Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 1 of 1
Full-Text Articles in Entire DC Network
Multiple Logs Analysis For Detecting Zero-Day Backdoor Trojans, Sinchai Caravut
Multiple Logs Analysis For Detecting Zero-Day Backdoor Trojans, Sinchai Caravut
ETD Archive
Trojan horses commonly known as "Trojans" are the computer threats that have been recently causing trouble on the internet because of their new propagation techniques. Social engineering has become a popular strategy to deceive people to run the attacker's malicious programs. Trojans use this technique to propagate themselves from a computer or a network to others, thus making them hard to prevent. The only way to keep computers and networks safe from them is by detecting them as soon as possible. Because of their quiet behavior, it's hard to detect by only IDS (Intrusion Detection System) log analysis therefore, multiple …