Detection of Behavioral Malware in Delay Tolerant Networks
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 8
Abstract
Disruption-tolerant networking has gained currency in the United States due to support from DARPA, which has funded many DTN projects. Disruption may occur because of the limits of wireless radio range, sparsity of mobile nodes, energy resources, attack, and noise. The delay-tolerantnetwork (DTN) model is becoming a viable communication alternative to the traditional infrastructural model for modern mobile consumer electronics equipped with short-range communication technologies such as Bluetooth, NFC, and Wi-Fi Direct. Proximity malware is a class of malware that exploits the opportunistic contacts and distributed nature of DTNs for propagation. Behavioral characterization of malware is an effective alternative to pattern matching in detecting malware, especially when dealing with polymorphic or obfuscated malware. In this paper, we first propose a general behavioral characterization of proximity malware which based on Naive Bayesian model, which has been successfully applied in non-DTN settings such as filtering email spams and detecting bonnets. We identify two unique challenges for extending Bayesian malware detection to DTNs (“insufficient evidence vs. evidence collection risk†and “filtering false evidence sequentially and distributedlyâ€), and propose a simple yet effective method, look-ahead, to address the challenges. Furthermore, we propose two extensions to look-ahead, dogmatic filtering and adaptive lookahead, to address the challenge of “malicious nodes sharing false evidenceâ€. Real mobile network traces are used to verify the effectiveness of the proposed methods.
Authors and Affiliations
Kolanu Venkata Krishna Sasikanth| M.Tech (IT), S.R.K.R.Engineering College, A.P., India, K. Satyanarayana Raju| Assistant Professor, Dept. of Information Technology, S.R.K.R.Engineering College, A.P., India
Sheltered Compound Vendor Data Apportioning For Vibrant Clusters In The Cloud
Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. Sharing data in a multiowner manner while preserving data and identity...
We initially give a productive certificateless signcryption plan and afterward outline a get to control conspire for the WBANs utilizing the given signcryption. Our plan accomplishes classification, respectability, v...
Facet Based Estimation Polling From Customer Reviews
Reputation-based belief systems are broadly used in e-Trade applications, and response ratings are aggregated to figure out traders’ reputation grades. The “all good reputation†problem, however, is prevalent i...
Controller Implementation for PV Interconnection Based ThreePhase UPS Systems Operating Under Highly Nonlinear Loads
This paper presents the design of a PV interconnection system based three-phase uninterruptible power supply (UPS) systems that are operating under highly nonlinear loads. The classical high-performance sinusoidal pu...
Framework of Matrix Factorization to Achieve Rating Prediction Task
We propose a social client wistful estimation approach and figure every client's notion on things/items. Besides, we consider a client's own wistful properties as well as contemplate relational nostalgic impact. At t...