Skip to main content

An Intelligent Active Defense Method Against Trojan Based on Behavior Sequence

  • Conference paper
  • First Online:
Proceedings of the 2015 Chinese Intelligent Automation Conference

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 338))

  • 1742 Accesses

Abstract

For the question of lacking Trojans structure analyzing and relationship research of behavior sequence combination in current plan of active defense, the paper studies principles of traditional anti-virus and active defense, then it modularizes the commonality of Trojans by analyzing their structure, generalizes breakthrough methods and proposes two analyzing tactics. With the help of the two tactics and module belonging of Trojan behavior sequence analyzing, the relevance of message sequence and typical Trojans behavior sequences are studied. At last we can effectively improve the ability of the active defense to identify Trojans through experiments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Elisan CC (2012) Malware, rootkit and botnets a beginner’s guide. McGraw-Hill/Osborne Media, NewYork

    Google Scholar 

  2. Jiang X (2010) Research on open source project feature code anti-virus and active defense avoiding. Shanghai Jiao Tong University, Shanghai

    Google Scholar 

  3. Liu H, Wang Z, Guo Y (2012) An IPv6 proactive network defense model based on multi-homing hopping. J Electron Inf Technol 34(7):1715–1720

    Article  MathSciNet  Google Scholar 

  4. Xun K, Liao X (2012) Research on proactive defense model based on virtualization technology. Microelectron comput 29(12):189–192

    Google Scholar 

  5. Fang S, Chen S, Tang F (2010) Applied research of active defense technology in access control. Comput Technol Dev 20(11):150–154

    Google Scholar 

  6. Lin M (2013) Based on Windows7 Trojan connection technology and viability studies, Master’s thesis, Xi’an University of Electronic Science and Technology

    Google Scholar 

  7. Luo X, Wang K, Lianghua X (2009) On active defence technology based on behaviour analyzing and its vulnerabilities. Comput Appl Softw 26(7):269–271

    Google Scholar 

  8. Wang F, Zhou D (2011) Design and implementation of active defense system based on white list. Comput Eng Des 32(7):2241–2245

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Linbo Tao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tao, L., Shen, J., Hu, P. (2015). An Intelligent Active Defense Method Against Trojan Based on Behavior Sequence. In: Deng, Z., Li, H. (eds) Proceedings of the 2015 Chinese Intelligent Automation Conference. Lecture Notes in Electrical Engineering, vol 338. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-46466-3_51

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-46466-3_51

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-46465-6

  • Online ISBN: 978-3-662-46466-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics