• DocumentCode
    3585484
  • Title

    Analysis of Trojan Horse Events by Query of Vulnerability Information in Searching Engines

  • Author

    Xianghui Zhao ; Hui Liu ; Geng Xue ; Wei Cao

  • Author_Institution
    China Inf. Technol. Security Evaluation Center, Beijing, China
  • Volume
    2
  • fYear
    2014
  • Firstpage
    268
  • Lastpage
    271
  • Abstract
    Trojan Horse is one of the most common and most serious attacking approaches by hackers in information security. It is important to analyze and predict this type of attack events and then take appropriate counter-measures accordingly. However, it is difficult to have a deep analysis of the attacks only based on Trojan Horse event information itself. In this paper, we propose a new analysis method by comparing the life cycle of Trojan Horse events in China with the life cycle of queries about their exploited vulnerability in search engines. We find that the peak of query cycle is ahead of the peak of attack events. The result suggests that in China, the Trojan Horse attacks are conducted mainly by amateur hackers, rather than professional hackers. The result is also helpful for prediction of Trojan Horse attacks and then applying counter-measures.
  • Keywords
    invasive software; query processing; search engines; Trojan horse attacks; Trojan horse events analysis; amateur hackers; attack events; information security; professional hackers; query cycle; searching engines; vulnerability information query; Computer hacking; Computers; Market research; Search engines; Trojan horses; Web pages; Trojan Horse; analysis; life-cycle; search engine;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computational Intelligence and Design (ISCID), 2014 Seventh International Symposium on
  • Print_ISBN
    978-1-4799-7004-9
  • Type

    conf

  • DOI
    10.1109/ISCID.2014.273
  • Filename
    7081986