Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "5246b438-0ce5-417f-8ec6-140f3e2f3521"}, "_deposit": {"id": "4894", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4894"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4894", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Effective Features for Detection of Remote Access Trojans", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "As companies in every industry sector around theglobe have lost, stolen or leaked their sensitive data tothe outside world every year, the security ofconfidential information is increasingly important.Remote Access Trojans (RATs) are used to invade avictim’s PC through targeted attacks. In the previousworks features for detection of RATs were selected bythe author who may be an expert in the relateddomain, and any feature selection method was notused. In this paper one of the feature selectionmethods, Information Gain is applied for evaluatingand ranking features. It aims not only to reduce costsand resources for building detection system of remoteAccess Trojan but also to add the advantages of usingfeature selection method and propose new featureswhile maintaining high accuracy. Our approachachieves 99% accuracy together with the FNR of0.091 by Decision Trees algorithm, and thisexperimental result shows that our proposed featuresare effective to detection system of RATs."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-12"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "proceeding_total-pages-328-334.pdf", "filesize": [{"value": "3253 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 3253000.0, "url": {"url": "https://meral.edu.mm/record/4894/files/proceeding_total-pages-328-334.pdf"}, "version_id": "ef2082aa-6a6f-4c1c-9712-63149a63c80f"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifteenth International Conference on Computer Applications(ICCA 2017)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Yin, Khin Swe"}, {"subitem_authors_fullname": "Khine, May Aye"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2017-02-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/795"}, "item_title": "Effective Features for Detection of Remote Access Trojans", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004894", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-12"}, "publish_date": "2019-07-12", "publish_status": "0", "recid": "4894", "relation": {}, "relation_version_is_last": true, "title": ["Effective Features for Detection of Remote Access Trojans"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Effective Features for Detection of Remote Access Trojans

http://hdl.handle.net/20.500.12678/0000004894
http://hdl.handle.net/20.500.12678/0000004894
eda60f47-a21b-4331-a95b-892a6a0b0353
5246b438-0ce5-417f-8ec6-140f3e2f3521
None
Preview
Name / File License Actions
proceeding_total-pages-328-334.pdf proceeding_total-pages-328-334.pdf (3253 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:28:06.844633
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL