Title :
A General Framework of Trojan Communication Detection Based on Network Traces
Author :
Li, Shicong ; Yun, Xiaochun ; Zhang, Yongzheng ; Xiao, Jun ; Wang, Yipeng
Author_Institution :
Inst. of Comput. Technol., Beijing, China
Abstract :
Because of the widespread Trojan, Internet users become more and more vulnerable to the threat of information leakage. Traditional techniques of Trojan detection were classified into two main categories: host-based and network-based. Unfortunately, existing techniques are insufficient and limited, because of the following reasons: (1)only uncover the known Trojan while inefficiently detecting novel samples, (2) should be adjusted in a timely fashion even a trivial change is applied, and (3)become computationally more expensive. In our work, we focus on a network behavior based method to address the limitations of previous network-based approaches. We analyze the profile of network behavior at two levels: (i)flow-level, (ii)IP-level. Our approach present two main advantages: (1)capture more detailed information to describe the network behavior profile, (2)consume lower computational overhead. We proposed a system, Manto, which detects Trojan communication with high accuracy using clustering technique. We implement Manto on real-world traces. The evaluation results exhibit that Manto is suitable for detecting Trojan communication amongst the vast amount of network traffic, with over 91% accuracy and less than 3.2% false positive ratio. We confidently regard our approach as a complementary way to the existing network-based techniques for we could address their main shortcomings.
Keywords :
IP networks; Internet; computer network security; invasive software; pattern clustering; telecommunication traffic; IP-level; Internet users; Manto; Trojan communication detection; clustering technique; flow-level; host-based category; network behavior based method; network behavior profile; network traces; network traffic; network-based category; Accuracy; Feature extraction; Internet; Monitoring; Trojan horses; Vectors;
Conference_Titel :
Networking, Architecture and Storage (NAS), 2012 IEEE 7th International Conference on
Conference_Location :
Xiamen, Fujian
Print_ISBN :
978-1-4673-1889-1
DOI :
10.1109/NAS.2012.10