Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0370 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2021-06-30 ÃÑÆäÀÌÁö 13
ÇѱÛÇ¥ÁØ¸í ¾Ç¼ºÄÚµå ÅëÇÕÁø´Ü¸í »ý¼ºÀýÂ÷ ¹× ¿ä±¸»çÇ×
¿µ¹®Ç¥Áظí Procedures and Requirements for the Integrated Malicious Code Name
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº ¾Ç¼ºÄÚµå ÅëÇÕÁø´Ü¸íÀ» »ý¼ºÇÏ´Â °úÁ¤¿¡¼­ °®Ãç¾ß ÇÏ´Â ¿ä±¸»çÇ×°ú »ý¼ºÀýÂ÷¸¦ ±â¼úÇÑ´Ù. Ground truth¿¡ ÇØ´çÇÏ´Â AV º¥´õ»çÀÇ ¾Ç¼ºÄÚµå Áø´Ü¸íÀ» Åä´ë·Î ¿ä±¸»çÇ×°ú »ý¼ºÀýÂ÷¿¡ µû¸¥ ¾Ç¼ºÄÚµå ÅëÇÕÁø´Ü¸íÀº °¢°¢ÀÇ AV º¥´õ»çÀÇ Áø´Ü¸í°ú º°µµ·Î ¸ðµç AV º¥´õ»ç°¡ °øÅëÀ¸·Î È°¿ë °¡´ÉÇÏ´Ù.
¿µ¹®³»¿ë¿ä¾à This standard describes the requirements and generation procedures that must be established in the process of generating integrated malicious code name. Based on the malicious code name of the AV vendor, which is ground truth, the integrated malicious code name according to the requirement and generation procedure can be used by all AV vendors separately from the malicious code name by each AV vendor.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0370.pdf TTAK.KO-12.0370.pdf            

ÀÌÀü
½º¸¶Æ®°øÀå¿¡¼­ÀÇ µ¥ÀÌÅÍ °ü¸®¸¦ À§ÇÑ ºí·ÏüÀÎ – Á¦1ºÎ: µ¥ÀÌÅÍ °ü¸® ÇÁ·¹ÀÓ¿öÅ© ¹× Àû¿ë ½Ã³ª¸®¿À
´ÙÀ½
µµ½Ãöµµ À¶ÇÕ¼­ºñ½º Àû¿ë Áöħ – Á¦2ºÎ: ¿¡Áö µð¹ÙÀ̽º µ¥ÀÌÅÍÀÇ °³ÀÎÁ¤º¸ ó¸® ¹æ¹ý