Design of Application to Detect Images Embedded with Malicious Programs
Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 3
Abstract
In today’s world, malware can be propagated to victim systems in an increasingly diverse number of ways. One of these methods involves the passive distribution of malware by embedding in JPEG images which goes on to highlight that even simple images can be manipulated maliciously by criminals. The aim of this paper is to design an application that partially acts as a steganalysis tool to scan, detect and notify the user of the presence of a payload in either one or a set of selected images.it will then proceed to analyze the payload and verify whether it is a malicious program or not. It will also give a brief summarized file analysis of the detected payload. Ultimately, this will help highlight the need to consider images as a potential attack vector and then also offer a corresponding solution to this problem.
A Classifier System for Unwanted Message Filtering From O.S.N User Space
As the use of On-line Social Networks (OSNs) rapidly increases, today there is need to provide users with the facility of controlling the messages posted on their private wall to avoid some unwanted content to be display...
Intrusion Detection in Wireless Network Using Fuzzy Rules
Computer Networks now a days are becoming a basic needs of this era where information sharing is key element for growth. With such use, the level of mischievousness has also grown briskly. Intrusion Detection Systems (ID...
An Overview of Data Mining Techniques and Applications
An Overview of Data Mining Techniques and Applications
Annotation Effective Cad Using Content and Information Extraction
"A large number of enterprises organizations currently generate and share literary descriptions of their own products and services. Such collections of data contain important structured information, which remains more un...
A Secure Approach for Privacy-Preserving in Information Brokering System using Query Forwarding
There is an increasing need for information sharing via on-demand access in different organizations. Information Brokering Systems (IBSs) have been introduced to connect large-scale lightly-associated data sources. This...