Detection of Trojan horse by Analysis of System Behavior and Data Packets

Loading...
Thumbnail Image

Authors

Abuzneid, Abdelshakour A.
Gudipati, Vamshi Krishna
Kumar, Varun
Vetwal, Aayush
Adeniyi, Anjorin

Issue Date

2015-03-27

Type

Presentation

Language

en_US

Keywords

Trojan virus , Windows operating system , Virus detection , Computer science

Research Projects

Organizational Units

Journal Issue

Alternative Title

Abstract

Trojan horse is said to be one of the most serious threats to computer security. A Trojan horse is an executable file in the Windows operating system. These executable files will have certain static and runtime characteristics. Multiple Windows system process will be called whenever a Trojan horse tries to execute any operation on the system. In this paper a new Trojan horse detection method by using Windows dynamic link libraries to identify system calls from a Trojan horses is explicated. Process explorer is used to identify the malicious executable and to determine whether it is a Trojan or not. Further, an attempt is made to study the network behavior after a Trojan horse is executed using wire shark.

Description

Citation

Publisher

License

Journal

Volume

Issue

PubMed ID

DOI

ISSN

EISSN