\ud558\uc9c0 \uc54a\uc744 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"use-a-content-delivery-network-cdn\">\ucf58\ud150\uce20 \uc804\uc1a1 \ub124\ud2b8\uc6cc\ud06c(CDN) \uc0ac\uc6a9<\/h3>\n\n\n<p>CDN\uc740 \uc0ac\uc6a9\uc790\uc758 \uc9c0\ub9ac\uc801 \uc704\uce58\uc5d0 \ub530\ub77c \ucf58\ud150\uce20\ub97c \uc81c\uacf5\ud558\ub294 \uc11c\ubc84 \ub124\ud2b8\uc6cc\ud06c\uc785\ub2c8\ub2e4. CDN\uc740 \uc6f9\uc0ac\uc774\ud2b8\uc758 \uc131\ub2a5\uc744 \ud5a5\uc0c1\uc2dc\ud0a4\uace0 DDoS \uacf5\uaca9\uc73c\ub85c\ubd80\ud130 \ubcf4\ud638\ud558\ub294 \ub370 \uc0ac\uc6a9\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>When you use a CDN, your website\u2019s static content is cached on the CDN\u2019s servers. This content is then delivered to users from the server closest to their location. A CDN can help improve your website\u2019s performance and protect it from DDoS attacks.<\/p>\n\n\n\n<p>You can use multiple CDNs to deliver your website\u2019s static content from different servers worldwide. This makes your website more reliable and powerful. Additionally, using a Multi-CDN solution, you can take advantage of a network of PoPs provided by several CDN vendors.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"blackhole-routing\">\ube14\ub799\ud640 \ub77c\uc6b0\ud305<\/h3>\n\n\n<p>\ube14\ub799\ud640 \ub77c\uc6b0\ud2b8\ub294 \ub124\ud2b8\uc6cc\ud06c \uad00\ub9ac\uc790\uac00 \uac70\uc758 \ubaa8\ub4e0 \ubb38\uc81c\ub97c \ucc98\ub9ac\ud558\ub294 \ub370 \ud6cc\ub96d\ud55c \ubc29\ubc95\uc785\ub2c8\ub2e4. \ubcf5\uc7a1\ud55c \uaddc\uce59 \uc5c6\uc774 \ube14\ub799\ud640 \ud544\ud130\ub9c1\uc774 \uc218\ud589\ub420 \ub54c, \ub110 \ub77c\uc6b0\ud2b8\uac00 \uc0ac\uc6a9\ub418\uc5b4 \uc88b\uc740 \ub124\ud2b8\uc6cc\ud06c \ud2b8\ub798\ud53d\uacfc \ub098\uc05c \ub124\ud2b8\uc6cc\ud06c \ud2b8\ub798\ud53d \ubaa8\ub450\ub97c \uac70\ubd80\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>If a DDoS attack targets a server, the Internet service provider (ISP) may try to stop the attack by redirecting all of the site\u2019s traffic to a black hole. This is not ideal because it gives the attacker what they want: making the network inaccessible.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"use-a-web-application-firewall-waf\">\uc6f9 \uc560\ud50c\ub9ac\ucf00\uc774\uc158 \ubc29\ud654\ubcbd(WAF) \uc0ac\uc6a9<\/h3>\n\n\n<p>WAF\ub294 \uc6f9\uc0ac\uc774\ud2b8\ub97c \uacf5\uaca9\uc73c\ub85c\ubd80\ud130 \ubcf4\ud638\ud558\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub418\ub294 \ubcf4\uc548 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uc720\ud615\uc785\ub2c8\ub2e4. WAF\ub294 \ub4e4\uc5b4\uc624\ub294 \ud2b8\ub798\ud53d\uc744 \uac80\uc0ac\ud558\uace0 \uc545\uc131 \ucf54\ub4dc\uac00 \ud3ec\ud568\ub41c \uc694\uccad\uc744 \ucc28\ub2e8\ud558\uac70\ub098 \ub9ac\ub514\ub809\uc158\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>WAF\ub97c \uc0ac\uc6a9\ud558\uc5ec \uc6f9\uc0ac\uc774\ud2b8\ub97c DDoS \uacf5\uaca9\uc73c\ub85c\ubd80\ud130 \ubcf4\ud638\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uadf8\ub7ec\ub098 WAF\uac00 \uc62c\ubc14\ub974\uac8c \uad6c\uc131\ub418\uc5b4 \uc788\ub294\uc9c0 \ud655\uc778\ud574\uc57c \ud569\ub2c8\ub2e4. \uadf8\ub807\uc9c0 \uc54a\uc73c\uba74 \ud569\ubc95\uc801\uc778 \ud2b8\ub798\ud53d\uc744 \ucc28\ub2e8\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"monitor-your-network-for-unusual-activity\">\ub124\ud2b8\uc6cc\ud06c\uc5d0\uc11c \ube44\uc815\uc0c1\uc801\uc778 \ud65c\ub3d9 \ubaa8\ub2c8\ud130\ub9c1<\/h3>\n\n\n<p>\ub124\ud2b8\uc6cc\ud06c\uc5d0\uc11c \ube44\uc815\uc0c1\uc801\uc778 \ud65c\ub3d9\uc744 \ubaa8\ub2c8\ud130\ub9c1\ud574\uc57c \ud569\ub2c8\ub2e4. \uc5ec\uae30\uc5d0\ub294 \ud2b8\ub798\ud53d\uc758 \uac11\uc791\uc2a4\ub7ec\uc6b4 \uc99d\uac00\uc640 \uc774\uc0c1\ud55c \uc694\uccad\uc744 \ubaa8\ub2c8\ud130\ub9c1\ud558\ub294 \uac83\uc774 \ud3ec\ud568\ub429\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\ube44\uc815\uc0c1\uc801\uc778 \ud65c\ub3d9\uc774 \uac10\uc9c0\ub418\uba74 \uc989\uc2dc \uc870\uc0ac\ud574\uc57c \ud569\ub2c8\ub2e4. \uc774\ub294 \uc6f9\uc0ac\uc774\ud2b8\uac00 \uacf5\uaca9\ubc1b\uace0 \uc788\ub2e4\ub294 \uc2e0\ud638\uc77c \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"in-a-nutshell\"><strong>\uac04\ub2e8\ud788 \ub9d0\ud574\uc11c<\/strong><\/h2>\n\n\n<p>DDoS \uacf5\uaca9\uc740 \uae30\uc5c5\uc5d0 \uce58\uba85\uc801\uc77c \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc774\ub294 \ub2e4\uc6b4\ud0c0\uc784, \uc218\uc775 \uc190\uc2e4 \ubc0f \ud3c9\ud310 \uc190\uc0c1\uc744 \ucd08\ub798\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uadf8\ub7ec\ub098 \uc11c\ubc84 \uc218\uc900\uc758 DDoS \uc644\ud654, \ud074\ub77c\uc6b0\ub4dc \uae30\ubc18 \ud638\uc2a4\ud305, \uc18d\ub3c4 \uc81c\ud55c \ubc0f CDN \uc0ac\uc6a9\uc744 \ud3ec\ud568\ud55c \ub2e4\uc591\ud55c \uc870\uce58\ub97c \ud1b5\ud574 \uc6f9\uc0ac\uc774\ud2b8\ub97c DDoS \uacf5\uaca9\uc73c\ub85c\ubd80\ud130 \ubcf4\ud638\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ub610\ud55c \ub124\ud2b8\uc6cc\ud06c\uc5d0\uc11c \ube44\uc815\uc0c1\uc801\uc778 \ud65c\ub3d9\uc744 \ubaa8\ub2c8\ud130\ub9c1\ud558\uace0 \uc758\uc2ec\uc2a4\ub7ec\uc6b4 \ud65c\ub3d9\uc744 \uc989\uc2dc \uc870\uc0ac\ud574\uc57c \ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uc774\ub7ec\ud55c \uc870\uce58\ub97c \ud1b5\ud574 DDoS \uacf5\uaca9\uc5d0\ub3c4 \ubd88\uad6c\ud558\uace0 \uc6f9\uc0ac\uc774\ud2b8\uac00 \uc0ac\uc6a9\uc790\uc5d0\uac8c \uc81c\uacf5\ub418\uace0 \uc811\uadfc \uac00\ub2a5\ud558\ub3c4\ub85d \ubcf4\uc7a5\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ddos-attack-faqs\">DDoS \uacf5\uaca9 FAQ<\/h2>\n\n\n<div class=\"schema-faq wp-block-yoast-faq-block\">\n<div id=\"faq-question-1659357825601\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">DDoS \uacf5\uaca9\uc744 \ub9cc\ub4e4\uae30 \uc26c\uc6b4\uac00\uc694?<\/strong>\n<p class=\"schema-faq-answer\">DDoS \uacf5\uaca9\uc740 \ubcf5\uc7a1\ud560 \uc218 \uc788\uc73c\uba70 \uc77c\uc815 \uc218\uc900\uc758 \uae30\uc220 \uc804\ubb38 \uc9c0\uc2dd\uc774 \ud544\uc694\ud569\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \uc774\uc81c DDoS \ub300\uc5ec \uc11c\ube44\uc2a4\ub85c \uc778\ud574 \ub204\uad6c\ub098 \uc27d\uac8c \uacf5\uaca9\uc744 \uc2dc\uc791\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<\/div>\n<div id=\"faq-question-1659357852139\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">DDoS \uacf5\uaca9\uc758 \ubaa9\ud45c\ub294 \ubb34\uc5c7\uc785\ub2c8\uae4c?<\/strong>\n<p class=\"schema-faq-answer\">DDoS \uacf5\uaca9\uc758 \ubaa9\ud45c\ub294 \uc6f9\uc0ac\uc774\ud2b8\ub098 \ub124\ud2b8\uc6cc\ud06c\ub97c \uc0ac\uc6a9\ud560 \uc218 \uc5c6\uac8c \ub9cc\ub4dc\ub294 \uac83\uc785\ub2c8\ub2e4. \uacf5\uaca9\uc790\ub294 \ud2b8\ub798\ud53d\uc774\ub098 \uc694\uccad\uc73c\ub85c \ub300\uc0c1\uc744 \uc555\ub3c4\ud558\uc5ec \uc774\ub97c \uc218\ud589\ud569\ub2c8\ub2e4.<\/p>\n<\/div>\n<div id=\"faq-question-1659357876258\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">DDoS \uacf5\uaca9\uc740 \uc5bc\ub9c8\ub098 \uc624\ub798 \uc9c0\uc18d\ub429\ub2c8\uae4c?<\/strong>\n<p class=\"schema-faq-answer\">DDoS attacks can last for hours or even days. The duration of the attack depends on the attacker\u2019s goals and the available resources.<\/p>\n<\/div>\n<div id=\"faq-question-1659357899750\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">DDoS\uac00 \uc815\ubcf4\ub97c \ud6d4\uce60 \uc218 \uc788\uc2b5\ub2c8\uae4c?<\/strong>\n<p class=\"schema-faq-answer\">DDoS \uacf5\uaca9\uc740 \uc815\ubcf4\ub97c \ud6d4\uce60 \uc218 \uc5c6\uc2b5\ub2c8\ub2e4. \uadf8\ub7ec\ub098 DDoS \uacf5\uaca9\uc740 \ub370\uc774\ud130 \uc720\ucd9c\uacfc \uac19\uc740 \ub2e4\ub978 \uc720\ud615\uc758 \uacf5\uaca9\uc774 \uc218\ud589\ub418\ub294 \ub3d9\uc548 IT \uc9c1\uc6d0\uc758 \uc8fc\uc758\ub97c \ubd84\uc0b0\uc2dc\ud0a4\ub294 \ub370 \uc0ac\uc6a9\ub420 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<\/div>\n<div id=\"faq-question-1659357945762\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">VPN\uc774 DDoS\ub85c\ubd80\ud130 \ubcf4\ud638\ud569\ub2c8\uae4c?<\/strong>\n<p class=\"schema-faq-answer\">A VPN can help to protect your devices from DDoS attacks by hiding your IP addresses so the attackers can\u2019t locate your network. However, it will not stop the attack entirely.<\/p>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>\ubd84\uc0b0 \uc11c\ube44\uc2a4 \uac70\ubd80(DDoS) \uacf5\uaca9\uc740 \uc5ec\ub7ec \uc18c\uc2a4\uc758 \ud2b8\ub798\ud53d\uc73c\ub85c \uc628\ub77c\uc778 \uc11c\ube44\uc2a4\ub97c \uc555\ub3c4\ud558\uc5ec \uc628\ub77c\uc778 \uc11c\ube44\uc2a4\ub97c \uc0ac\uc6a9\ud560 \uc218 \uc5c6\uac8c \ub9cc\ub4dc\ub294 \uc545\uc758\uc801\uc778 \uc2dc\ub3c4\uc785\ub2c8\ub2e4. \uc774 \uac00\uc774\ub4dc\ub294 \ub2e4\uc74c\uacfc \uac19\uc774 \uc124\uba85\ud569\ub2c8\ub2e4. <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ko\/%eb%94%94%eb%8f%84%ec%8a%a4\/ddos-%ea%b3%b5%ea%b2%a9%ec%9d%b4-%eb%ac%b4%ec%97%87%ec%9d%b8%ea%b0%80\/\"><span class=\"screen-reader-text\">\ub514\ub3c4\uc2a4 \uacf5\uaca9\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694? \uc804\uccb4 \uac00\uc774\ub4dc<\/span> <strong>\uacc4\uc18d \uc77d\uae30<\/strong><\/a><\/p>","protected":false},"author":1,"featured_media":477,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18],"tags":[],"class_list":["post-474","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ddos","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is a DDoS Attack? A Complete Guide | securitybriefing.net<\/title>\n<meta name=\"description\" content=\"DDoS attacks are on the rise. Learn what they are, how they work, and how you can protect your organization from them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ko\/\ub514\ub3c4\uc2a4\/ddos-\uacf5\uaca9\uc774-\ubb34\uc5c7\uc778\uac00\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a DDoS Attack? A Complete Guide | securitybriefing.net\" \/>\n<meta property=\"og:description\" content=\"DDoS attacks are on the rise. Learn what they are, how they work, and how you can protect your organization from them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ko\/\ub514\ub3c4\uc2a4\/ddos-\uacf5\uaca9\uc774-\ubb34\uc5c7\uc778\uac00\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-01T12:38:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"453\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\uae00\uc4f4\uc774\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data2\" content=\"13\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"What is a DDoS Attack? The Complete Guide\",\"datePublished\":\"2022-08-01T12:38:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/\"},\"wordCount\":2607,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg\",\"articleSection\":[\"ddos\"],\"inLanguage\":\"ko-KR\"},{\"@type\":[\"WebPage\",\"FAQPage\"],\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/\",\"url\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/\",\"name\":\"What is a DDoS Attack? A Complete Guide | securitybriefing.net\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg\",\"datePublished\":\"2022-08-01T12:38:43+00:00\",\"description\":\"DDoS attacks are on the rise. Learn what they are, how they work, and how you can protect your organization from them.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#breadcrumb\"},\"mainEntity\":[{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357825601\"},{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357852139\"},{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357876258\"},{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357899750\"},{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357945762\"}],\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg\",\"width\":850,\"height\":453,\"caption\":\"What is a DDoS Attack? The Complete Guide to Understanding and Defending Against Distributed Denial of Service Attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a DDoS Attack? The Complete Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/ko\/author\/security\/\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357825601\",\"position\":1,\"url\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357825601\",\"name\":\"Is it easy to make a DDoS attack?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"DDoS attacks can be complex and require a certain level of technical expertise. However, DDoS-for-hire services now make it easy for anyone to launch an attack.\",\"inLanguage\":\"ko-KR\"},\"inLanguage\":\"ko-KR\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357852139\",\"position\":2,\"url\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357852139\",\"name\":\"What is the goal of a DDoS attack?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"A DDoS attack aims to make a website or network unavailable. The attacker does this by overwhelming the target with traffic or requests.\",\"inLanguage\":\"ko-KR\"},\"inLanguage\":\"ko-KR\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357876258\",\"position\":3,\"url\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357876258\",\"name\":\"How long do DDoS attacks last?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"DDoS attacks can last for hours or even days. The duration of the attack depends on the attacker's goals and the available resources.\",\"inLanguage\":\"ko-KR\"},\"inLanguage\":\"ko-KR\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357899750\",\"position\":4,\"url\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357899750\",\"name\":\"Can DDoS steal information?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"DDoS attacks cannot steal information. However, DDoS attacks can be used to distract the attention of IT staff while another type of attack, such as a data breach, is carried out.\",\"inLanguage\":\"ko-KR\"},\"inLanguage\":\"ko-KR\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357945762\",\"position\":5,\"url\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357945762\",\"name\":\"Does VPN protect from DDoS?