DNS DDoS ๋ฐฉ์–ด

DDoS ๊ณต๊ฒฉ ๊ฒฝ๊ฐ ๋ฐ ๋ฐฉ์–ด

Provided by our Emergency Response Team.

๋น„์ƒ ๋Œ€์‘ํŒ€์ด ํ•˜๋Š” ์ผ

๋ผ๋“œ์›จ์–ด ๋น„์ƒ ๋Œ€์‘ํŒ€(ERT)์€ ๊ด‘๋ฒ”์œ„ํ•œ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ฐ ๋„คํŠธ์›Œํฌ ๊ณ„์ธต DDoS ๊ณต๊ฒฉ์— ์ง๋ฉดํ•œ ๊ณ ๊ฐ์—๊ฒŒ 24x7 ์—ฐ์ค‘๋ฌดํœด ์ง€์› ๋ฐ ๊ฒฝ๊ฐ ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜๋Š” ๋ณด์•ˆ ์ „๋ฌธ๊ฐ€ ์ง‘๋‹จ์ž…๋‹ˆ๋‹ค. ERT๋Š” ์„œ๋น„์Šค ๊ฑฐ๋ถ€(DoS) ๋ฐ ๋ถ„์‚ฐ ์„œ๋น„์Šค ๊ฑฐ๋ถ€(DDoS) ๊ณต๊ฒฉ, ๋งฌ์›จ์–ด ๋ฐœ์ƒ์— ์ง๋ฉดํ•œ ์กฐ์ง์— ์ฆ‰๊ฐ์ ์ธ ์ง€์›๊ณผ ์ „๋ฌธ ๊ฒฝ๊ฐ ๊ธฐ์ˆ ์„ ์ œ๊ณตํ•˜๋Š” ์ˆ™๋ จ๋œ ๋ณด์•ˆ ์—”์ง€๋‹ˆ์–ด๋ฅผ ๋ณด์œ ํ•ฉ๋‹ˆ๋‹ค. ERT๋Š” ๋ณด์•ˆ ์ „๋ฌธ ์ง€์‹๊ณผ ์‹ค์‹œ๊ฐ„ ์œ„ํ˜‘ ์ธํ…”๋ฆฌ์ „์Šค ์„œ๋น„์Šค๋ฅผ ๋ชจ๋‘ ํ™œ์šฉํ•˜์—ฌ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฒฉ์— ๋Œ€์ฒ˜ํ•˜๋Š” ์กฐ์ง์˜ ์—ญ๋Ÿ‰์„ ๋ณด์™„ํ•ฉ๋‹ˆ๋‹ค.

The team engages in mitigating a broad array of security events, including malware outbreaks, application exploits, DDoS attacks and DoS attacks. Radware’s ERT security analysts and engineers combat common and emerging attacks on a daily basis, providing customers with industry-leading expertise, best practices and a deep knowledge of threats, attack tools, intelligence and mitigation technologies. The ERT provides the required expertise and service during prolonged, complex attacks and helps to quickly restore the operation by mitigating DDoS attacks fast.

"๋งŽ์€ ์‚ฌ์—…์ฒด๊ฐ€ DDoS ์œ„ํ˜‘์„ ์‹ ์†ํ•˜๊ฒŒ ํŒŒ์•…ํ•˜๊ณ  ์ด๋ฅผ ๊ฒฝ๊ฐํ•˜๋Š” ๋ฐ ํ•„์š”ํ•œ ์—ญ๋Ÿ‰, ์‹œ๊ฐ„, ๊ฒฝํ—˜์ด ๋ถ€์กฑํ•œ ์ƒํ™ฉ์— ๋Œ€์‘ํ•ด, ERT๋Š” ๊ณ ๊ฐ ๊ฒฝํ—˜์„ ํฌ๊ฒŒ ํ–ฅ์ƒ์‹œํ‚ต๋‹ˆ๋‹ค."

Frost & Sullivan

๋ผ๋“œ์›จ์–ด ERT๊ฐ€ ์ œ๊ณตํ•˜๋Š” ์„œ๋น„์Šค

๊ฐ€์žฅ ๋น ๋ฅธ DDoS ๊ณต๊ฒฉ ๊ฒฝ๊ฐ

๊ฐ€์žฅ ๋น ๋ฅธ DDoS ๊ณต๊ฒฉ ๊ฒฝ๊ฐ

๊ฐ€์žฅ ๋น ๋ฅด๊ฒŒ ๊ฐ์ง€, ๋Œ€์‘, ํ•ด๊ฒฐํ•ฉ๋‹ˆ๋‹ค. ๋ผ๋“œ์›จ์–ด์˜ ERT๋Š” DDoS ๊ณต๊ฒฉ์„ ๋ฐ›๋Š” ์กฐ์ง์ด ๋ณด์•ˆ ์ „๋ฌธ๊ฐ€์—๊ฒŒ ์ฆ‰์‹œ ์•ก์„ธ์Šคํ•  ์ˆ˜ ์žˆ๋„๋ก 10๋ถ„ SLA๋ฅผ ์œ ์ง€ํ•ฉ๋‹ˆ๋‹ค.

์™„์ „ ๊ด€๋ฆฌํ˜• ์„œ๋น„์Šค

์™„์ „ ๊ด€๋ฆฌํ˜• ์„œ๋น„์Šค

์ˆ™๋ จ๋œ ์ „๋ฌธ๊ฐ€๊ฐ€ ๋„คํŠธ์›Œํฌ ๋ฐ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ณด์•ˆ์„ ์œ„ํ•ด ์„ค์น˜, ํŠœ๋‹, ๊ด€๋ฆฌ, ์ปจ์„คํŒ… ๋ฐ ์ฆ‰๊ฐ์ ์ธ ๊ณต๊ฒฉ ๊ฒฝ๊ฐ ๋‹ด๋‹น

์„ ์ œ์  ์œ„ํ˜‘ ์ธํ…”๋ฆฌ์ „์Šค

์„ ์ œ์  ์œ„ํ˜‘ ์ธํ…”๋ฆฌ์ „์Šค

์˜์‹ฌ์Šค๋Ÿฌ์šด ํ™œ์„ฑ IP์— ๋Œ€ํ•ด ์ฆ‰๊ฐ์ ์ธ ๋ฐฉ์ง€๋ฅผ ์ง€์›ํ•˜๋Š” ์‹คํ–‰ ๊ฐ€๋Šฅํ•œ ์‹ค์‹œ๊ฐ„ ๋ฐ์ดํ„ฐ. ๋ผ๋“œ์›จ์–ด์˜ ์œ„ํ˜‘ ์—ฐ๊ตฌ ์„ผํ„ฐ์˜ ๊ฒฝ๋ณด, ์ž๋ฌธ. ๊ณต๊ฒฉ ๋ณด๊ณ ์„œ๋ฅผ ์ด์šฉํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

๋ณด์•ˆ ์—…๋ฐ์ดํŠธ ์„œ๋น„์Šค

๋ณด์•ˆ ์—…๋ฐ์ดํŠธ ์„œ๋น„์Šค

๊ฐ€์žฅ ์ตœ๊ทผ์— ์•Œ๋ ค์ง„ ๊ณต๊ฒฉ ๋„๊ตฌ ๋ฐ ์ทจ์•ฝ์„ฑ์— ๋Œ€ํ•œ ์ง€์†์ ์ธ ๋ณดํ˜ธ - ์ง€์†์ ์ธ ์„œ๋ช… ํŒŒ์ผ, ์˜ํ–ฅ๋ ฅ์ด ํฐ ๋ณด์•ˆ ์ด๋ฒคํŠธ์— ๋Œ€ํ•œ ์‹ ์† ๋Œ€์‘, ๋งž์ถคํ˜• ํ•„ํ„ฐ ๊ฐœ๋ฐœ๊ณผ ๋ฐฐํฌ

๊ธฐ์ˆ  ๊ณ„์ • ๊ด€๋ฆฌ

๊ธฐ์ˆ  ๊ณ„์ • ๊ด€๋ฆฌ

๊ตฌ์„ฑ, ํ†ตํ•ฉ, ์—…๊ทธ๋ ˆ์ด๋“œ, DDoS ๊ณต๊ฒฉ ๊ฒฝ๊ฐ์„ ์œ„ํ•œ ์„œ๋น„์Šค ์ƒ๋‹ด์— ์ „๋…ํ•˜๋Š” ์‚ฌ์ „๋Œ€์ฒ˜์ ์ธ ์‚ฌ์ด๋ฒ„ ์ปจ์„คํ„ดํŠธ

