DocumentCode :
588799
Title :
Trojan Detection Based on Network Flow Clustering
Author :
Xiaochen Zhang ; Shengli Liu ; Lei Meng ; Yunfang Shi
Author_Institution :
Zhengzhou Inst. of Inf. Sci. & Technol., Zhengzhou, China
fYear :
2012
fDate :
2-4 Nov. 2012
Firstpage :
947
Lastpage :
950
Abstract :
Trojan is a threat to network security which poses a serious threat to national security. Through research on Trojan communication process, this paper proposes a data stream clustering method based on packet timestamp. This method uses cluster to compress Trojan communication data stream information, extracts cluster characteristics and then detects Trojans according to the cluster characteristics and correlation between the clusters. The experimental results showed that this method achieved good detection results.
Keywords :
client-server systems; computer network security; invasive software; pattern clustering; C-S structure; IP connection; Trojan communication process; Trojan detection; cluster characteristic extraction; data stream clustering method; national security; network flow clustering; network security; packet timestamp; Algorithm design and analysis; Classification algorithms; Clustering algorithms; Decision trees; Heart beat; Trojan horses; ¡°Heartbeat¡± behavior; Trojan detection; clustering algorithms; network security; timestamp;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Multimedia Information Networking and Security (MINES), 2012 Fourth International Conference on
Conference_Location :
Nanjing
Print_ISBN :
978-1-4673-3093-0
Type :
conf
DOI :
10.1109/MINES.2012.242
Filename :
6405737
Link To Document :
بازگشت