Classification Algorithms of Trojan Horse Detection Based on Behavior

被引:0
|
作者
Chen Qin-Zhang [1 ]
Cheng Rong [1 ]
Gu Yu-Jie [1 ]
机构
[1] Zhejiang Univ Technol, Dept Comp, Hangzhou, Zhejiang, Peoples R China
来源
MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS | 2009年
关键词
Trojan-horse; fuzzy classification; behavior analysis; Classification accuracy;
D O I
10.1109/MINES.2009.192
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Current anti-Trojan is almost signature-based strategies, which cannot detect new one. Behavior analysis, with the ability to detect Trojans with unknown signatures, is a technique of initiative defense. However, current behavior analysis based anti-Trojan strategies have the following problems: high false or failure alarm rate, poor efficiency, and poor user-friendly interface design, etc. The paper works on the design of an anti-Trojan oriented algorithm based on behavior analysis. And we construct a standard of anti-Trojan algorithm system and point the up-limit of the precision. We propose an improved hierarchical fuzzy classification algorithm which is specifically designed for anti-Trojan. Finally, we organize the experiment to get the results. The results show high classification accuracy using our algorithm. Compared to Bayesian algorithm, our algorithm have better performance.
引用
收藏
页码:510 / 513
页数:4
相关论文
共 50 条
  • [1] A Trojan horse Detection Technology Based on Behavior Analysis
    Qin, Jie
    Yan, Huijuan
    Si, Qun
    Yan, Fuliang
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [2] SPID-based Method of Trojan Horse Detection
    Ren, Xun-yi
    Qian, Gui-bing
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON INFORMATION, BUSINESS AND EDUCATION TECHNOLOGY (ICIBET 2013), 2013, 26 : 148 - 151
  • [3] The Design and Implementation of the Trojan Horse Based on Kernel Hacking
    Feng Wanli
    Zhou Hong
    Yu Changhui
    ADVANCES IN MANUFACTURING TECHNOLOGY, PTS 1-4, 2012, 220-223 : 2891 - 2894
  • [4] Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization
    Saudi, Madihah Mohd
    Abuzaid, Areej Mustafa
    Taib, Bachok M.
    Abdullah, Zul Hilmi
    ADVANCED COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY, 2015, 315
  • [5] Detection of Trojan Horse in the Internet of Things: Comparative Evaluation of Machine Learning Approaches
    Mughaid, Ala
    Ibrahim, Ruba
    AlJamal, Mahmoud
    AL-Aiash, Issa
    2024 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING, NETWORKING AND APPLICATIONS, MCNA 2024, 2024, : 35 - 41
  • [6] Distortion Effects on Trojan Horse Applications
    R. G. Pizzone
    C. Spitaleri
    A. M. Mukhamedzhanov
    L. D. Blokhintsev
    C. A. Bertulani
    B. F. Irgaziev
    M. La Cognata
    L. Lamia
    S. Romano
    Few-Body Systems, 2011, 50 : 319 - 321
  • [7] Nuclear astrophysics and the Trojan Horse Method
    C. Spitaleri
    M. La Cognata
    L. Lamia
    A. M. Mukhamedzhanov
    R. G. Pizzone
    The European Physical Journal A, 2016, 52
  • [8] A practical trojan horse for bell-inequality-based quantum cryptography
    Larsson, JÅ
    QUANTUM INFORMATION & COMPUTATION, 2002, 2 (06) : 434 - 442
  • [9] The Trojan Horse Method in nuclear astrophysics
    C. Spitaleri
    A. M. Mukhamedzhanov
    L. D. Blokhintsev
    M. La Cognata
    R. G. Pizzone
    A. Tumino
    Physics of Atomic Nuclei, 2011, 74 : 1725 - 1739
  • [10] Position paper: Prolepsis on the problem of Trojan-horse-based integrity attacks
    McDermott, J
    NEW SECURITY PARADIGMS WOEKSHOP, PROCEEDINGS, 1999, : 48 - 51