2019
DOI: 10.11591/ijece.v9i3.pp2177-2184
|View full text |Cite
|
Sign up to set email alerts
|

Optimal remote access trojans detection based on network behavior

Abstract: <p>RAT is one of the most infected malware in the hyper-connected world. Data is being leaked or disclosed every day because new remote access Trojans are emerging and they are used to steal confidential data from target hosts. Network behavior-based detection has been used to provide an effective detection model for Remote Access Trojans. However, there is still short comings: to detect as early as possible, some False Negative Rate and accuracy that may vary depending on ratio of normal and malicious R… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…In [16][17] the machine learning-based methods for cyberattacks detection are presented. Network behavior-based detection techniques are presented in [18], where the investigation of a large amount of normal traffic and amount of malicious traffic is provided. In [19,20] the systematic review of aspects of DDoS attacks detection and new frameworks are investigated.…”
Section: Methodsmentioning
confidence: 99%
“…In [16][17] the machine learning-based methods for cyberattacks detection are presented. Network behavior-based detection techniques are presented in [18], where the investigation of a large amount of normal traffic and amount of malicious traffic is provided. In [19,20] the systematic review of aspects of DDoS attacks detection and new frameworks are investigated.…”
Section: Methodsmentioning
confidence: 99%