Visible to the public Network Behavioral Features for Detecting Remote Access Trojans in the Early Stage

TitleNetwork Behavioral Features for Detecting Remote Access Trojans in the Early Stage
Publication TypeConference Paper
Year of Publication2017
AuthorsYin, Khin Swe, Khine, May Aye
Conference NameProceedings of the 2017 VI International Conference on Network, Communication and Computing
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5366-3
KeywordsAccuracy, composability, cyber physical systems, False Data Detection, false negative rate, Human Behavior, machine learning, pubcrawl, Remote Access Trojans detection, resilience, Resiliency
Abstract

Nowadays data is always stored in a computer in the hyper-connected world and, a company or an organization or a person can come across financial loss, reputation loss, business disruption and intellectual property loss because of data leakage or data disclosure. Remote Access Trojans are used to invade a victim's PC and collect information from it. There have been signatures for these that have already emerged and defined as malwares, but there is no available signature yet if a malware or a remote access Trojan is a zero-day threat. In this circumstance network behavioral analysis is more useful than signature-based anti-virus scanners in order to detect the different behavior of malware. When the traffic will be cut or stoppedis important in capturing network traffic. In this paper, effective features for detecting RATs are proposed. These features are extracted from the first twenty packets. Our approach achieves 98% accuracy and 10% false negative rate by random forest algorithm.

URLhttps://dl.acm.org/citation.cfm?doid=3171592.3171597
DOI10.1145/3171592.3171597
Citation Keyyin_network_2017