An Efficient Remote Control Trojan Horse Detection Method
A detection method and Trojan horse technology, applied in the information field, can solve the problem that remote control Trojan horse detection is not necessarily effective
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] S1. The remote control Trojan detection method mainly includes the following four modules: a flow collection module, a behavior feature extraction module, a classifier creation module, and a classifier optimization evaluation module.
[0033] S2. The traffic collection module is responsible for collecting the data sets required for method creation and detection;
[0034] S21. Traffic collection: Use NetAnalyzer and wireshark software to capture the communication traffic of seven computers (two of which are implanted with Trojan horse programs) in a controlled environment. These communication traffic can be divided into three types, one is collected at home and abroad 24 types of remote control Trojan horse sample communication traffic, the second is the communication traffic of 10 known normal application software, and the third is mixed network traffic. In the end, we collected a total of 291.17 hours of communication traffic, which were stored in .pcap file format.
...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


