ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0370 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2021-06-30 ÃÑ ÆäÀÌÁö 13
ÇÑ±Û Ç¥ÁØ¸í ¾Ç¼ºÄÚµå ÅëÇÕÁø´Ü¸í »ý¼ºÀýÂ÷ ¹× ¿ä±¸»çÇ×
¿µ¹® Ç¥Áظí Procedures and Requirements for the Integrated Malicious Code Name
ÇÑ±Û ³»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº ¾Ç¼ºÄÚµå ÅëÇÕÁø´Ü¸íÀ» »ý¼ºÇÏ´Â °úÁ¤¿¡¼­ °®Ãç¾ß ÇÏ´Â ¿ä±¸»çÇ×°ú »ý¼ºÀýÂ÷¸¦ ±â¼úÇÑ´Ù. Ground truth¿¡ ÇØ´çÇÏ´Â AV º¥´õ»çÀÇ ¾Ç¼ºÄÚµå Áø´Ü¸íÀ» Åä´ë·Î ¿ä±¸»çÇ×°ú »ý¼ºÀýÂ÷¿¡ µû¸¥ ¾Ç¼ºÄÚµå ÅëÇÕÁø´Ü¸íÀº °¢°¢ÀÇ AV º¥´õ»çÀÇ Áø´Ü¸í°ú º°µµ·Î ¸ðµç AV º¥´õ»ç°¡ °øÅëÀ¸·Î È°¿ë °¡´ÉÇÏ´Ù.
¿µ¹® ³»¿ë¿ä¾à This standard describes the requirements and generation procedures that must be established in the process of generating integrated malicious code name. Based on the malicious code name of the AV vendor, which is ground truth, the integrated malicious code name according to the requirement and generation procedure can be used by all AV vendors separately from the malicious code name by each AV vendor.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0370.pdf TTAK.KO-12.0370.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
¾Ç¼ºÄÚµå ÅëÇÕÁø´Ü¸í »ý¼ºÀýÂ÷ ¹× ¿ä±¸»çÇ× TTAK.KO-12.0370 2021-06-30 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0370.pdf