Savoir-faire malware tracking down in Delay Tolerant Networks

Abstract

With the universal presence of short-range connectivity technologies (e.g., Bluetooth and, more recently, Wi-Fi Direct) in the consumer electronics market, the delay tolerant-network (DTN) model is becoming a viable alternative to the traditional infrastructural model. The delay-tolerant-network (DTN) model is becoming a viable communication alternative to the traditional infrastructural model for modern mobile consumer electronics equipped with short-range communication technologies. In modern network the malware is one of the serious issues where it can be identified by many roles such as email spam, Denial of service and Trojan like viruses. DTN (Delay Tolerant Network) suffered from the above malware related problems. Proximity malware is a class of malware that exploits the opportunistic contacts and distributed nature of DTNs for propagation. Behavioral characterization of malware is an effective alternative to pattern matching in detecting malware, especially when dealing with polymorphic or obfuscated malware. In this paper, we first propose a general behavioral characterization of proximity malware which based on Naive Bayesian model, which has been successfully applied in non-DTN settings such as filtering email spam’s and detecting bonnets. We identify two unique challenges for extending Bayesian malware detection to DTNs (“insufficient evidence vs. evidence collection risk” and “filtering false evidence sequentially and distributed”), and propose a simple yet effective method, look-ahead, to address the challenges.

Authors and Affiliations

Raksha R S, Rakshitha P G, Shalini M S, Shwetha L, Mrs. Ayesha Taranum

Keywords

Related Articles

A Novel Symmetrical Cascade H-Bridge MultiLevel Inverter Topology with Reduced Switching Devices

This paper proposes a new structure for cascade h bridge (CHB) based modular multi-level voltage source inverter. As with the correct arrangement of power semiconductor switches and voltage sources, the proposed inverte...

Modeling wireless network topology with NS3

Data transmission between client-server communications has been modeled using NS3 in this paper. Facilities and elements of ns3 simulation software contents are given. Algorithm, software and configuration of imitation...

Predicting Churn In E-Mall Using Decision Tree

Different studies and reviews propose that for an organization, economically it is less feasible to connect with another new customer than to hold a current faithful customer. Churn foreseen models are produced by schol...

Implementation on Secure Distributed Deduplication Systems with Improved Reliability

Data deduplication is a method for removing multiple copies of same data, and has been widely used in cloud storage to reduce storage space and uploading speed. However, there is only one copy for each file stored in cl...

SVM Based Classification of Neurodegenerative Diseases for Salient Brain Patterns

The identification defects in the MRI brain images can save numerous lives. A method to implement the kernel function for feature extraction to identify the neurodegenerative Alzheimer disease in Brain Image is proposed...

Download PDF file
  • EP ID EP20373
  • DOI -
  • Views 230
  • Downloads 4

How To Cite

Raksha R S, Rakshitha P G, Shalini M S, Shwetha L, Mrs. Ayesha Taranum (2014). Savoir-faire malware tracking down in Delay Tolerant Networks. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(5), -. https://europub.co.uk/articles/-A-20373