2012 IEEE Seventh International Conference on Networking, Architecture, and Storage 2012
DOI: 10.1109/nas.2012.10
|View full text |Cite
|
Sign up to set email alerts
|

A General Framework of Trojan Communication Detection Based on Network Traces

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 14 publications
0
9
0
Order By: Relevance
“…Some existing behavior detection techniques for finding the remote control of malware have been proposed [10], [11]. S.Li et al proposed a detection technique, Manto [11], for finding Trojan horses based on the features of their communications, such as the directions and intervals of their packets on a connection and the number of connections between a server and a client. Since RATs are modern type of Trojan horse, Manto should be able to extract RAT connections based on the features.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Some existing behavior detection techniques for finding the remote control of malware have been proposed [10], [11]. S.Li et al proposed a detection technique, Manto [11], for finding Trojan horses based on the features of their communications, such as the directions and intervals of their packets on a connection and the number of connections between a server and a client. Since RATs are modern type of Trojan horse, Manto should be able to extract RAT connections based on the features.…”
Section: Related Workmentioning
confidence: 99%
“…Many of its features are shared, as shown in Table II. Manto [11], the existing detection technique for Trojan communications, defines them as features 1, 2, 3, 4, and 5. However, roughly half of RATs do not show the features 2 and 5 in our analysis.…”
Section: A Ratmentioning
confidence: 99%
“…RATs can automatically send connection requests to the attacker's Command and Control (C&C) server from the Intranet, in order to build an encrypted tunnel to connect two sides through the firewall. Therefore, some of the existing policies like port filtering and Deep Packet Inspection (DPI) [2], [3], [14] are not enough to prevent data leakage problems caused by targeted attacks [3]. The Port filtering policy is limited since RAT can use port 80 or 443 as in some normal sessions.…”
Section: Introductionmentioning
confidence: 99%
“…Li et al [3] propose a detection system to detect Trojans by their original network behaviors, which achieves an accuracy of more than 90%. This system extracts network features from a session that begins from a SYN packet in the TCP three-way handshake and ends with a FIN/RST packet.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation