A Hybrid Scheme for Malware Detection in Delay Tolerant Networks
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 10
Abstract
Delay tolerant network (DTN) utilize the mobility of node and opportunistic contact among nodes for data communication. Due to limitation in resources such as buffer space and contact opportunity, DTNs are vulnerable to malware based attack. So the proposal introduces a novel malware detection technique in DTN. The proposed system deals with the several evidence matching and collection problems. The system also identifies the misbehaving nodes by collecting and validating their evidence using ECDSA. The signature and Behavioral analysis of every node along with the evidence collection helps to track the accurate malware in DTN. The proposed system uses a hybrid collaborative malware detection technique to improve the detection accuracy.
Authors and Affiliations
Vineetha. S
Vibration Analysis of Loader Backhoe chassis 770 Model
Construction industry is undoubtedly the backbone and propelling force behind our progress. In response to booming construction industry, utilization of earth moving equipment has increased considerably leading to high...
A REVIEW ON DRIVER DROWSINESS AND ALCOHOL DETECTION SYSTEM
This paper provides an overview of existing system of real time detection of car driver drowsiness and alcoholic intoxication. Now a day, there are large numbers of road accidents are takes places due to Drowsines...
Enhancement of Quantum Key Distribution Protocol
Primarily, we know Quantum cryptographic technique replaces classical cryptography and give a review on the first QKD protocol which secrecy is guaranteed by key transmission of classical cryptography solved. But...
Improved Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks
In geographic routing, the nodes ought to maintain up-to-date positions of their immediate neighbors. Periodic broadcasting of beacon packets that contain the geographic location coordinates of the nodes may be a...
Critical Event Monitoring in WSNS using Level-By-Level Offset Based Wake up Pattern
This paper proposed to monitor a critical event in wireless sensor networks. Whenever a critical event occurs, the critical event is detected by the nearby sensor nodes. Immediately these sensor nodes should broad...