Efficient Defence System For Avoid Malware Propagation In Mobile Network

Abstract

We investigate the problem of how to optimally distribute the content-based signatures of malware, which helps to detect the corresponding malware and disable further propagation, to minimize the number of infected nodes. We model the defense system with realistic assumptions addressing all the above challenges that have not been addressed in previous analytical work. Based on the framework of optimizing the system welfare utility, which is the weighted summation of individual utility depending on the final number of infected nodes through the signature allocation, we propose an encounter-based distributed algorithm based on Metropolis sampler.

Authors and Affiliations

B. Hari Prasad Reddy, Sujatha Kumari

Keywords

Related Articles

Design of Fuzzy Controller For Bilateral Telemanipulator

The objective of a telerobotic system is to connect humans and robots in order to reproduce operator action at a distance. The telerobotic system consists of a ‘master’ robot, operated by a human arm, and a kinematica...

Jamming Detection and Mitigation in Wireless Broadcast Networks

Wireless communication systems are often susceptible to the jamming attack where adversaries attempt to overpower transmitted signals by injecting a high level of noise. Jamming is difficult to mitigate in broadcast...

Review on Algorithms and Techniques of Reversible Data Hiding

Nowadays, with the rapid development of information technology more and more images and data are available on the internet..So there is a need to provide some kind of authentication to such important data. With the i...

Internet of things (IoT), Gives life to Non living

IoT alludes to the organized interconnection of regular items in practice, which are frequently furnished with pervasive knowledge [1]. IoT will expand the pervasiveness of the Internet by incorporating each item for...

Intuitionistic Fuzzy Sets: New Approach and Applications

This paper presents an extended definition of intuitionistic fuzzy set and some operations on intuitionistic fuzzy sets which will be very useful for solving the real life problems. In fact, the intuitionistic fuzzy...

Download PDF file
  • EP ID EP28318
  • DOI -
  • Views 314
  • Downloads 5

How To Cite

B. Hari Prasad Reddy, Sujatha Kumari (2015). Efficient Defence System For Avoid Malware Propagation In Mobile Network. International Journal of Research in Computer and Communication Technology, 4(11), -. https://europub.co.uk/articles/-A-28318