Pan Ming. (2009). Research on detecting mechanism for Trojan horse based on PE file. Mémoire de maîtrise, Université du Québec à Chicoutimi.
As malicious programs, Trojan horses have become a huge threat to computer networks security. Trojan horses can easily cause loss, damage or even theft of data because they are usually disguised as something useful or desirable, and are always mistakenly activated by computer users, corporations and other organizations. Thus, it is important to adopt an effective and efficient method to detect the Trojan horses, and the exploration of a new method of detection is of greater significance.
Scientists and experts have tried many approaches to detecting Trojan horses since they realized the harms of the programs. Up to now, these methods fall mainly into two categories . The first category is to detect Trojan horses through checking the port of computers since the Trojan horses send out message through computer ports . However, these methods can only detect the Trojan horses that are just working when detected. The second class is to detect Trojan horses by examining the signatures of files  , in the same way as people deal with computer virus. As new Trojan horses may contain unknown signatures, methods in this category may not be effective enough when new and unknown Trojan horses appear continuously, sending out unknown signatures that escape detection.
For the above-mentioned reasons, without exception, there are limitations in the existing methods if the un-awakened and unknown Trojan horses are to be detected. This thesis proposes a new method that can detect un-awakened and unknown Trojan horses- the detection by using of a file's static characteristics. This thesis takes PE file format as the object of the research, because approximately 75% of personal computers worldwide are installed the Microsoft Windows , and that Trojan horses usually exist as a Portable Executable (PE) file in the Windows platform. Based on the (PE) file format, my research gets all the static information of each part of PE file which is characteristic of a file. Then, this static information is analyzed by the intelligent information processing techniques. Next, a detection model is established to estimate whether a PE file is a Trojan horse. This model can detect the unknown Trojan horses by analyzing static characteristics of a file. The information that is used to verify detecting model is new and unknown to the detecting model; in other words, the information is not used during the training of the model.
The thesis is organized as follows. First, this thesis discusses the limitations of traditional detection techniques, related works of research, and a new method to detect Trojan horse based on file's static information. Second, the thesis focuses on the research of the Trojan horse detecting models, covering the extracting of the static information from PE file, choice of intelligent information processing techniques, and setting up the Trojan horse detecting model. Lastly, the thesis discusses the direction of future research in this field.
|Type de document:||Thèse ou mémoire de l'UQAC (Mémoire de maîtrise)|
|Lieu de publication:||Chicoutimi|
|Programme d'étude:||Maîtrise en informatique|
|Nombre de pages:||52|
|Sujets:||Sciences naturelles et génie > Sciences mathématiques > Informatique|
|Département, module, service et unité de recherche:||Départements et modules > Département d'informatique et de mathématique > Programmes d'études de cycles supérieurs en informatique|
|Directeur(s), Co-directeur(s) et responsable(s):||Fan, Xiumei|
|Mots-clés:||Virus informatiques, Systèmes de détection d'intrusion (Sécurité informatique), Fichiers (Informatique)|
|Déposé le:||01 janv. 2009 12:34|
|Dernière modification:||20 sept. 2011 15:37|
Éditer le document (administrateurs uniquement)