Abstract
For the question of lacking Trojans structure analyzing and relationship research of behavior sequence combination in current plan of active defense, the paper studies principles of traditional anti-virus and active defense, then it modularizes the commonality of Trojans by analyzing their structure, generalizes breakthrough methods and proposes two analyzing tactics. With the help of the two tactics and module belonging of Trojan behavior sequence analyzing, the relevance of message sequence and typical Trojans behavior sequences are studied. At last we can effectively improve the ability of the active defense to identify Trojans through experiments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Elisan CC (2012) Malware, rootkit and botnets a beginner’s guide. McGraw-Hill/Osborne Media, NewYork
Jiang X (2010) Research on open source project feature code anti-virus and active defense avoiding. Shanghai Jiao Tong University, Shanghai
Liu H, Wang Z, Guo Y (2012) An IPv6 proactive network defense model based on multi-homing hopping. J Electron Inf Technol 34(7):1715–1720
Xun K, Liao X (2012) Research on proactive defense model based on virtualization technology. Microelectron comput 29(12):189–192
Fang S, Chen S, Tang F (2010) Applied research of active defense technology in access control. Comput Technol Dev 20(11):150–154
Lin M (2013) Based on Windows7 Trojan connection technology and viability studies, Master’s thesis, Xi’an University of Electronic Science and Technology
Luo X, Wang K, Lianghua X (2009) On active defence technology based on behaviour analyzing and its vulnerabilities. Comput Appl Softw 26(7):269–271
Wang F, Zhou D (2011) Design and implementation of active defense system based on white list. Comput Eng Des 32(7):2241–2245
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tao, L., Shen, J., Hu, P. (2015). An Intelligent Active Defense Method Against Trojan Based on Behavior Sequence. In: Deng, Z., Li, H. (eds) Proceedings of the 2015 Chinese Intelligent Automation Conference. Lecture Notes in Electrical Engineering, vol 338. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-46466-3_51
Download citation
DOI: https://doi.org/10.1007/978-3-662-46466-3_51
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-46465-6
Online ISBN: 978-3-662-46466-3
eBook Packages: EngineeringEngineering (R0)