Detection of Behavioral Malware in Delay Tolerant Networks
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 8
Abstract
Disruption-tolerant networking has gained currency in the United States due to support from DARPA, which has funded many DTN projects. Disruption may occur because of the limits of wireless radio range, sparsity of mobile nodes, energy resources, attack, and noise. The delay-tolerantnetwork (DTN) model is becoming a viable communication alternative to the traditional infrastructural model for modern mobile consumer electronics equipped with short-range communication technologies such as Bluetooth, NFC, and Wi-Fi Direct. Proximity malware is a class of malware that exploits the opportunistic contacts and distributed nature of DTNs for propagation. Behavioral characterization of malware is an effective alternative to pattern matching in detecting malware, especially when dealing with polymorphic or obfuscated malware. In this paper, we first propose a general behavioral characterization of proximity malware which based on Naive Bayesian model, which has been successfully applied in non-DTN settings such as filtering email spams and detecting bonnets. We identify two unique challenges for extending Bayesian malware detection to DTNs (“insufficient evidence vs. evidence collection risk†and “filtering false evidence sequentially and distributedlyâ€), and propose a simple yet effective method, look-ahead, to address the challenges. Furthermore, we propose two extensions to look-ahead, dogmatic filtering and adaptive lookahead, to address the challenge of “malicious nodes sharing false evidenceâ€. Real mobile network traces are used to verify the effectiveness of the proposed methods.
Authors and Affiliations
Kolanu Venkata Krishna Sasikanth| M.Tech (IT), S.R.K.R.Engineering College, A.P., India, K. Satyanarayana Raju| Assistant Professor, Dept. of Information Technology, S.R.K.R.Engineering College, A.P., India
A Security Measure That Quantify The Anonymity Of Different Systems
The basis ambiguity difficulty in wireless sensor networks is the trouble of studying methods that provide time and position privacy for events reported by sensor nodes. Time and location privacy will be used interch...
Design Of Conventional Deep Drawing And Hydro Forming Deep Drawing By Finite Element Analysis
Deep drawing and hydro forming deep drawing (HDD) are the two conventional methods for production of cylindrical cups. In this paper, various cylindrical work pieces have been produced with various dies radius with d...
STUDY OF MECHANISM USED FOR AUTOMATING THE MECHANICAL SYSTEM
Automation will no longer be seen only as automatic production, but as a complex of technologies that guarantee reliability, flexibility, safety, for humans as well as for the environment. In a world of limited resou...
This work implements a new approach of fuzzy logic based space vector regulation with respect to the immediate torque controlled acceptance engine bolstered by four switch three stage inverter (FSTPI) to conquer the...
A Three Phase Four Wire Network Based Interleaved HighFrequency Inverter with Single-Reference Eight-Pulse-Modulation Technique for Fuel Cell Vehicle Applications
This paper presents a three phase four leg inverter with neutral connected to load. The inverter hybrid modulation technique consisting of singe-reference eight-pulse-modulation (SREPM) for front-end dc/dc converter...