Computer Science ›› 2013, Vol. 40 ›› Issue (Z6): 337-339.

Previous Articles     Next Articles

Trojans Control Behavior Detection Approach Based on Timing Analysis

CHEN Li,ZHANG Li,YAO Yi-zhan and HU Wei-hua   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Traditional detection approach based on fingerprint has a higher rate of false negatives.To this end,this paper put forward a detection approach of Trojans control behavior based on timing analysis of network sessions.Firstly,it calculats the weighted Euclidean distance between clustering dataflow,then the Trojans control behavior can be detected by ti-ming relationships of clustering data.Experiments show that the approach did not need fingerprint database,and can achieve higher correct detection rate,less consumption of resource real-time detection and processing.

Key words: Timing analysis,Clustering,Trojan control,Behavior recognition,Intrusion detection

[1] Zhang Li-ke,White G B.An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection[C]∥Proc.of Parallel and Distributed Processing Sysmposium.Long Beach,USA:[s.n],2007:1-8
[2] 井小沛,汪厚详,聂凯,等.面向入侵检测的基于IMGA和MKSVM的特征选择算法[J].计算机科学,2012,39(7):262-264
[3] Nie Fei-ping,Xiang Shi-ming,Jia Yang-qing,et al.Trace Ratio Criterion for Feature Selection[C]∥Proceedings of National Conference on Artificial Intelligence.Chicago,USA:[s.n],2008:672-675
[4] Wang Sui-yu,Baird H S.Feature Selection Focused Within Error Clusters[C]∥Proceedings of the 19th IEEE ICPR’08.[s.1]:IEEE Press,2008:1-4
[5] 易军凯,陈利,孙建伟.网络心跳包序列的数据流分簇检测方法[J].计算机工程,2011,37(24):201-524
[6] Nehinbe J O.Automated technique for debugging network intrusion detection systems[A]∥IEEE 2010International Confe-rence on Intelligent Systems,Modelling and Simulation(ISMS) [C].Liverpool,2010:363-367
[7] Wuu L C,Hung C H,CHEN S F.Building intrusion pattern miner for Snort network intrusion detection system[J].Journal of Systems and Software,2007,80(10):1701-1714
[8] 郭文忠,陈国龙,陈庆良,等.基于粒子群优化算法和相关性分析的特征子集选择[J].计算机科学,2008,35(2):113-147
[9] 陈友,沈华伟,李洋.一种高效的面向入侵检测系统的特征选择算法[J].计算机学报,2007,30(8):1395-1407
[10] 陈友,程学旗,李洋,等.基于特征选择的轻量级入侵检测系统[J].软件学报,2007,18(7):1639-1650

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!