Security

An Efficient Trojan Horse Classification (ETC)

Download Now Free registration required

Executive Summary

For the past few years, malware or also known as malicious code is seen as one of the biggest threats of the cyber attacks. It has caused lot of damages, loss of money and productivity to many organizations and end users. Malicious code can be divided into many categories such as viruses, worms and Trojan horses. Each of these categories has it owns implications and threats, and Trojan horse has been chosen as the domain of this research paper. Prior to the formation of a new Trojan horse detection model, an in-depth study and investigation of the existing Trojan horse classification is presented in this paper. Surprisingly, not much research related with Trojan horse has been done.

  • Format: PDF
  • Size: 1064.96 KB