UB ScholarWorks

Detection of Trojan horse by Analysis of System Behavior and Data Packets

Show simple item record

dc.contributor.author Abuzneid, Abdelshakour A.
dc.contributor.author Gudipati, Vamshi Krishna
dc.contributor.author Kumar, Varun
dc.contributor.author Vetwal, Aayush
dc.contributor.author Adeniyi, Anjorin
dc.date.accessioned 2015-04-27T18:06:34Z
dc.date.available 2015-04-27T18:06:34Z
dc.date.issued 2015-03-27
dc.identifier.uri https://scholarworks.bridgeport.edu/xmlui/handle/123456789/1181
dc.description.abstract Trojan horse is said to be one of the most serious threats to computer security. A Trojan horse is an executable file in the Windows operating system. These executable files will have certain static and runtime characteristics. Multiple Windows system process will be called whenever a Trojan horse tries to execute any operation on the system. In this paper a new Trojan horse detection method by using Windows dynamic link libraries to identify system calls from a Trojan horses is explicated. Process explorer is used to identify the malicious executable and to determine whether it is a Trojan or not. Further, an attempt is made to study the network behavior after a Trojan horse is executed using wire shark. en_US
dc.language.iso en_US en_US
dc.subject Trojan virus en_US
dc.subject Windows operating system en_US
dc.subject Virus detection en_US
dc.subject Computer science en_US
dc.title Detection of Trojan horse by Analysis of System Behavior and Data Packets en_US
dc.type Presentation en_US
dc.institute.department School of Engineering en_US
dc.institute.name University of Bridgeport en_US
dc.event.location Bridgeport, CT en_US
dc.event.name Faculty Research Day en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search ScholarWorks


Advanced Search

Browse

My Account