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"A VPN can help to protect your devices from DDoS attacks by hiding your IP addresses so the attackers can't locate your network. However, it will not stop the attack entirely.\",\"inLanguage\":\"ko-KR\"},\"inLanguage\":\"ko-KR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DDoS \uacf5\uaca9\uc774\ub780 \ubb34\uc5c7\uc778\uac00? \uc644\ubcbd \uac00\uc774\ub4dc | securitybriefing.net","description":"DDoS \uacf5\uaca9\uc774 \uc99d\uac00\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uadf8\uac83\ub4e4\uc774 \ubb34\uc5c7\uc778\uc9c0, \uc5b4\ub5bb\uac8c \uc791\ub3d9\ud558\ub294\uc9c0, \uadf8\ub9ac\uace0 \uc870\uc9c1\uc744 \uc5b4\ub5bb\uac8c \ubcf4\ud638\ud560 \uc218 \uc788\ub294\uc9c0 \uc54c\uc544\ubcf4\uc138\uc694.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ko\/\ub514\ub3c4\uc2a4\/ddos-\uacf5\uaca9\uc774-\ubb34\uc5c7\uc778\uac00\/","og_locale":"ko_KR","og_type":"article","og_title":"What is a DDoS Attack? A Complete Guide | securitybriefing.net","og_description":"DDoS attacks are on the rise. Learn what they are, how they work, and how you can protect your organization from them.","og_url":"https:\/\/securitybriefing.net\/ko\/\ub514\ub3c4\uc2a4\/ddos-\uacf5\uaca9\uc774-\ubb34\uc5c7\uc778\uac00\/","og_site_name":"Security Briefing","article_published_time":"2022-08-01T12:38:43+00:00","og_image":[{"width":850,"height":453,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"\uae00\uc4f4\uc774":"security","\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"13\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"What is a DDoS Attack? The Complete Guide","datePublished":"2022-08-01T12:38:43+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/"},"wordCount":2607,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg","articleSection":["ddos"],"inLanguage":"ko-KR"},{"@type":["WebPage","FAQPage"],"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/","url":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/","name":"DDoS \uacf5\uaca9\uc774\ub780 \ubb34\uc5c7\uc778\uac00? \uc644\ubcbd \uac00\uc774\ub4dc | securitybriefing.net","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg","datePublished":"2022-08-01T12:38:43+00:00","description":"DDoS \uacf5\uaca9\uc774 \uc99d\uac00\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uadf8\uac83\ub4e4\uc774 \ubb34\uc5c7\uc778\uc9c0, \uc5b4\ub5bb\uac8c \uc791\ub3d9\ud558\ub294\uc9c0, \uadf8\ub9ac\uace0 \uc870\uc9c1\uc744 \uc5b4\ub5bb\uac8c \ubcf4\ud638\ud560 \uc218 \uc788\ub294\uc9c0 \uc54c\uc544\ubcf4\uc138\uc694.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#breadcrumb"},"mainEntity":[{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357825601"},{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357852139"},{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357876258"},{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357899750"},{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357945762"}],"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg","width":850,"height":453,"caption":"What is a DDoS Attack? The Complete Guide to Understanding and Defending Against Distributed Denial of Service Attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"What is a DDoS Attack? The Complete Guide"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"\ubcf4\uc548","image":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin\uc740 \uc815\ubd80 \uae30\uc220\uc758 \uc120\uc784 \uc2a4\ud0dc\ud504 \uc791\uac00\uc785\ub2c8\ub2e4. \uc774\uc804\uc5d0\ub294 PYMNTS\uc640 \ubca0\uc774 \uc2a4\ud14c\uc774\ud2b8 \ubc30\ub108\uc5d0 \uae00\uc744 \uc37c\uc73c\uba70 \uce74\ub124\uae30 \uba5c\ub860\uc5d0\uc11c \ubb38\uc608\ucc3d\uc791 \ud559\uc0ac \ud559\uc704\ub97c \ubc1b\uc558\uc2b5\ub2c8\ub2e4. \ud604\uc7ac \ubcf4\uc2a4\ud134 \uc678\uacfd\uc5d0 \uac70\uc8fc\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/ko\/author\/security\/"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357825601","position":1,"url":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357825601","name":"DDoS \uacf5\uaca9\uc744 \ub9cc\ub4e4\uae30 \uc26c\uc6b4\uac00\uc694?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"DDoS attacks can be complex and require a certain level of technical expertise. However, DDoS-for-hire services now make it easy for anyone to launch an attack.","inLanguage":"ko-KR"},"inLanguage":"ko-KR"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357852139","position":2,"url":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357852139","name":"DDoS \uacf5\uaca9\uc758 \ubaa9\ud45c\ub294 \ubb34\uc5c7\uc785\ub2c8\uae4c?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A DDoS attack aims to make a website or network unavailable. The attacker does this by overwhelming the target with traffic or requests.","inLanguage":"ko-KR"},"inLanguage":"ko-KR"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357876258","position":3,"url":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357876258","name":"DDoS \uacf5\uaca9\uc740 \uc5bc\ub9c8\ub098 \uc624\ub798 \uc9c0\uc18d\ub429\ub2c8\uae4c?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"DDoS attacks can last for hours or even days. The duration of the attack depends on the attacker's goals and the available resources.","inLanguage":"ko-KR"},"inLanguage":"ko-KR"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357899750","position":4,"url":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357899750","name":"DDoS\uac00 \uc815\ubcf4\ub97c \ud6d4\uce60 \uc218 \uc788\uc2b5\ub2c8\uae4c?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"DDoS attacks cannot steal information. However, DDoS attacks can be used to distract the attention of IT staff while another type of attack, such as a data breach, is carried out.","inLanguage":"ko-KR"},"inLanguage":"ko-KR"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357945762","position":5,"url":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357945762","name":"VPN\uc774 DDoS\ub85c\ubd80\ud130 \ubcf4\ud638\ud569\ub2c8\uae4c?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A VPN can help to protect your devices from DDoS attacks by hiding your IP addresses so the attackers can't locate your network. However, it will not stop the attack entirely.","inLanguage":"ko-KR"},"inLanguage":"ko-KR"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/474","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/comments?post=474"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/474\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media\/477"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media?parent=474"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/categories?post=474"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/tags?post=474"}],"curies":[{"name":"\uc6cc\ub4dc\ud504\ub808\uc2a4 (wp)","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}