Classification Algorithms of Trojan Horse Detection Based on Behavior

被引:0
|
作者
Chen Qin-Zhang [1 ]
Cheng Rong [1 ]
Gu Yu-Jie [1 ]
机构
[1] Zhejiang Univ Technol, Dept Comp, Hangzhou, Zhejiang, Peoples R China
来源
MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS | 2009年
关键词
Trojan-horse; fuzzy classification; behavior analysis; Classification accuracy;
D O I
10.1109/MINES.2009.192
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Current anti-Trojan is almost signature-based strategies, which cannot detect new one. Behavior analysis, with the ability to detect Trojans with unknown signatures, is a technique of initiative defense. However, current behavior analysis based anti-Trojan strategies have the following problems: high false or failure alarm rate, poor efficiency, and poor user-friendly interface design, etc. The paper works on the design of an anti-Trojan oriented algorithm based on behavior analysis. And we construct a standard of anti-Trojan algorithm system and point the up-limit of the precision. We propose an improved hierarchical fuzzy classification algorithm which is specifically designed for anti-Trojan. Finally, we organize the experiment to get the results. The results show high classification accuracy using our algorithm. Compared to Bayesian algorithm, our algorithm have better performance.
引用
收藏
页码:510 / 513
页数:4
相关论文
共 50 条
  • [21] Using Ustilago maydis as a Trojan Horse for In Situ Delivery of Maize Proteins
    Fiedler, Isabell-Christin
    Weiberg, Arne
    van der Linde, Karina
    JOVE-JOURNAL OF VISUALIZED EXPERIMENTS, 2019, (144):
  • [22] The devil is not in the detail: representational absence and stereotyping in the 'Trojan Horse' news story
    Cannizzaro, Sara
    Gholami, Reza
    RACE ETHNICITY AND EDUCATION, 2018, 21 (01) : 15 - 29
  • [23] Trojan-horse attacks threaten the security of practical quantum cryptography
    Jain, Nitin
    Anisimova, Elena
    Khan, Imran
    Makarov, Vadim
    Marquardt, Christoph
    Leuchs, Gerd
    NEW JOURNAL OF PHYSICS, 2014, 16
  • [24] Analysis of Trojan Horse Events by Query of Vulnerability Information in Searching Engines
    Zhao, Xianghui
    Liu, Hui
    Xue, Geng
    Cao, Wei
    2014 SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2014), VOL 2, 2014,
  • [25] New Advances in the Trojan Horse Method as an Indirect Approach to Nuclear Astrophysics
    A. Tumino
    C. Spitaleri
    S. Cherubini
    M. Gulino
    M. La Cognata
    L. Lamia
    R. G. Pizzone
    S. M. R. Puglia
    G. G. Rapisarda
    S. Romano
    M. L. Sergi
    R. Spartà
    Few-Body Systems, 2013, 54 : 745 - 753
  • [26] Three-phase behavior-based detection and classification of known and unknown malware
    Lin, Ying-Dar
    Lai, Yuan-Cheng
    Lu, Chun-Nan
    Hsu, Peng-Kai
    Lee, Chia-Yin
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (11) : 2004 - 2015
  • [27] Anorexia and the Trojan Horse: a reflexive review of written psychoanalytic encounters with anorexic patients
    Holmes, Joshua
    JOURNAL OF CHILD PSYCHOTHERAPY, 2019, 45 (01) : 71 - 86
  • [28] Nanodiamonds act as Trojan horse for intracellular delivery of metal ions to trigger cytotoxicity
    Zhu, Ying
    Zhang, Yu
    Shi, Guosheng
    Yang, Jinrong
    Zhang, Jichao
    Li, Wenxin
    Li, Aiguo
    Tai, Renzhong
    Fang, Haiping
    Fan, Chunhai
    Huang, Qing
    PARTICLE AND FIBRE TOXICOLOGY, 2015, 12
  • [29] Neuroprotection in stroke in the mouse with intravenous erythropoietin-Trojan horse fusion protein
    Fu, Ailing
    Hui, Eric Ka-Wai
    Lu, Jeff Zhiqiang
    Boado, Ruben J.
    Pardridge, William M.
    BRAIN RESEARCH, 2011, 1369 : 203 - 207
  • [30] Nanodiamonds act as Trojan horse for intracellular delivery of metal ions to trigger cytotoxicity
    Ying Zhu
    Yu Zhang
    Guosheng Shi
    Jinrong Yang
    Jichao Zhang
    Wenxin Li
    Aiguo Li
    Renzhong Tai
    Haiping Fang
    Chunhai Fan
    Qing Huang
    Particle and Fibre Toxicology, 12