Novel Malware Clustering System Based on Kernel Data Structure
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 6
Abstract
Abstract : An operating system kernel is the prime of system software, responsible for the integrity and conventional computer system’s operations. Traditional malware detection approaches have based on the codecentricaspects of malicious programs, e.g. injection of unauthorized code or the control flow patterns of malware programs. In response to these malware detection strategies, modern malware focus on advanced techniques such as reusing existing code or complicated malware code to circumvent detection. A new perspective is introduced to detect malware which is different from code-centric approaches. The data centric malware defense architecture (DMDA) is introduced which models and detects malware behavior. This architecture is based on properties of the kernel data objects that are targeted during malware attacks. This architecture requires external monitoring. External monitor resides outside the monitored kernel and ensures temper-resistance. This architecture consists of three core system components that enable inspection of the kernel data properties and depending upon these properties from malware cluster. The system clusters malware depending upon the kernel data objects.
Authors and Affiliations
Bhandare Trupti Vasantrao , Pramod B. Mali
Modeling and Threshold Sensitivity Analysis of Computer VirusEpidemic
Abstract: This paper analyzed the methods and techniques used in mathematical modeling of biologicalepidemics to the domain of information technology. A new epidemic model has been proposed byincorporating a range...
Collaborative data sharing in online social network resolving privacy risk and sharing loss
Abstract : Nowadays, Online Social Networks (OSNs) is popular all over the world. Millions of people join such networks to share their personal and public information and also to make new friends and relations. But...
A Survey on Privacy Preserving Data Mining Techniques
Abstract: Data mining is the extraction of the important patterns or information from large amount of data, which is used for decision making in future work. But the process of data collection and data dissemination may...
Penetrating Windows 8 with syringe utility
: Windows 8, the most popular operating system by Microsoft launched in October 2012. It is developed for use of desktops, laptops, tablets, home theatre PC’s. Windows 8 is more secure than previous version...
A New Skin Color Based Face Detection Algorithm by CombiningThree Color Model Algorithms
Abstract: Human face recognition systems have gained a considerable attention during last decade due to itsvast applications in the field of computer and advantages over previous biometric methods. There are manyap...