Research Article
Abnormal Behavior Detection to Identify Infected Systems Using the APChain Algorithm and Behavioral Profiling
Table 7
Pharming attack detection algorithm.
| Algorithm 4. Pharming attack detection |
| / T set of packets / | / C set of APChain fields / | ā | Function Behavioral_Profiling (T): | while (not stop condition) do | | for T is not null do | if then | | | if then | / Analysis of connections to websites suspected as pharming and connections to a specific target IP address / | | return pharming | ā | Function n-gram(C): | if then | / Accuracy is increased using the n-gram algorithm / | return true |
|
|