DocumentCode
588799
Title
Trojan Detection Based on Network Flow Clustering
Author
Xiaochen Zhang ; Shengli Liu ; Lei Meng ; Yunfang Shi
Author_Institution
Zhengzhou Inst. of Inf. Sci. & Technol., Zhengzhou, China
fYear
2012
fDate
2-4 Nov. 2012
Firstpage
947
Lastpage
950
Abstract
Trojan is a threat to network security which poses a serious threat to national security. Through research on Trojan communication process, this paper proposes a data stream clustering method based on packet timestamp. This method uses cluster to compress Trojan communication data stream information, extracts cluster characteristics and then detects Trojans according to the cluster characteristics and correlation between the clusters. The experimental results showed that this method achieved good detection results.
Keywords
client-server systems; computer network security; invasive software; pattern clustering; C-S structure; IP connection; Trojan communication process; Trojan detection; cluster characteristic extraction; data stream clustering method; national security; network flow clustering; network security; packet timestamp; Algorithm design and analysis; Classification algorithms; Clustering algorithms; Decision trees; Heart beat; Trojan horses; ¡°Heartbeat¡± behavior; Trojan detection; clustering algorithms; network security; timestamp;
fLanguage
English
Publisher
ieee
Conference_Titel
Multimedia Information Networking and Security (MINES), 2012 Fourth International Conference on
Conference_Location
Nanjing
Print_ISBN
978-1-4673-3093-0
Type
conf
DOI
10.1109/MINES.2012.242
Filename
6405737
Link To Document