Efficient Defence System For Avoid Malware Propagation In Mobile Network

Abstract

We investigate the problem of how to optimally distribute the content-based signatures of malware, which helps to detect the corresponding malware and disable further propagation, to minimize the number of infected nodes. We model the defense system with realistic assumptions addressing all the above challenges that have not been addressed in previous analytical work. Based on the framework of optimizing the system welfare utility, which is the weighted summation of individual utility depending on the final number of infected nodes through the signature allocation, we propose an encounter-based distributed algorithm based on Metropolis sampler.

Authors and Affiliations

B. Hari Prasad Reddy, Sujatha Kumari

Keywords

Related Articles

A Proposed System and Scheduling Algorithm for Grid based Indian Rural health Care

This paper focusses on proposing a system for grid based health care center. The paper dicusses the importance of health care center and grid computing. It also focusses on the proposed sytem architecture for the sys...

A NOVEL APPROACH FOR DATA PUBLISHING IN MINING

In recent years, advances in technology have lead to an increase in the capability to store and record personal data about consumers and individuals. This has guide to concerns that the personal data may be misused for...

Comparing Tesseract results with and without Character localization for Smartphone application

Tesseract is considered the most accurate free OCR engine in existence. Android operating system based Smartphones application where images taken from camera of mobile device or browsed from gallery are preprocessed....

Design of Proximity Coupled Patch Antenna for Miniaturization and Directivity Enhancement

A thorough investigation of microstrip patch antenna performance in presence of superstrate layer has been presented in this paper. Superstrate improves directivity and reduces resonant frequencies. The proximity cou...

Data mining and warehousing for Temporal Data Objects

Mobility data analysis became a more challenging task because of its huge application in different field of science and other daily applications like service accessibility, mobile marketing and traffic management. On...

Download PDF file
  • EP ID EP28318
  • DOI -
  • Views 324
  • Downloads 5

How To Cite

B. Hari Prasad Reddy, Sujatha Kumari (2015). Efficient Defence System For Avoid Malware Propagation In Mobile Network. International Journal of Research in Computer and Communication Technology, 4(11), -. https://europub.co.uk/articles/-A-28318