Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0370 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2021-06-30 | ÃÑÆäÀÌÁö | 13 |
ÇѱÛÇ¥Áظí | ¾Ç¼ºÄÚµå ÅëÇÕÁø´Ü¸í »ý¼ºÀýÂ÷ ¹× ¿ä±¸»çÇ× | ||
¿µ¹®Ç¥Áظí | Procedures and Requirements for the Integrated Malicious Code Name | ||
Çѱ۳»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº ¾Ç¼ºÄÚµå ÅëÇÕÁø´Ü¸íÀ» »ý¼ºÇÏ´Â °úÁ¤¿¡¼ °®Ãç¾ß ÇÏ´Â ¿ä±¸»çÇ×°ú »ý¼ºÀýÂ÷¸¦ ±â¼úÇÑ´Ù. Ground truth¿¡ ÇØ´çÇÏ´Â AV º¥´õ»çÀÇ ¾Ç¼ºÄÚµå Áø´Ü¸íÀ» Åä´ë·Î ¿ä±¸»çÇ×°ú »ý¼ºÀýÂ÷¿¡ µû¸¥ ¾Ç¼ºÄÚµå ÅëÇÕÁø´Ü¸íÀº °¢°¢ÀÇ AV º¥´õ»çÀÇ Áø´Ü¸í°ú º°µµ·Î ¸ðµç AV º¥´õ»ç°¡ °øÅëÀ¸·Î È°¿ë °¡´ÉÇÏ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | This standard describes the requirements and generation procedures that must be established in the process of generating integrated malicious code name. Based on the malicious code name of the AV vendor, which is ground truth, the integrated malicious code name according to the requirement and generation procedure can be used by all AV vendors separately from the malicious code name by each AV vendor. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0370.pdf |