IT 인프라

IT 인프라는 기업 IT 환경의 운영 및 관리를 위해 필요한 하드웨어, 소프트웨어, 네트워크 리소스 및 서비스의 복합체를 의미합니다.

번역 대기 중인 콘텐츠입니다. 영어 버전을 표시하고 있습니다.

Mitigation Steps: 1. Identification (Baselines vs Spikes). 2. Rerouting (Anycast/BGP). 3. Filtering (Scrubbing). 4. Post-game analysis. Tools: Cloudflare, AWS Shield, Akamai, Radware.

        graph LR
  Center["IT 인프라"]:::main
  Rel_cloud_computing["cloud-computing"]:::related -.-> Center
  click Rel_cloud_computing "/terms/cloud-computing"
  Rel_virtualization["virtualization"]:::related -.-> Center
  click Rel_virtualization "/terms/virtualization"
  Rel_devops["devops"]:::related -.-> Center
  click Rel_devops "/terms/devops"
  classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
  classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
  classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
  classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
  linkStyle default stroke:#4b5563,stroke-width:2px;

      

🧒 5살도 이해할 수 있게 설명

Imagine you have a small pizza shop. Suddenly, 10,000 people call at once just to ask the time, blocking the phone lines so real customers can't order pizza. DDoS mitigation is like having a smart operator who recognizes the fake calls instantly and hangs up on them, while making sure the people who actually want pizza get through to the kitchen.

🤓 Expert Deep Dive

Technically, DDOS mitigation operates at different layers of the 'OSI Model'. 'Volumetric' attacks (L3/L4) attempt to saturate the network bandwidth; these are handled via 'Anycast Routing', which distributes the load across many global servers. 'Protocol' attacks (e.g., SYN Floods) exploit the handshake process of TCP. 'Application Layer' attacks (L7) are the most sophisticated, mimicking human behavior (like refreshing a search page). Mitigation here requires 'Web Application Firewalls' (WAF) that use machine learning to identify 'Bot Signatures'. A critical part of modern defense is 'BGP Flowspec', which allow ISPs to distribute filtering rules across the internet backbone in seconds to block an attack at its source.

📚 출처