Detection of Behavioral Malware in Delay Tolerant Networks
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 8
Abstract
Disruption-tolerant networking has gained currency in the United States due to support from DARPA, which has funded many DTN projects. Disruption may occur because of the limits of wireless radio range, sparsity of mobile nodes, energy resources, attack, and noise. The delay-tolerantnetwork (DTN) model is becoming a viable communication alternative to the traditional infrastructural model for modern mobile consumer electronics equipped with short-range communication technologies such as Bluetooth, NFC, and Wi-Fi Direct. Proximity malware is a class of malware that exploits the opportunistic contacts and distributed nature of DTNs for propagation. Behavioral characterization of malware is an effective alternative to pattern matching in detecting malware, especially when dealing with polymorphic or obfuscated malware. In this paper, we first propose a general behavioral characterization of proximity malware which based on Naive Bayesian model, which has been successfully applied in non-DTN settings such as filtering email spams and detecting bonnets. We identify two unique challenges for extending Bayesian malware detection to DTNs (“insufficient evidence vs. evidence collection risk†and “filtering false evidence sequentially and distributedlyâ€), and propose a simple yet effective method, look-ahead, to address the challenges. Furthermore, we propose two extensions to look-ahead, dogmatic filtering and adaptive lookahead, to address the challenge of “malicious nodes sharing false evidenceâ€. Real mobile network traces are used to verify the effectiveness of the proposed methods.
Authors and Affiliations
Kolanu Venkata Krishna Sasikanth| M.Tech (IT), S.R.K.R.Engineering College, A.P., India, K. Satyanarayana Raju| Assistant Professor, Dept. of Information Technology, S.R.K.R.Engineering College, A.P., India
Hybrid active Power filter for power conditioning by using Space Vector Modulation controller
Active power filters are widely used in power systems due to their advantages to maintain power quality. In this paper, presents a control method for hybrid active power filter using Space Vector Pulse Width Modulatio...
Data Recovery and Integrity Checking By Proxy In Cloud
Cloud is a collection of data centres which provides effective services to cloud clients. Now a day’s users and organizations are forwarding the data to cloud. But problem is repairing cloud data along with integri...
An Suitable Minimum Utility Threshold By Trial And Error Is A Tedious Process For Users
We address the above issues by proposing another system for top-k high utility itemset mining, where k is the coveted number of HUIs to be mined. Two sorts of effective calculations named TKU (mining Top-K Utility it...
An Explorative Study On Quarry Dust Blended Geo Polymer Concrete For Various Concentrations Of Alkaline Activated Solution
Cement is the most generally utilized development material on the planet and Ordinary Portland Cement (OPC) is the real fixing utilized as a part of cement. The generation of bond discharges huge measure of carbon di...
A new Adaptation in Bridgeless Interleaved Power Factor Correction design for High Efficiency
Seeking the requirements of world’s energy conversions, developments are tracked. The research and development of the AC-DC conversion circuit for variable frequency control, which is closely related to human life....