Novel Malware Clustering System Based on Kernel Data Structure

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 6

Abstract

Abstract : An operating system kernel is the prime of system software, responsible for the integrity and conventional computer system’s operations. Traditional malware detection approaches have based on the codecentricaspects of malicious programs, e.g. injection of unauthorized code or the control flow patterns of malware programs. In response to these malware detection strategies, modern malware focus on advanced techniques such as reusing existing code or complicated malware code to circumvent detection. A new perspective is introduced to detect malware which is different from code-centric approaches. The data centric malware defense architecture (DMDA) is introduced which models and detects malware behavior. This architecture is based on properties of the kernel data objects that are targeted during malware attacks. This architecture requires external monitoring. External monitor resides outside the monitored kernel and ensures temper-resistance. This architecture consists of three core system components that enable inspection of the kernel data properties and depending upon these properties from malware cluster. The system clusters malware depending upon the kernel data objects.

Authors and Affiliations

Bhandare Trupti Vasantrao , Pramod B. Mali

Keywords

Related Articles

Results for Web Graph Mining Base Recommender System forQuery, Image and Social Network using Query Suggestion Algorithm and Heat Diffusion Method

Abstract: In Previous paper, We have already discussed a general framework on Web graphs mining based recommender system for Query, Image and Social Network using Query Suggestion Algorithm and Heat Diffusion Method. In...

 A Novel Three-Dimensional Adaptive Localization (T-Dial)Algorithm for Wireless Sensor Networks

Abstract: Wireless Sensor Networks is one of the most important area of research. Over the time, WSN isexpanding its reach from scientific research and monitoring to industrial as well as military operations. With itsinc...

 A Comprehensive and Comparative Study Of Maze-SolvingTechniques by Implementing Graph Theory

 Abstract: This paper presents an efficient maze solving algorithm. IEEE has launched a competition named“Micro mouse” where an autonomous robot or mice solves an unknown maze. The mouse find its way from thestartin...

 An Automated Model to Detect Fake Profiles and botnets inOnline Social Networks Using Steganography Technique

 Abstract: At the present time, hundreds of millions of active users all around the world are using online socialnetwork, such as Facebook, Twitter, Tumblr and LinkedIn. This service turned out to be one of the most...

 Study of Java Access Control Mechanism

 a class as "a collection of data and methods." One of the important object-oriented techniques is hiding the data within the class and making it available only through the methods. This technique is known as &nbs...

Download PDF file
  • EP ID EP128051
  • DOI -
  • Views 120
  • Downloads 0

How To Cite

Bhandare Trupti Vasantrao, Pramod B. Mali (2015). Novel Malware Clustering System Based on Kernel Data Structure. IOSR Journals (IOSR Journal of Computer Engineering), 17(6), 1-7. https://europub.co.uk/articles/-A-128051