1 ¼·Ð 2
2 ³×Æ®¿öÅ© Ãë¾àÁ¡ °ø°Ý °³¿ä 2
2.1 ¹æÇØ (Interruption) 3
2.2 °¡·Îä±â (Interception) 3
2.3 ¼öÁ¤ (Modification) 3
2.4 À§Á¶ (Fabrication) 3
3 ³×Æ®¿öÅ© Ãë¾àÁ¡ °ø°ÝÀÇ Á¾·ù 3
3.1 ½ºÇÁÇÎ °ø°Ý (spoofing attack) 3
3.1.1 IP ½ºÇÁÇÎ 4
3.1.2 APR ½ºÇÁÇÎ 5
3.1.3 À̸ÞÀÏ ½ºÇÁÇÎ 5
3.1.4 DNS ½ºÇÁÇÎ 5
3.2 ½º´ÏÇÎ (Sniffing) 5
3.2.1 Switch Jamming 6
3.2.2 ARP Redirection 6
3.2.3 ICMP Redirect 6
3.3 DoS (Denial of Service) °ø°Ý 6
3.3.1 Ping of death 7
3.3.2 TearDrop attack 7
3.3.3 SYN Floods Attack 7
3.3.4 Smurf Attack 8
3.4 IP ´ÜÆíÈ °ø°Ý (IP Fragmentation Attack) 9
3.4.1 Tiny fragment °ø°Ý 9
3.4.2 Fragment Overlap °ø°Ý 9
3.5 Worm 9