Applied-Information Technology with Trojan Horse Detection Method Based on C5.0 Decision Tree

Article Preview

Abstract:

This paper discusses the Trojan horse detection methods by analysis on Portable Executable File Format through which we can get much useful information. In order to deal with the information extracted from Portable Executable file, our methods constructed a decision tree based on C5.0 decision tree algorithm. Our approach can be divided into two steps. Firstly, we extracted some features from Portable Executable file by a portable executable attribute filter. Secondly, we handled the features extracted and then construct a classifier to identify the Trojan horse. The original in this paper is the application of a more effective algorithm C5.0 to construct the decision tree.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

439-442

Citation:

Online since:

April 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Y.H. Zhao, Y.Z. and H.P. Yan: Journal of Computer Applications Vol. 40(2013), p.122.

Google Scholar

[2] S.C. Li, X.C. Yu, Y. Z Zhang, J.X. and Y.P. Wang: 2012 IEEE Seventh International Conference on Networking, Architecture, and Storage (2012), P. 49.

Google Scholar

[3] D. Devi, S. Nandi: International Journal of Computer Theory and Engineering Vol. 14(2013), p.476.

Google Scholar

[4] Y.S. Choi, I.K. Kim, J.T. Oh and J.C. Ryou: International Symposium on Computer Science and its Applications(2008), p.28.

Google Scholar

[5] M. Dai, Y.L. Huang and W. Wang: Computer Engineering Vol. 32(2006), p.198.

Google Scholar

[6] S.G. Tang: 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery(2009), p.311.

Google Scholar

[7] W.W. Huang, J.W. Ye and H.L. Zhang: Intelligent Computer and Applications Vol. 1(2011), p.32.

Google Scholar

[8] F.Y. Zhang, D. Qi and J.L. Hu: Journal of South China University of Technology Vol. 39(2011), p.68.

Google Scholar

[9] G. Duan: Encryption and Decryption Third Edition(Publishing House of Electronics Industry, Bei Jing 2008).

Google Scholar

[10] Information on http: /rulequest. com/see5-info. html.

Google Scholar

[11] A. Moser, C. Kruegel and E. Kirda: 23rd Annual Computer Security Applications Conference(2007), p.421.

Google Scholar