Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAE.IT-X.1218 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2022-06-29 | ÃÑÆäÀÌÁö | 21 |
ÇѱÛÇ¥Áظí | »÷µå¹Ú½º ȯ°æ¿¡¼ µ¿Àû ¾Ç¼ºÄÚµå ºÐ¼®ÀÇ ¿ä±¸»çÇ× ¹× Áöħ | ||
¿µ¹®Ç¥Áظí | Requirements and Guidelines for Dynamic Malware Analysis in a Sandbox Environment | ||
Çѱ۳»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº »÷µå¹Ú½º ȯ°æ¿¡¼ ¾Ç¼ºÄÚµå ŽÁö ¹× ¾Ç¼ºÄÚµå µ¿Àû ºÐ¼®À» À§ÇÏ¿© º¸¾ÈÀ§Çù ½Ã³ª¸®¿À(7Á¾ÀÇ °ø°Ý ½Ã³ª¸®¿À), »÷µå¹Ú½º ±â¼ú Á¤ÀÇ, »÷µå¹Ú½º È°¿ëÀ» À§ÇÑ ¿ä±¸»çÇ× 6°Ç¿¡ ´ëÇÑ Áöħ, ¾Ç¼ºÄÚµå µ¿Àû ÇàÀ§ºÐ¼®À» À§ÇÑ ÀϹÝÀûÀÎ ¿ä±¸»çÇ× 7°Ç°ú Áöħ¿¡ ´ëÇÏ¿© ¼³¸íÇÏ°í ÀÖ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The standard describes the security threat scenarios (7 types of attack scenarios), the definition of sandbox technology, the guidelines for six requirements for sandbox use, and dynamic malware analysis in a sandbox environment. In addition, seven general requirements and guidelines for behavior analysis are described. | ||
±¹Á¦Ç¥ÁØ | ITU-T X.1218 | ||
°ü·ÃÆÄÀÏ | TTAE.IT-X.1218.pdf |
- ÀÌÀü
- ij¸®¾î ÀÌ´õ³Ý2.0
- ´ÙÀ½
- HTML ĵ¹ö½º 2D ÄÁÅؽºÆ®