Abstract
Remote Access Trojan (RAT) is one of the most terrible security threats that organizations face today. At present, two major RAT detection methods are host-based and network-based detection methods. To complement one another’s strengths, this article proposes a phased RATs detection method by combining double-side features (PRATD). In PRATD, both host-side and network-side features are combined to build detection models, which is conducive to distinguishing the RATs from benign programs because that the RATs not only generate traffic on the network but also leave traces on the host at run time. Besides, PRATD trains two different detection models for the two runtime states of RATs for improving the True Positive Rate (TPR). The experiments on the network and host records collected from five kinds of benign programs and 20 famous RATs show that PRATD can effectively detect RATs, it can achieve a TPR as high as 93.609% with a False Positive Rate (FPR) as low as 0.407% for the known RATs, a TPR 81.928% and FPR 0.185% for the unknown RATs, which suggests it is a competitive candidate for RAT detection.
Highlights
IntroductionIn recent years, Advanced Persistent Threat (APT) [1] has become the most serious cyber attack
In recent years, Advanced Persistent Threat (APT) [1] has become the most serious cyber attack.It steals confidential information or undermines the information system from a particular organization or company
Two Remote Access Trojan (RAT) detection models are included in PRATD and used for the different runtime states of RAT
Summary
In recent years, Advanced Persistent Threat (APT) [1] has become the most serious cyber attack. It steals confidential information or undermines the information system from a particular organization or company. As a kind of high-latency, high-hidden, high-harm malware, Trojan plays an indispensable role in the APT attacks. A Trojan called Remote Access Trojan (RAT) that is often used by APT attackers, which can give them interactive access to a victim’s computer and steal confidential data [2,3]. Is it hard for ordinary users to detect implanted RAT, and it is difficult for administrators to find such malware
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have