A General Framework of Trojan Communication Detection Based on Network Traces.
Saved in:
| Title: | A General Framework of Trojan Communication Detection Based on Network Traces. |
|---|---|
| Authors: | Li, Shicong, Yun, Xiaochun, Zhang, Yongzheng, Xiao, Jun, Wang, Yipeng |
| Source: | 2012 IEEE Seventh International Conference on Networking, Architecture & Storage; 1/ 1/2012, p49-58, 10p |
| Abstract: | Because of the widespread Trojan, Internet users become more and more vulnerable to the threat of information leakage. Traditional techniques of Trojan detection were classified into two main categories: host-based and network-based. Unfortunately, existing techniques are insufficient and limited, because of the following reasons: (1)only uncover the known Trojan while inefficiently detecting novel samples, (2) should be adjusted in a timely fashion even a trivial change is applied, and (3)become computationally more expensive. In our work, we focus on a network behavior based method to address the limitations of previous network-based approaches. We analyze the profile of network behavior at two levels: (i)flow-level, (ii)IP-level. Our approach present two main advantages: (1)capture more detailed information to describe the network behavior profile, (2)consume lower computational overhead. We proposed a system, Manto, which detects Trojan communication with high accuracy using clustering technique. We implement Manto on real-world traces. The evaluation results exhibit that Manto is suitable for detecting Trojan communication amongst the vast amount of network traffic, with over 91% accuracy and less than 3.2% false positive ratio. We confidently regard our approach as a complementary way to the existing network-based techniques for we could address their main shortcomings. [ABSTRACT FROM PUBLISHER] |
| Copyright of 2012 IEEE Seventh International Conference on Networking, Architecture & Storage is the property of IEEE and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) | |
| Database: | Complementary Index |
| FullText | Text: Availability: 0 CustomLinks: – Url: https://resolver.ebscohost.com/openurl?sid=EBSCO:edb&genre=book&issn=&ISBN=9781467318891&volume=&issue=&date=&spage=49&pages=49-58&title=2012 IEEE Seventh International Conference on Networking, Architecture & Storage&atitle=A%20General%20Framework%20of%20Trojan%20Communication%20Detection%20Based%20on%20Network%20Traces.&aulast=Li%2C%20Shicong&id=DOI:10.1109/NAS.2012.10 Name: Full Text Finder Category: fullText Text: Full Text Finder Icon: https://imageserver.ebscohost.com/branding/images/FTF.gif MouseOverText: Full Text Finder |
|---|---|
| Header | DbId: edb DbLabel: Complementary Index An: 86572215 RelevancyScore: 849 AccessLevel: 6 PubType: Conference PubTypeId: conference PreciseRelevancyScore: 849.323059082031 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: A General Framework of Trojan Communication Detection Based on Network Traces. – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Li%2C+Shicong%22">Li, Shicong</searchLink><br /><searchLink fieldCode="AR" term="%22Yun%2C+Xiaochun%22">Yun, Xiaochun</searchLink><br /><searchLink fieldCode="AR" term="%22Zhang%2C+Yongzheng%22">Zhang, Yongzheng</searchLink><br /><searchLink fieldCode="AR" term="%22Xiao%2C+Jun%22">Xiao, Jun</searchLink><br /><searchLink fieldCode="AR" term="%22Wang%2C+Yipeng%22">Wang, Yipeng</searchLink> – Name: TitleSource Label: Source Group: Src Data: 2012 IEEE Seventh International Conference on Networking, Architecture & Storage; 1/ 1/2012, p49-58, 10p – Name: Abstract Label: Abstract Group: Ab Data: Because of the widespread Trojan, Internet users become more and more vulnerable to the threat of information leakage. Traditional techniques of Trojan detection were classified into two main categories: host-based and network-based. Unfortunately, existing techniques are insufficient and limited, because of the following reasons: (1)only uncover the known Trojan while inefficiently detecting novel samples, (2) should be adjusted in a timely fashion even a trivial change is applied, and (3)become computationally more expensive. In our work, we focus on a network behavior based method to address the limitations of previous network-based approaches. We analyze the profile of network behavior at two levels: (i)flow-level, (ii)IP-level. Our approach present two main advantages: (1)capture more detailed information to describe the network behavior profile, (2)consume lower computational overhead. We proposed a system, Manto, which detects Trojan communication with high accuracy using clustering technique. We implement Manto on real-world traces. The evaluation results exhibit that Manto is suitable for detecting Trojan communication amongst the vast amount of network traffic, with over 91% accuracy and less than 3.2% false positive ratio. We confidently regard our approach as a complementary way to the existing network-based techniques for we could address their main shortcomings. [ABSTRACT FROM PUBLISHER] – Name: Abstract Label: Group: Ab Data: <i>Copyright of 2012 IEEE Seventh International Conference on Networking, Architecture & Storage is the property of IEEE and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract.</i> (Copyright applies to all Abstracts.) |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edb&AN=86572215 |
| RecordInfo | BibRecord: BibEntity: Identifiers: – Type: doi Value: 10.1109/NAS.2012.10 Languages: – Code: eng Text: English PhysicalDescription: Pagination: PageCount: 10 StartPage: 49 Titles: – TitleFull: A General Framework of Trojan Communication Detection Based on Network Traces. Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Li, Shicong – PersonEntity: Name: NameFull: Yun, Xiaochun – PersonEntity: Name: NameFull: Zhang, Yongzheng – PersonEntity: Name: NameFull: Xiao, Jun – PersonEntity: Name: NameFull: Wang, Yipeng IsPartOfRelationships: – BibEntity: Dates: – D: 01 M: 01 Text: 1/ 1/2012 Type: published Y: 2012 Identifiers: – Type: isbn-print Value: 9781467318891 Titles: – TitleFull: 2012 IEEE Seventh International Conference on Networking, Architecture & Storage Type: main |
| ResultId | 1 |
Full Text Finder