{"created":"2020-09-01T15:28:05.468265+00:00","id":4894,"links":{},"metadata":{"_buckets":{"deposit":"5246b438-0ce5-417f-8ec6-140f3e2f3521"},"_deposit":{"id":"4894","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4894"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4894","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Effective Features for Detection of Remote Access Trojans","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"As companies in every industry sector around theglobe have lost, stolen or leaked their sensitive data tothe outside world every year, the security ofconfidential information is increasingly important.Remote Access Trojans (RATs) are used to invade avictim’s PC through targeted attacks. In the previousworks features for detection of RATs were selected bythe author who may be an expert in the relateddomain, and any feature selection method was notused. In this paper one of the feature selectionmethods, Information Gain is applied for evaluatingand ranking features. It aims not only to reduce costsand resources for building detection system of remoteAccess Trojan but also to add the advantages of usingfeature selection method and propose new featureswhile maintaining high accuracy. Our approachachieves 99% accuracy together with the FNR of0.091 by Decision Trees algorithm, and thisexperimental result shows that our proposed featuresare effective to detection system of RATs."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-12"}],"displaytype":"preview","filename":"proceeding_total-pages-328-334.pdf","filesize":[{"value":"3253 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4894/files/proceeding_total-pages-328-334.pdf"},"version_id":"ef2082aa-6a6f-4c1c-9712-63149a63c80f"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fifteenth International Conference on Computer Applications(ICCA 2017)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Yin, Khin Swe"},{"subitem_authors_fullname":"Khine, May Aye"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2017-02-16"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/795"},"item_title":"Effective Features for Detection of Remote Access Trojans","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-12","publish_status":"0","recid":"4894","relation_version_is_last":true,"title":["Effective Features for Detection of Remote Access Trojans"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T03:34:37.990338+00:00"}