Classification Algorithms of Trojan Horse Detection Based on Behavior

被引:0
作者
Chen Qin-Zhang [1 ]
Cheng Rong [1 ]
Gu Yu-Jie [1 ]
机构
[1] Zhejiang Univ Technol, Dept Comp, Hangzhou, Zhejiang, Peoples R China
来源
MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS | 2009年
关键词
Trojan-horse; fuzzy classification; behavior analysis; Classification accuracy;
D O I
10.1109/MINES.2009.192
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Current anti-Trojan is almost signature-based strategies, which cannot detect new one. Behavior analysis, with the ability to detect Trojans with unknown signatures, is a technique of initiative defense. However, current behavior analysis based anti-Trojan strategies have the following problems: high false or failure alarm rate, poor efficiency, and poor user-friendly interface design, etc. The paper works on the design of an anti-Trojan oriented algorithm based on behavior analysis. And we construct a standard of anti-Trojan algorithm system and point the up-limit of the precision. We propose an improved hierarchical fuzzy classification algorithm which is specifically designed for anti-Trojan. Finally, we organize the experiment to get the results. The results show high classification accuracy using our algorithm. Compared to Bayesian algorithm, our algorithm have better performance.
引用
收藏
页码:510 / 513
页数:4
相关论文
共 50 条
  • [41] A Therapeutic Sheep in Metastatic Wolf's Clothing: Trojan Horse Approach for Cancer Brain Metastases Treatment
    Liu, Hai-Jun
    Wang, Mingming
    Shi, Shanshan
    Hu, Xiangxiang
    Xu, Peisheng
    NANO-MICRO LETTERS, 2022, 14 (01)
  • [42] Engineering of fluorescent or photoactive Trojan probes for detection and eradication of β-Amyloids
    Aziz, Amal A.
    Siddiqui, Rafat A.
    Amtul, Zareen
    DRUG DELIVERY, 2020, 27 (01) : 917 - 926
  • [43] Lightweight Behavior-Based Malware Detection
    Anisetti, Marco
    Ardagna, Claudio A.
    Bena, Nicola
    Giandomenico, Vincenzo
    Gianini, Gabriele
    MANAGEMENT OF DIGITAL ECOSYSTEMS, MEDES 2023, 2024, 2022 : 237 - 250
  • [44] Endowing a Light-Inert Aqueous Surfactant Two-Phase System with Photoresponsiveness by Introducing a Trojan Horse
    Yu, Menghong
    Liu, Zihao
    Du, Yichen
    Ma, Cheng
    Yan, Yun
    Huang, Jianbin
    ACS APPLIED MATERIALS & INTERFACES, 2019, 11 (16) : 15103 - 15110
  • [45] Comparison of fuzzy clustering algorithms for classification
    Almeida, R. J.
    Sousa, J. M. C.
    2006 INTERNATIONAL SYMPOSIUM ON EVOLVING FUZZY SYSTEMS, PROCEEDINGS, 2006, : 112 - +
  • [46] Entropy based fuzzy classification and detection aid for colorectal polyps
    Nagy, Szilvia
    Lilik, Ferenc
    Koczy, Laszlo T.
    2017 IEEE AFRICON, 2017, : 78 - 82
  • [47] Comparison of wind turbine gearbox vibration analysis algorithms based on feature extraction and classification
    Koukoura, Sofia
    Carroll, James
    McDonald, Alasdair
    Weiss, Stephan
    IET RENEWABLE POWER GENERATION, 2019, 13 (14) : 2549 - 2557
  • [48] Rationalizing Defective Biomimetic Ceria: In Vitro Demonstration of a Potential "Trojan Horse" Nanozyme Based-Platform Leveraging Photo-Redox Activities for Minimally Invasive Therapy
    Sarkar, Sayoni
    Malhotra, Diksha
    Debnath, Monalisha
    Kundu, Gopal C.
    Srivastava, Rohit
    Kulkarni, Ajit R.
    ADVANCED MATERIALS TECHNOLOGIES, 2025, 10 (04):
  • [49] Predator-Prey Models on Interaction between Computer Worms, Trojan Horse and Antivirus Software Inside a Computer System
    Kumar, Munna
    Mishra, Bimal Kumar
    Panda, T. C.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 173 - 190
  • [50] Research and Simulation of Network Intrusion Detection Algorithm Based on Fuzzy Classification
    Liu Chun
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ELECTRONIC TECHNOLOGY, 2015, 6 : 14 - 17