Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAE.IT-X.1218 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2022-06-29 ÃÑÆäÀÌÁö 21
ÇѱÛÇ¥ÁØ¸í »÷µå¹Ú½º ȯ°æ¿¡¼­ µ¿Àû ¾Ç¼ºÄÚµå ºÐ¼®ÀÇ ¿ä±¸»çÇ× ¹× Áöħ
¿µ¹®Ç¥Áظí Requirements and Guidelines for Dynamic Malware Analysis in a Sandbox Environment
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº »÷µå¹Ú½º ȯ°æ¿¡¼­ ¾Ç¼ºÄÚµå ŽÁö ¹× ¾Ç¼ºÄÚµå µ¿Àû ºÐ¼®À» À§ÇÏ¿© º¸¾ÈÀ§Çù ½Ã³ª¸®¿À(7Á¾ÀÇ °ø°Ý ½Ã³ª¸®¿À), »÷µå¹Ú½º ±â¼ú Á¤ÀÇ, »÷µå¹Ú½º È°¿ëÀ» À§ÇÑ ¿ä±¸»çÇ× 6°Ç¿¡ ´ëÇÑ Áöħ, ¾Ç¼ºÄÚµå µ¿Àû ÇàÀ§ºÐ¼®À» À§ÇÑ ÀϹÝÀûÀÎ ¿ä±¸»çÇ× 7°Ç°ú Áöħ¿¡ ´ëÇÏ¿© ¼³¸íÇÏ°í ÀÖ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard describes the security threat scenarios (7 types of attack scenarios), the definition of sandbox technology, the guidelines for six requirements for sandbox use, and dynamic malware analysis in a sandbox environment. In addition, seven general requirements and guidelines for behavior analysis are described.
±¹Á¦Ç¥ÁØ ITU-T X.1218
°ü·ÃÆÄÀÏ TTAE.IT-X.1218.pdf TTAE.IT-X.1218.pdf            

ÀÌÀü
ÀÓº£µðµå ¸®´ª½º ±â¹ÝÀÇ °í°¡¿ë ÀÀ¿ë ÇÁ·Î±×·¥ ÂüÁ¶¸ðµ¨ ¹× ¿ä±¸»çÇ×
´ÙÀ½
ÀÓº£µðµå µð¹ÙÀ̽º¿ë ÀÚ°¡ÀûÀÀÇü ¼ÒÇÁÆ®¿þ¾î Á¦3ºÎ - ÀÚ°¡ÀûÀÀÇü ÀÀ¿ëÀ» À§ÇÑ Á¦¾î ¸ð´ÏÅ͸µ ÀÎÅÍÆäÀ̽º ±Ô°Ý