Skip to main content

The Trojan Horse Detection Technology Based on Support Vector Machine

  • Conference paper
Recent Progress in Data Engineering and Internet Technology

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 157))

  • 1587 Accesses

Abstract

This paper presents a Trojan-detection system model based on Support Vector Machine. First, while monitoring the system, this strategy establish system call sequences in accordance with its system calls function in the system, and convert into supporting vector machine-readable tags, and place in the data warehouse for support vector machine extracted as the feature vectors. And to determine the abnormal behavior of testing procedures to determine whether it is Trojan by classifying the detected program behaviors based on the support vector machine classifier. Experimental results show that, comparing with the existing technology of Trojan horse detection, this method has better performance in detection time and detection of known and unknown Trojan horse attacks. Besides, it has higher accuracy, and takes up very little system resource.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Eskin, E., Amold, A., Prerau, M., et al.: A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data. In: Data Mining for Security Applications (2002)

    Google Scholar 

  2. You, C., Hua-wei, S.: A High Performance Oriented Lightweight Intrusion Detection System Feature Selection Algorithm. Computer Journal 30, 1398–1407 (2007)

    Google Scholar 

  3. Hughes, L.A., DeLone, G.J.: Viruses, Worms, and Trojan Horses: Serious Crimes, Nuisance, or Both? Social Science Computer Review 25, 78–98 (2007)

    Article  Google Scholar 

  4. Lee, W., Dong, X.: Information-Theoretic measures for anomaly detection. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, pp. 130–143. IEEE Computer Society Press, Oakland (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jie Qin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Qin, J., Yan, Hj. (2012). The Trojan Horse Detection Technology Based on Support Vector Machine. In: Gaol, F. (eds) Recent Progress in Data Engineering and Internet Technology. Lecture Notes in Electrical Engineering, vol 157. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28798-5_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28798-5_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28797-8

  • Online ISBN: 978-3-642-28798-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics