Detection of Behavioral Malware in Delay Tolerant Networks
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 8
Abstract
Disruption-tolerant networking has gained currency in the United States due to support from DARPA, which has funded many DTN projects. Disruption may occur because of the limits of wireless radio range, sparsity of mobile nodes, energy resources, attack, and noise. The delay-tolerantnetwork (DTN) model is becoming a viable communication alternative to the traditional infrastructural model for modern mobile consumer electronics equipped with short-range communication technologies such as Bluetooth, NFC, and Wi-Fi Direct. Proximity malware is a class of malware that exploits the opportunistic contacts and distributed nature of DTNs for propagation. Behavioral characterization of malware is an effective alternative to pattern matching in detecting malware, especially when dealing with polymorphic or obfuscated malware. In this paper, we first propose a general behavioral characterization of proximity malware which based on Naive Bayesian model, which has been successfully applied in non-DTN settings such as filtering email spams and detecting bonnets. We identify two unique challenges for extending Bayesian malware detection to DTNs (“insufficient evidence vs. evidence collection risk†and “filtering false evidence sequentially and distributedlyâ€), and propose a simple yet effective method, look-ahead, to address the challenges. Furthermore, we propose two extensions to look-ahead, dogmatic filtering and adaptive lookahead, to address the challenge of “malicious nodes sharing false evidenceâ€. Real mobile network traces are used to verify the effectiveness of the proposed methods.
Authors and Affiliations
Kolanu Venkata Krishna Sasikanth| M.Tech (IT), S.R.K.R.Engineering College, A.P., India, K. Satyanarayana Raju| Assistant Professor, Dept. of Information Technology, S.R.K.R.Engineering College, A.P., India
Analysis of ANN Based Active Power Filter Performance For Renewable Power Generation System
In this paper analysis of ANN based active power filter performance for renewable power generation system has been proposed. A four leg VSC is used in this system, and this allows the reparation of current harmonic c...
A Novel Grid Current Compensator for Grid-Connected Distributed Generation under Nonlinear Loads with Fuzzy Logic Controller
This paper introduces an advanced current control strategy for grid-connected operations of distributed generation (DG), which supports the DG to transfer a sinusoidal current into the utility grid despite the distor...
Utilization Of Ring Signatures To Construct Homomorphic Authenticators In ORUTA To Verify The Integrity of Shared Data
It is practiced for users to influence cloud storage services to contribute to data with others in a group as data sharing develop into a standard feature in most cloud storage offerings including Drop box, iCloud an...
Reinforced Concrete framed structures are consistentlyincluded in the building developments which are framed as exposed edge structures and for the most part the casings in the uncovered edge structures are filled by...
A Framework For Protecting The Privacy In Web Search
Customized web pursuit could be customizing so as to promise because of enhance hunt quality indexed lists for people with individual information objectives. Then again, client's region unit uncomfortable with uncove...