Detection of Behavioral Malware in Delay Tolerant Networks

Abstract

Disruption-tolerant networking has gained currency in the United States due to support from DARPA, which has funded many DTN projects. Disruption may occur because of the limits of wireless radio range, sparsity of mobile nodes, energy resources, attack, and noise. The delay-tolerantnetwork (DTN) model is becoming a viable communication alternative to the traditional infrastructural model for modern mobile consumer electronics equipped with short-range communication technologies such as Bluetooth, NFC, and Wi-Fi Direct. Proximity malware is a class of malware that exploits the opportunistic contacts and distributed nature of DTNs for propagation. Behavioral characterization of malware is an effective alternative to pattern matching in detecting malware, especially when dealing with polymorphic or obfuscated malware. In this paper, we first propose a general behavioral characterization of proximity malware which based on Naive Bayesian model, which has been successfully applied in non-DTN settings such as filtering email spams and detecting bonnets. We identify two unique challenges for extending Bayesian malware detection to DTNs (“insufficient evidence vs. evidence collection risk” and “filtering false evidence sequentially and distributedly”), and propose a simple yet effective method, look-ahead, to address the challenges. Furthermore, we propose two extensions to look-ahead, dogmatic filtering and adaptive lookahead, to address the challenge of “malicious nodes sharing false evidence”. Real mobile network traces are used to verify the effectiveness of the proposed methods.

Authors and Affiliations

Kolanu Venkata Krishna Sasikanth| M.Tech (IT), S.R.K.R.Engineering College, A.P., India, K. Satyanarayana Raju| Assistant Professor, Dept. of Information Technology, S.R.K.R.Engineering College, A.P., India

Keywords

Related Articles

Analysis of Sandwich Beam

Sandwich beams are composite systems having high stiffness-to-weight and Strength-toweight ratios and are used as light weight load bearing components. The use of thin, strong skin sheets adhered to thicker, lightweig...

Coupled Inductor Based H6 Transformer less Full Bridge Inverter For PV- Grid Systems

In this paper a coupled inductor based h6 transformer-less full bridge inverter for pv- grid systems have been proposed. Transformer-less inverters have much importance in grid-tied photovoltaic (PV) generation syste...

Resonant Current Control Of Three Phase Grid Connected Photovoltaic Inverters

This paper presents a new control technique used to reduce the harmonic distortion of current, without increasing the computational load of the standard current control abnormal conditions. The proposed control techn...

A New Algorithm for Distributed Generator (DG) Placement and Sizing for Distribution Systems

In today’s distribution grids the number of distributed generation units is increasing rapidly. Combined heat and power (CHP) plants and wind turbines are most often installed. Integration of these DG units into th...

An Additive Order and Privacy Preserving Function Family (AOPPF)

The abundant advantages of cloud computing, for protection concerns, people and venture clients are reluctant to outsource their susceptible data, including E- mail, individual health records and government private d...

Download PDF file
  • EP ID EP16519
  • DOI -
  • Views 311
  • Downloads 57

How To Cite

Kolanu Venkata Krishna Sasikanth, K. Satyanarayana Raju (2015). Detection of Behavioral Malware in Delay Tolerant Networks. International Journal of Science Engineering and Advance Technology, 3(8), 298-302. https://europub.co.uk/articles/-A-16519