Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAE.IT-X.1218 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2022-06-29 ÃÑÆäÀÌÁö 21
ÇѱÛÇ¥ÁØ¸í »÷µå¹Ú½º ȯ°æ¿¡¼­ µ¿Àû ¾Ç¼ºÄÚµå ºÐ¼®ÀÇ ¿ä±¸»çÇ× ¹× Áöħ
¿µ¹®Ç¥Áظí Requirements and Guidelines for Dynamic Malware Analysis in a Sandbox Environment
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº »÷µå¹Ú½º ȯ°æ¿¡¼­ ¾Ç¼ºÄÚµå ŽÁö ¹× ¾Ç¼ºÄÚµå µ¿Àû ºÐ¼®À» À§ÇÏ¿© º¸¾ÈÀ§Çù ½Ã³ª¸®¿À(7Á¾ÀÇ °ø°Ý ½Ã³ª¸®¿À), »÷µå¹Ú½º ±â¼ú Á¤ÀÇ, »÷µå¹Ú½º È°¿ëÀ» À§ÇÑ ¿ä±¸»çÇ× 6°Ç¿¡ ´ëÇÑ Áöħ, ¾Ç¼ºÄÚµå µ¿Àû ÇàÀ§ºÐ¼®À» À§ÇÑ ÀϹÝÀûÀÎ ¿ä±¸»çÇ× 7°Ç°ú Áöħ¿¡ ´ëÇÏ¿© ¼³¸íÇÏ°í ÀÖ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard describes the security threat scenarios (7 types of attack scenarios), the definition of sandbox technology, the guidelines for six requirements for sandbox use, and dynamic malware analysis in a sandbox environment. In addition, seven general requirements and guidelines for behavior analysis are described.
±¹Á¦Ç¥ÁØ ITU-T X.1218
°ü·ÃÆÄÀÏ TTAE.IT-X.1218.pdf TTAE.IT-X.1218.pdf            

ÀÌÀü
½º¸¶Æ®¿Â½ÇÀ» À§ÇÑ ¿ø°Ý °¨½Ã¿ë ½º¸¶Æ® ¿µ»ó ÀåÄ¡
´ÙÀ½
ü°¨Çü °ÔÀÓ °ø°£ ³»ÀÇ »ç¿ëÀÚ Çൿ Á¤ÀÇ ¹× ÃßÀû ±â¼ú