Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAE.OT-12.0019-Part2 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2018-12-19 | ÃÑÆäÀÌÁö | 76 |
ÇѱÛÇ¥Áظí | ±¸Á¶ÈµÈ À§Çù Á¤º¸ Ç¥Çö ±Ô°Ý(STIX) ¹öÀü 2.0 - Á¦2ºÎ: STIX °´Ã¼ | ||
¿µ¹®Ç¥Áظí | Structured Threat Information eXpression(STIX) Version 2.0 - Part2: STIX Objects | ||
Çѱ۳»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº STIX µµ¸ÞÀÎ °´Ã¼(SDO, STIX Domain Objects)ÀÇ ÁýÇÕÀ» Á¤ÀÇÇϸç, °¢ SDO´Â ÀϹÝÀûÀ¸·Î CTI¿¡¼ ³Î¸® »ç¿ëµÇ´Â °³³ä¿¡ ÇØ´çÇÑ´Ù. SDOÀÇ ±¸¼º¿ä¼Ò(°ø°Ý ÆÐÅÏ, Ä·ÆäÀÎ, ´ëÀÀ ¹æ¹ý, ¾ÆÀ̵§Æ¼Æ¼, ħÇØ ÁöÇ¥, ħÅõ ÁýÇÕ, ¾Ç¼ºÄÚµå, °üÃø µ¥ÀÌÅÍ, ¸®Æ÷Æ®, À§Çù ÇàÀ§ÀÚ, µµ±¸, Ãë¾àÁ¡)¿Í STIX °ü°è(Relationships)¸¦ »ç¿ëÇÏ¿© °´Ã¼°£ÀÇ Æø ³Ð°í ´Ù¾çÇÑ CTI¸¦ »ý¼ºÇÏ°í °øÀ¯ÇÒ ¼ö ÀÖ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The standard defines the set of STIX Domain Objects, each of which corresponds to a unique concept commonly represented in CTI. Using SDO(Attack Pattern, Campaign, Course of Action, Identity, Indicator, Intrusion Set, Malware, Observed data, Report, Threat Actor, Tool, Vulnerability) and STIX relationships as building blocks, individuals can create and share broad and comprehensive cyber threat intelligence. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAE.OT-12.0019-Part2.pdf |
- ÀÌÀü
- 3rd Generation Partnership Project;Technical Specification Group Core Network and Terminals;5G System; Network Slice Selection Services; Stage 3(Release 15)
- ´ÙÀ½
- 3rd Generation Partnership Project;Technical Specification Group Core Network and Terminals;5G System; Network Slice Selection Services; Stage 3(Release 17)