【摘 要】
:
Aiming at the problem that more popular network application and more complicated network traffic bring big challenge to current Trojan detecting technique,communication behavior of remote access Trojan (RAT) is analyzed,traffic features\' different perf
【机 构】
:
School of Information, Renmin University of China, Beijing 100872, China;School of Information Scien
论文部分内容阅读
Aiming at the problem that more popular network application and more complicated network traffic bring big challenge to current Trojan detecting technique,communication behavior of remote access Trojan (RAT) is analyzed,traffic features\' different performance in different communication sub-periods is discussed,and an integrated Trojan detecting model based on period feature statistics is presented.Feature statistics based on subperiods and whole session (WS) respectively can increase the gap and classification ability of traffic features.The weighted integrated classifier can take full use of each base classifier\'s advantage and compensate for each other\'s weaknesses,therefore can strong system\'s detecting and generalization capability.Experiment result shows that this system can recognize Trojan traffics from many kinds of normal traffic effectively.
其他文献
With the advantages of low cost and high mobility,unmanned aerial vehicles (UAVs) have played an important role in wireless communication.We investigate a UAV-enabled mobile relaying system,where a UAV is used as a mobile relay to assist in the communicat
Arbitrated quantum signature (AQS) is an important branch in quantum cryptography to authenticate quantum information,and cryptanalysis on AQS protocols helps to evaluate and improve security of AQS.Recently,it is discovered that an AQS protocol based on
Low earth orbit (LEO) satellite network provides global coverage and supports a wide range of services.However,due to the rapid changes and energy-limitation of satellites,how to meet the demand of the quality of service (QoS) from ground traffic and prol
Recently,physical layer security in wireless communication system attracts much attention,and the reconciliation protocol plays an important role in the final secure key distillation,since the secret keys extracted from the realistic characteristics of th
Paxos is a well-known distributed algorithm that provides strong consistency.However,the original Paxos has several shortcomings,including those of slow elections,redundant communications and excessive traffic of the coordinator node.In order to tackle th
Hybrid analog-digital beamforming is recognized as a promising solution for a practical implementation of massive multiple-input multiple-output (MIMO) systems based on millimeter-wave (mmWave) technology.In view of the overwhelming hardware cost and exce
Mobility prediction is one of the promising technologies for improving quality of service (QoS) and network resource utilization.In future heterogeneous networks (HetNets),the network topology will become extremely complicated due to the widespread deploy
Updatable block-level message-locked encryption (MLE) can efficiently update encrypted data,and public auditing can verify the integrity of cloud storage data by utilizing a third party auditor (TPA).However,there are seldom schemes supporting both updata
Using relay in the wireless communication network is an efficient way to ensure the data transmission to the distant receiver.In this paper,a dynamic power control (DPC) approach is proposed for the amplify-and-forward (AF) relay-aided downlink transmissi
Real-time graphics processing is all along a crucial task of mobile device,and it is conventionally supported by programmable graphics processing unit (GPU).These GPUs are designed to flexibly support vertex and pixel processing with classic techniques su