Integrated Trojan detecting model based on period feature statistics

来源 :中国邮电高校学报(英文版) | 被引量 : 0次 | 上传用户:chanck5800
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Aiming at the problem that more popular network application and more complicated network traffic bring big challenge to current Trojan detecting technique,communication behavior of remote access Trojan (RAT) is analyzed,traffic features\' different performance in different communication sub-periods is discussed,and an integrated Trojan detecting model based on period feature statistics is presented.Feature statistics based on subperiods and whole session (WS) respectively can increase the gap and classification ability of traffic features.The weighted integrated classifier can take full use of each base classifier\'s advantage and compensate for each other\'s weaknesses,therefore can strong system\'s detecting and generalization capability.Experiment result shows that this system can recognize Trojan traffics from many kinds of normal traffic effectively.
其他文献
With the advantages of low cost and high mobility,unmanned aerial vehicles (UAVs) have played an important role in wireless communication.We investigate a UAV-enabled mobile relaying system,where a UAV is used as a mobile relay to assist in the communicat
Arbitrated quantum signature (AQS) is an important branch in quantum cryptography to authenticate quantum information,and cryptanalysis on AQS protocols helps to evaluate and improve security of AQS.Recently,it is discovered that an AQS protocol based on
Low earth orbit (LEO) satellite network provides global coverage and supports a wide range of services.However,due to the rapid changes and energy-limitation of satellites,how to meet the demand of the quality of service (QoS) from ground traffic and prol
Recently,physical layer security in wireless communication system attracts much attention,and the reconciliation protocol plays an important role in the final secure key distillation,since the secret keys extracted from the realistic characteristics of th
Paxos is a well-known distributed algorithm that provides strong consistency.However,the original Paxos has several shortcomings,including those of slow elections,redundant communications and excessive traffic of the coordinator node.In order to tackle th
Hybrid analog-digital beamforming is recognized as a promising solution for a practical implementation of massive multiple-input multiple-output (MIMO) systems based on millimeter-wave (mmWave) technology.In view of the overwhelming hardware cost and exce
Mobility prediction is one of the promising technologies for improving quality of service (QoS) and network resource utilization.In future heterogeneous networks (HetNets),the network topology will become extremely complicated due to the widespread deploy
Updatable block-level message-locked encryption (MLE) can efficiently update encrypted data,and public auditing can verify the integrity of cloud storage data by utilizing a third party auditor (TPA).However,there are seldom schemes supporting both updata
Using relay in the wireless communication network is an efficient way to ensure the data transmission to the distant receiver.In this paper,a dynamic power control (DPC) approach is proposed for the amplify-and-forward (AF) relay-aided downlink transmissi
Real-time graphics processing is all along a crucial task of mobile device,and it is conventionally supported by programmable graphics processing unit (GPU).These GPUs are designed to flexibly support vertex and pixel processing with classic techniques su