HTTP tunnel Trojan detection based on network behavior
نویسندگان
چکیده
منابع مشابه
Botnet Detection Based on Network Behavior
Current techniques for detecting botnets examine traffic content for IRC commands, monitor DNS for strange usage, or set up honeynets to capture live bots. Our botnet detection approach is to examine flow characteristics such as bandwidth, packet timing, and burst duration for evidence of botnet command and control activity. We have constructed an architecture that first eliminates traffic that...
متن کاملResearch on adaptive network theft Trojan detection model
This paper intends to establish theft Trojans detection system capable of adaptive dynamic feedback learning. To achieve this goal, this paper first studies the characteristics of the network data stream and theft Trojans communication data stream, then introduces support vector machine algorithm based on incremental learning, proposes the construction method of incremental learning samples, de...
متن کاملDetection Method for Network Penetrating Behavior Based on Communication Fingerprint
In order to monitor the use of network transmission software, the network penetrating technique based on encrypted proxy is discussed. By comparing the behavior of related penetration software, the concept of communication fingerprint is introduced to expand the extension of the communication features. The fingerprints database of encrypted proxy software with specific characteristics is constr...
متن کاملC-HTTP - The Development of a Secure, Closed HTTP-based Network on the Internet
We have designed "C-HTTP" which provides secure HTTP communication mechanisms within a closed group of institutions on the Internet, where each member is protected by its own firewall. C-HTTP-based communications are made possible by the following three components: a clientside proxy, a server-side proxy and a C-HTTP name server. A client-side proxy and server-side proxy communicate with each o...
متن کاملOn Reliability Trojan Injection and Detection
Hardware design houses are increasingly outsourcing designs to be manufactured by cheaper fabrication facilities due to economic factors and market forces. This raises the question of trustable manufactured products for highly sensitive applications. One such type of trust issue is the possible incorporation of Trojan circuits into the IC with the goal of tampering with IC reliability and haste...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Energy Procedia
سال: 2011
ISSN: 1876-6102
DOI: 10.1016/j.egypro.2011.11.178