SeGa: A Trojan Detection Method Combined With Gate Semantics

Author(s):  
Yunying Ye ◽  
Shan Li ◽  
Haihua Shen ◽  
Huawei Li ◽  
Xiaowei Li
Electronics ◽  
2020 ◽  
Vol 9 (11) ◽  
pp. 1894
Author(s):  
Chun Guo ◽  
Zihua Song ◽  
Yuan Ping ◽  
Guowei Shen ◽  
Yuhei Cui ◽  
...  

Remote Access Trojan (RAT) is one of the most terrible security threats that organizations face today. At present, two major RAT detection methods are host-based and network-based detection methods. To complement one another’s strengths, this article proposes a phased RATs detection method by combining double-side features (PRATD). In PRATD, both host-side and network-side features are combined to build detection models, which is conducive to distinguishing the RATs from benign programs because that the RATs not only generate traffic on the network but also leave traces on the host at run time. Besides, PRATD trains two different detection models for the two runtime states of RATs for improving the True Positive Rate (TPR). The experiments on the network and host records collected from five kinds of benign programs and 20 famous RATs show that PRATD can effectively detect RATs, it can achieve a TPR as high as 93.609% with a False Positive Rate (FPR) as low as 0.407% for the known RATs, a TPR 81.928% and FPR 0.185% for the unknown RATs, which suggests it is a competitive candidate for RAT detection.


2019 ◽  
Vol 16 (12) ◽  
pp. 100-110 ◽  
Author(s):  
Lei Zhang ◽  
Youheng Dong ◽  
Jianxin Wang ◽  
Chaoen Xiao ◽  
Ding Ding

2014 ◽  
Vol 701-702 ◽  
pp. 1013-1017 ◽  
Author(s):  
Meng Meng Zhao ◽  
Lian Hai Wang

Trojan detection plays an important role in the discovery and treatment of Trojans. Acquisition and analysis of memory mirroring is a new research topic of computer live forensics. Computer forensics often need Trojan detection to determine whether target machine has been controlled. This paper proposed a Trojan detection method based on computer live forensics. Construct probabilistic fuzzy cognitive map(PFCM) through analysis of memory mirroring, use memory mirroring Trojan detection algorithm, calculate the probability of the existence of Trojan. The results showed that this method can effectively determine whether there were Trojan in memory mirroring. Detect Trojans through the analysis of various aspects of memory and numerical computation, proposed method improve the accuracy and reliability of Trojan detection.


2013 ◽  
Vol 18 (5) ◽  
pp. 369-376 ◽  
Author(s):  
Yu Liang ◽  
Guojun Peng ◽  
Huanguo Zhang ◽  
Ying Wang

Sign in / Sign up

Export Citation Format

Share Document