z-logo
open-access-imgOpen Access
Data Stolen Trojan Detection based on Network Behaviors
Author(s) -
Yiguo Pu,
Xiaojun Chen,
Xu Cui,
Jinqiao Shi,
Li Guo,
Qi Cheng
Publication year - 2013
Publication title -
procedia computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.334
H-Index - 76
ISSN - 1877-0509
DOI - 10.1016/j.procs.2013.05.106
Subject(s) - trojan , computer science , computer security
It is well known that data loss caused by data stolen Trojans is huge as it could upload privacy or secret data to hackers who controls it remotely. Most of current security tools monitor Trojans by scanning the signature code that is distinguished from normal software. However, this method can only recognize known Trojan except up-to-date malicious software that has unknown signature code. Some other security tools requiring preinstalled on hosts detects Trojans by program behaviors. This paper proposes a novel medel to detect data stolen Trojans based on their network behaviors. It consists of three detectors: 1) keep-alive detector detects keep-alive packets or connections; 2) master-slave-connection detector tries to find master and slave connections and 3) mistake detector analyses the rate of download vs. upload and connection time for different protocol. The experiments show that this method is efficient in recognizing data stolenTrojans. This protyped system proves the possibility of detection Trojans from network

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom