Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

Cleveland State University

ETD Archive

2008

Articles 1 - 1 of 1

Full-Text Articles in Entire DC Network

Multiple Logs Analysis For Detecting Zero-Day Backdoor Trojans, Sinchai Caravut Jan 2008

Multiple Logs Analysis For Detecting Zero-Day Backdoor Trojans, Sinchai Caravut

ETD Archive

Trojan horses commonly known as "Trojans" are the computer threats that have been recently causing trouble on the internet because of their new propagation techniques. Social engineering has become a popular strategy to deceive people to run the attacker's malicious programs. Trojans use this technique to propagate themselves from a computer or a network to others, thus making them hard to prevent. The only way to keep computers and networks safe from them is by detecting them as soon as possible. Because of their quiet behavior, it's hard to detect by only IDS (Intrusion Detection System) log analysis therefore, multiple …