Radware’s Attack
Mitigation Service

๋ผ๋“œ์›จ์–ด๋Š” 24x7 ์—ฐ์ค‘๋ฌดํœด ์ง€์›์„ ํ†ตํ•ด ์˜จํ”„๋ ˆ๋ฏธ์Šค ํƒ์ง€ ๋ฐ DDoS ๊ณต๊ฒฉ ๊ฒฝ๊ฐ์„ ํ†ตํ•ฉํ•ฉ๋‹ˆ๋‹ค. ์ด ํ•˜์ด๋ธŒ๋ฆฌ๋“œ DDoS ๊ฒฝ๊ฐ ์„œ๋น„์Šค๋Š” ์›น ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ณด์•ˆ ๋ฐ SSL ๊ธฐ๋ฐ˜ ๊ณต๊ฒฉ ๊ฒฝ๊ฐ์„ ํฌํ•จํ•˜๋„๋ก ํ™•์žฅํ•  ์ˆ˜ ์žˆ์œผ๋ฏ€๋กœ ๋‹ค์ค‘ ๋ฒกํ„ฐ ๋„คํŠธ์›Œํฌ ๋ฐ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๊ณต๊ฒฉ์— ๋Œ€ํ•œ ๊ฐ•๋ ฅํ•œ ์ข…๋‹จ๊ฐ„ ๋ณดํ˜ธ ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜๋Š” ํ•œํŽธ ์ „์šฉ DDoS ๊ณต๊ฒฉ ๊ฒฝ๊ฐ ๋ฐ ๊ธฐํƒ€ ์ง€์  ์†”๋ฃจ์…˜์— ๋ฆฌ์†Œ์Šค๋ฅผ ํ• ๋‹นํ•  ํ•„์š”๊ฐ€ ์—†์–ด ์ด์†Œ์œ ๋น„์šฉ์„ ์ ˆ๊ฐํ•ฉ๋‹ˆ๋‹ค.

๋น„์ƒ ๋Œ€์‘ํŒ€์€ ์–ด๋–ค ๋” ์ข‹์€ ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•ฉ๋‹ˆ๊นŒ?

๋‹ค๋ฅธ ๊ณต๊ธ‰์—…์ฒด์˜ '๋น„์ƒ ๋Œ€์‘' DDoS ๊ณต๊ฒฉ ๊ฒฝ๊ฐ ์„œ๋น„์Šค๋Š” ์ •๋ณด ์ˆ˜์ง‘ ๋ฐ ์ž ์žฌ์  ํ•ด๊ฒฐ์„ ์œ„ํ•ด ์…€ํ”„์„œ๋น„์Šค ์ง€์‹ ํฌํ„ธ๋กœ ์ง์ ‘ ์ด๋™ํ•˜๋Š” ๊ธฐ๋Šฅ๋งŒ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ๋Šฅ๋™์  DDoS ์œ„ํ˜‘์ด๋‚˜ ๊ณต๊ฒฉ์„ ๊ฒฝ๊ฐํ•˜๊ธฐ ์œ„ํ•ด ๋ณด์•ˆ ๋ฐ ์ œํ’ˆ ์ „๋ฌธ๊ฐ€๊ฐ€ ์ฆ‰๊ฐ์ ์ด๊ณ  ์‚ฌ์ „ ์˜ˆ๋ฐฉ์ ์œผ๋กœ ์‹ค์ œ ์ฐธ์—ฌํ•˜๋Š” ๊ฒฝ์šฐ๊ฐ€ ์—†์Šต๋‹ˆ๋‹ค. ๋‹ค๋ฅธ ์‹œ์žฅ์˜ DDoS ์„œ๋น„์Šค๋Š” ์‚ฌ์ „ ์„ค์น˜ ๋˜๋Š” ์ธํ”„๋ผ ์„ค๊ณ„ ์ „๋ฌธ ์„œ๋น„์Šค๋งŒ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

DDoS ๊ณต๊ฒฉ ๊ฒฝ๊ฐ์„ ์œ„ํ•œ ๋‹จ์ผ ์—ฐ๋žต ์ง€์ 

DDoS ๊ณต๊ฒฉ ๊ฒฝ๊ฐ์„ ์œ„ํ•œ ๋‹จ์ผ ์—ฐ๋žต ์ง€์ 

24x7 ์—ฐ์ค‘๋ฌดํœด ๋ชจ๋‹ˆํ„ฐ๋ง ์„œ๋น„์Šค ๋ฐ ์žฅ๊ธฐ์ ์ธ ๋ณต์žกํ•œ ๊ณต๊ฒฉ์„ ์ฐจ๋‹จํ•˜์—ฌ DDoS ๊ณต๊ฒฉ์„ ๋น ๋ฅด๊ฒŒ ๊ฒฝ๊ฐํ•˜๊ณ  ์šด์˜์„ ์‹ ์†ํ•˜๊ฒŒ ๋ณต์›ํ•˜๋Š” ๋ฐ ๊ธฐ์—ฌํ•ฉ๋‹ˆ๋‹ค.

