2015 IEEE 29th International Conference on Advanced Information Networking and Applications 2015
DOI: 10.1109/aina.2015.257
|View full text |Cite
|
Sign up to set email alerts
|

An Approach to Detect Remote Access Trojan in the Early Stage of Communication

Abstract: As data leakage accidents occur every year, the security of confidential information is becoming increasingly important. Remote Access Trojans (RAT), a kind of spyware, are used to invade the PC of a victim through targeted attacks. After the intrusion, the attacker can monitor and control the victim's PC remotely, to wait for an opportunity to steal the confidential information. Since it is hard to prevent the intrusion of RATs completely, preventing confidential information being leaked back to the attacker … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0
1

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(14 citation statements)
references
References 7 publications
0
13
0
1
Order By: Relevance
“…Transport Layer features, e.g., communications time, "heartbeat" packet to keep-alive, upload and download traffic [6] .…”
Section: Detection Model Designmentioning
confidence: 99%
“…Transport Layer features, e.g., communications time, "heartbeat" packet to keep-alive, upload and download traffic [6] .…”
Section: Detection Model Designmentioning
confidence: 99%
“…Unfortunately this may not be possible for a variety of reasons. For instance, a company that discovers and promptly contains an infection [14] may not allow communications for the sake of analysis, especially where there is a suspicion of a targeted attack-as such communications would reveal that the target has been reached. A server counterpart may also decline connection attempts when the analysis takes place from an unexpected network origin or time frame.…”
Section: Introductionmentioning
confidence: 99%
“…The communication between RAT master (client) and its slave (server) is either direct which initiated by RAT client or reverse which started by RAT server. Most RATs are conventionally using reverse connections as network security policies prevent external connections [9]. Nevertheless, RAT bots can cause severe damages to infected machines without being detected [10]- [12].…”
Section: Introductionmentioning
confidence: 99%