DocumentCode :
3585484
Title :
Analysis of Trojan Horse Events by Query of Vulnerability Information in Searching Engines
Author :
Xianghui Zhao ; Hui Liu ; Geng Xue ; Wei Cao
Author_Institution :
China Inf. Technol. Security Evaluation Center, Beijing, China
Volume :
2
fYear :
2014
Firstpage :
268
Lastpage :
271
Abstract :
Trojan Horse is one of the most common and most serious attacking approaches by hackers in information security. It is important to analyze and predict this type of attack events and then take appropriate counter-measures accordingly. However, it is difficult to have a deep analysis of the attacks only based on Trojan Horse event information itself. In this paper, we propose a new analysis method by comparing the life cycle of Trojan Horse events in China with the life cycle of queries about their exploited vulnerability in search engines. We find that the peak of query cycle is ahead of the peak of attack events. The result suggests that in China, the Trojan Horse attacks are conducted mainly by amateur hackers, rather than professional hackers. The result is also helpful for prediction of Trojan Horse attacks and then applying counter-measures.
Keywords :
invasive software; query processing; search engines; Trojan horse attacks; Trojan horse events analysis; amateur hackers; attack events; information security; professional hackers; query cycle; searching engines; vulnerability information query; Computer hacking; Computers; Market research; Search engines; Trojan horses; Web pages; Trojan Horse; analysis; life-cycle; search engine;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence and Design (ISCID), 2014 Seventh International Symposium on
Print_ISBN :
978-1-4799-7004-9
Type :
conf
DOI :
10.1109/ISCID.2014.273
Filename :
7081986
Link To Document :
بازگشت