360๋„ ๊ฐ€์‹œ์„ฑ ๋ฐ ๋ณด๊ณ 

๋ณดํ˜ธ ์„œ๋น„์Šค ๋˜๋Š” ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์— ๋Œ€ํ•œ ํ™œ์„ฑ ๋ชจ๋‹ˆํ„ฐ๋ง ๋ฐ ์ƒํƒœ ํ™•์ธ์€ ๋ฌผ๋ก  ์กฐ์น˜๊ฐ€ ํ•„์š”ํ•  ๋•Œ ๊ณ ๊ฐ์—๊ฒŒ ์ฆ‰์‹œ ์•Œ๋ฆฌ๋Š” ํŒŒ์ดํ”„ ํฌํ™” ๋ชจ๋‹ˆํ„ฐ๋ง.

360๋„ ๊ฐ€์‹œ์„ฑ ๋ฐ ๋ณด๊ณ 
์ข…๋‹จ๊ฐ„ ์„œ๋น„์Šค ๋ฐ ๋ณดํ˜ธ

์ข…๋‹จ๊ฐ„ ์„œ๋น„์Šค ๋ฐ ๋ณดํ˜ธ

Worry-free hybrid DDoS protection solution leaving the ownership, monitoring, and mitigation with Radware.

๋ฐ์ดํ„ฐ์‹œํŠธ

ERT ์„œ๋น„์Šค ๋ฐ์ดํ„ฐ ์‹œํŠธ

๋ผ๋“œ์›จ์–ด์˜ ๋น„์ƒ ๋Œ€์‘ ์„œ๋น„์Šค๋Š” ๊ณ ๊ฐ์˜ ๊ธด๊ธ‰ ์ƒํ™ฉ์— ๋Œ€์‘ํ•˜๊ณ  24/7 ์—ฐ์ค‘๋ฌดํœด ๊ฒฝ๊ฐ ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜์—ฌ ๋””์ง€ํ„ธ ์ž์‚ฐ์„ ๋ณดํ˜ธํ•˜๊ณ  ์‚ฌ์ด๋ฒ„ ๊ณต๊ฒฉ์ด ๋ฐœ์ƒํ•˜๊ธฐ ์ „์— ์˜ˆ๋ฐฉํ•ฉ๋‹ˆ๋‹ค.

์ž์„ธํžˆ ๋ณด๊ธฐ
์†”๋ฃจ์…˜ ๊ฐœ์š”

๋ผ๋“œ์›จ์–ด ERT ์†”๋ฃจ์…˜ ๊ฐœ์š”

๋ผ๋“œ์›จ์–ด์˜ ๋น„์ƒ ๋Œ€์‘ํŒ€(ERT)์€ DDoS ๊ณต๊ฒฉ ๋˜๋Š” ๋งฌ์›จ์–ด ๋ฐœ์ƒ์— ์ง๋ฉดํ•œ ๊ณ ๊ฐ์—๊ฒŒ 24x7 ์—ฐ์ค‘๋ฌดํœด ์‚ฌ์ „ ๋ณด์•ˆ ์ง€์› ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜๋Š” ๋ณด์•ˆ ์ „๋ฌธ๊ฐ€ ๋ถ€์„œ์ž…๋‹ˆ๋‹ค. ์ด ๋ธŒ๋กœ์…”์—์„œ ERT์˜ ๋ณด์•ˆ ๋ฐ ์šด์˜ ์ง€์› ์„œ๋น„์Šค์— ๋Œ€ํ•œ ๊ฐœ์š”๋ฅผ ํ™•์ธํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

์ž์„ธํžˆ ๋ณด๊ธฐ
์†”๋ฃจ์…˜ ๊ฐœ์š”

Radware Managed Services

In today’s constantly evolving threat landscape, there’s good reason to protect your cybersecurity investment from frequent, high-volume cyberattacks with some level of expert assistance.

