p.423
p.427
p.431
p.435
p.439
p.443
p.448
p.452
p.456
Applied-Information Technology with Trojan Horse Detection Method Based on C5.0 Decision Tree
Abstract:
This paper discusses the Trojan horse detection methods by analysis on Portable Executable File Format through which we can get much useful information. In order to deal with the information extracted from Portable Executable file, our methods constructed a decision tree based on C5.0 decision tree algorithm. Our approach can be divided into two steps. Firstly, we extracted some features from Portable Executable file by a portable executable attribute filter. Secondly, we handled the features extracted and then construct a classifier to identify the Trojan horse. The original in this paper is the application of a more effective algorithm C5.0 to construct the decision tree.
Info:
Periodical:
Pages:
439-442
Citation:
Online since:
April 2014
Authors:
Keywords:
Price:
Сopyright:
© 2014 Trans Tech Publications Ltd. All Rights Reserved
Share:
Citation: