2017 12th Asia Joint Conference on Information Security (AsiaJCIS) 2017
DOI: 10.1109/asiajcis.2017.13
|View full text |Cite
|
Sign up to set email alerts
|

A Practical Experiment of the HTTP-Based RAT Detection Method in Proxy Server Logs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…The alternative approach is classification based on network logs such as DNS records, NetFlow or proxy server logs. There are several methods which use NetFlow [2], [3], DNS records [13], [14], [15], [16] and proxy server logs [4], [5], [17], [18], [19], [20], [21], [22], [23], [24]. Some approaches focus on NN to detect basic network attacks [25], [26], [27].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The alternative approach is classification based on network logs such as DNS records, NetFlow or proxy server logs. There are several methods which use NetFlow [2], [3], DNS records [13], [14], [15], [16] and proxy server logs [4], [5], [17], [18], [19], [20], [21], [22], [23], [24]. Some approaches focus on NN to detect basic network attacks [25], [26], [27].…”
Section: Related Workmentioning
confidence: 99%
“…There are many behavior-based detection methods which extract the features of malicious traffic. These methods extract the features of DbD attacks [1] or C&C traffic [2], [3], [4], and attempt to detect new malicious traffic. Many previous methods, 1 National Defense Academy, Yokosuka, Kanagawa 239-8686, Japan a) mim@nda.ac.jp however, require knowledge of how to extract feature vectors.…”
Section: Introductionmentioning
confidence: 99%
“…Mimura et al [1] categorized proxy server logs by FQDNs to extract feature vectors, and proposed a RAT (Remote Access Trojan or Remote Administration Tool) detection method using machine learning techniques. This method uses the characteristic that RATs continues to access the same path regularly.…”
Section: Analyzing Proxy Server Logsmentioning
confidence: 99%
“…IDS uses fixed strings or regular expression to describe their signatures. Malware used in APT attacks, however, communicates via a standard protocol, and attempts to imitate normal http communication hidema@nda.ac.jp (e.g., Plug X, Emdivi) [1], [2]. Therefore, it is difficult to describe the signatures.…”
Section: Introductionmentioning
confidence: 99%
“…Most RATs are conventionally using reverse connections as network security policies prevent external connections [9]. Nevertheless, RAT bots can cause severe damages to infected machines without being detected [10]- [12]. In addition, intruders can control more than one machine independently from the host's location.…”
Section: Introductionmentioning
confidence: 99%