Author Login Editor-in-Chief Peer Review Editor Work Office Work

Computer Engineering ›› 2011, Vol. 37 ›› Issue (20): 123-126. doi: 10.3969/j.issn.1000-3428.2011.20.043

• Networks and Communications • Previous Articles     Next Articles

Tunnel Trojan Detection Method Based on Operation Behavior

SUN Hai-tao, LIU Sheng-li, CHEN Jia-yong, MENG Lei   

  1. (Institute of Information Engineering, PLA Information Engineering University, Zhengzhou 450002, China)
  • Received:2011-05-10 Online:2011-10-20 Published:2011-10-20

基于操作行为的隧道木马检测方法

孙海涛,刘胜利,陈嘉勇,孟 磊   

  1. (解放军信息工程大学信息工程学院,郑州 450002)
  • 作者简介:孙海涛(1983-),男,硕士研究生,主研方向:网络安全;刘胜利,副教授;陈嘉勇,博士研究生;孟 磊,硕士研究生
  • 基金资助:
    国家“863”计划基金资助项目(2008AA01Z420)

Abstract: Some Trojans use HTTP tunnel to pass through a variety of network security devices, which poses a serious threat to current network security. This paper presents a new method to detect the HTTP tunneling Trojans by using operation behavior characteristics. The difference between normal HTTP session and Trojan operation session with HTTP tunneling are depicted by six statistics eigenvalues, and C4.5 decision tree classification algorithm in data mining is introduced to classify the two sessions. Experimental results show that the method can efficiently detect many known HTTP tunnel Trojans.

Key words: HTTP tunnel, network session, session characteristic, Trojan detection, C4.5 decision tree

摘要: 木马通常利用HTTP隧道技术突破防护设备,对网络安全造成威胁。针对该问题,提出一种利用木马操作行为检测网络中HTTP隧道木马的方法。该方法通过6个统计特征描述正常的HTTP会话,采用HTTP隧道技术发现木马操作之间的差别,利用数据挖掘中C4.5决策树分类算法对2种会话进行分类。实验结果表明,该方法能检测多种已知的HTTP隧道木马。

关键词: HTTP隧道, 网络会话, 会话特征, 木马检测, C4.5决策树

CLC Number: