Efficient Defence System For Avoid Malware Propagation In Mobile Network

Abstract

We investigate the problem of how to optimally distribute the content-based signatures of malware, which helps to detect the corresponding malware and disable further propagation, to minimize the number of infected nodes. We model the defense system with realistic assumptions addressing all the above challenges that have not been addressed in previous analytical work. Based on the framework of optimizing the system welfare utility, which is the weighted summation of individual utility depending on the final number of infected nodes through the signature allocation, we propose an encounter-based distributed algorithm based on Metropolis sampler.

Authors and Affiliations

B. Hari Prasad Reddy, Sujatha Kumari

Keywords

Related Articles

Application of IDS in WSN: A Survey

Wireless Sensor Networks (WSN) are one of the hottest areas over the past few years. Security is a major concern in WSN now a day. Intrusion detection represents one of such security aspects. Preventive mechanisms can...

Hot Spot Cell Load Balancing

Cellular network has undergone explosive growth in terms of number of subscribers in last couple of decades. Today billions of people around the world use mobile telephones, penetrating around 60 % of global populati...

Security Enhancement in Mobile Ad hoc Networks using Non-zero Non-cooperative Game Theory

Mobile Ad hoc Network (MANET) is a multi hop infrastructure less wireless networks which offers unrestricted mobility. As wireless ad-hoc networks lack a centralized infrastructure, they are exposed to a lot of attac...

Performance Analysis of Pilot Based Channel Estimation in OFDM System using Recursive Least Square Estimator

For a wireless communication system, the channel is unknown a priori to the receiver. Channel parameter estimation is used for improving data transmission performance. To estimate the channel properties and correct t...

Cloud Computing Used In Mobile Network

As a new mode of network applications, cloud computing is transforming the Internet computing infrastructure. Also the mobile applications and devices are developing rapidly. Cloud computing is anticipated to bring a...

Download PDF file
  • EP ID EP28318
  • DOI -
  • Views 330
  • Downloads 5

How To Cite

B. Hari Prasad Reddy, Sujatha Kumari (2015). Efficient Defence System For Avoid Malware Propagation In Mobile Network. International Journal of Research in Computer and Communication Technology, 4(11), -. https://europub.co.uk/articles/-A-28318