์ž์„ธํžˆ ๋ณด๊ธฐ
๋ฐฑ์„œ

ERT ํ™œ์„ฑ ๊ณต๊ฒฉ์ž ํ”ผ๋“œ ๊ตฌ๋…: Under the Hood

๋ผ๋“œ์›จ์–ด์˜ ERT ์œ„ํ˜‘ ์—ฐ๊ตฌ ์„ผํ„ฐ๋Š” DDoS ๊ณต๊ฒฉ์ž๊ฐ€ ๊ณต๊ฒฉ ์ „์— ์กฐ์ง์˜ ๋„คํŠธ์›Œํฌ๋ฅผ ์ •์ฐฐํ•˜๊ณ  ๋ถ„์„ํ•˜๋Š” ๊ฒƒ์„ ๋ฐฉ์ง€ํ•˜๋„๋ก ํŠน๋ณ„ํžˆ ๊ฐœ๋ฐœํ•œ ํŠน์ˆ˜ ์œ„ํ˜‘ ์ธํ…”๋ฆฌ์ „์Šค ํ”ผ๋“œ๋ฅผ ๋งŒ๋“ค์—ˆ์Šต๋‹ˆ๋‹ค.

์ž์„ธํžˆ ๋ณด๊ธฐ

๋ผ๋“œ์›จ์–ด ์˜์—…๋ถ€์— ๋ฌธ์˜ํ•˜๊ธฐ

๋ผ๋“œ์›จ์–ด ์ „๋ฌธ๊ฐ€๋“ค์ด ๊ท€ํ•˜์˜ ์งˆ๋ฌธ์— ๋‹ตํ•˜๊ณ , ์–ด๋–ค ํ•ด๊ฒฐ์ฑ…์ด ํ•„์š”ํ•œ์ง€ ์ง„๋‹จํ•˜๊ณ , ์–ด๋–ค ์ œํ’ˆ์ด ๊ท€์‚ฌ์˜ ์‚ฌ์—…์— ๊ฐ€์žฅ ์ ํ•ฉํ•œ์ง€ ์ดํ•ดํ•˜์‹ค ์ˆ˜ ์žˆ๋„๋ก ๋„์™€๋“œ๋ฆฝ๋‹ˆ๋‹ค.

ํ˜„์žฌ ๊ณ ๊ฐ์ด์‹ญ๋‹ˆ๊นŒ?

๊ธฐ์ˆ  ์ง€์› ๋˜๋Š” ์ถ”๊ฐ€ ์„œ๋น„์Šค๊ฐ€ ํ•„์š”ํ•˜์‹œ๊ฑฐ๋‚˜ ๋‹น์‚ฌ ์ œํ’ˆ ๋ฐ ์†”๋ฃจ์…˜์— ๊ด€ํ•ด ๊ถ๊ธˆํ•˜์‹  ์ ์ด ์žˆ๋‹ค๋ฉด ์ €ํฌ๊ฐ€ ์ฆ‰์‹œ ๋„์™€๋“œ๋ฆฌ๊ฒ ์Šต๋‹ˆ๋‹ค.

์‚ฌ์—…์žฅ ์†Œ์žฌ์ง€
์ฆ‰์‹œ ๋‹ต์„ ๊ตฌํ•  ์ˆ˜ ์žˆ๋Š” ์ง€์‹ ์ •๋ณด ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค
๋ฌด๋ฃŒ ์˜จ๋ผ์ธ ์ œํ’ˆ ๊ต์œก
๋ผ๋“œ์›จ์–ด ๊ธฐ์ˆ  ์ง€์›๋ถ€์™€์˜ ์ƒ๋‹ด
๋ผ๋“œ์›จ์–ด ๊ณ ๊ฐ ํ”„๋กœ๊ทธ๋žจ ์ฐธ์—ฌ

์†Œ์…œ๋ฏธ๋””์–ด

์ „๋ฌธ๊ฐ€๋“ค๊ณผ ๊ต๋ฅ˜ํ•˜๊ณ  ๋ผ๋“œ์›จ์–ด ๊ธฐ์ˆ ์— ๊ด€ํ•œ ๋Œ€ํ™”์— ์ฐธ์—ฌํ•˜์„ธ์š”.

๋ธ”๋กœ๊ทธ
๋ณด์•ˆ ์—ฐ๊ตฌ ์„ผํ„ฐ
CyberPedia