SlideShare a Scribd company logo
1 of 4
Download to read offline
The International Journal Of Engineering And Science (IJES)
|| Volume || 4 || Issue || 4 || Pages || PP.01-04|| 2015 ||
ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805
www.theijes.com The IJES Page 1
Behavioral Malware Detection in Dtn Using Intrusion Detection
System
1
R.Sankari Devi, 2
R.Dinesh Kumar
1
PG Scholar, Department of Computer Science and Engineering , Bharathiyar College Of Engineering And
Technology, Karaikal
2
Assistant Professor , Department of Computer Science and Engineering, Bharathiyar College Of Engineering
and technology.karaikal
--------------------------------------------------------ABSTRACT-----------------------------------------------------------
The delay-tolerant-network (DTN) model is becoming a viable communication to communicate with short-range
technologies such as Bluetooth, NFC and Wi-Fi Direct. Proximity malware is a malicious program that spreads
critically. Behavioral characterization of malware is an effective alternative to pattern matching in detecting
malware, especially when dealing with polymorphic or obfuscated malware. In this paper we first propose a
frequency based method to detect the malware in delay tolerant network. We identify the challenges in
frequency based model such as frequency coexistence, non location aware and hidden duplicate source. We
propose effective technique such as location based model, intrusion detection system and random routing
procedure to address the challenges.
Keywords – frequency coexistence ,hidden duplicate source ,nonlocation aware ,pattern matching
---------------------------------------------------------------------------------------------------------------------------
Date of Submission: 31-March-2015 Date of Accepted: 20-April-2015
---------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
1.1SCOPE OF PROJECT
1.1.1 Distance Based Detection
The distance-based redeployment detection is based on the following insight: without node redeployment
attack, the monitee’s location will not change and the distance measurements at its neighboring nodes should be
consistent, respectively. Thus, if the monitee is redeployed into a different location, a monitor can detect the
redeployment by noticing the inconsistency in the distance measurements. In other words, the distributions of
the distance measurements before and after redeployment are different. More specifically, if a monitor makes
before and after distance measurements on the monitee, it can calculate the difference between the before and
after distance-measurement pairs and determine whether that monitee has been redeployed or not. The before
measurement, which consists of a set of distance measurements, is collected right after the initial deployment,
and we denote the set of data in before measurement as the reference-set. The after measurement is done at
sometime thereafter and we denote the collected data set at this time as the testing-set.
1.1.2 Re-Routing
Rerouting, sometimes known as chaining or parent/child, allows you to route Helix Universal
Rerouting requests through other Helix Universal Rerouting. The rerouting routing feature instructs Helix
Universal Rerouting to look at the address of the requested material, and to send it either to a specific Helix
Universal Rerouting, or to send it directly to the Helix Universal Server that hosts the content. The main Helix
Universal Rerouting which handles requests bound for the Internet is called the parent Helix Universal
Rerouting; the Helix Universal Rerouting located closest to the clients are called child Helix Universal
Rerouting. Typical uses for this feature include routing all requests for locally-served material directly to the
Helix Universal Server, and forwarding all other requests through a gateway Helix Universal Rerouting.
1.1.3 Localization System
We have developed a general-purpose localization system to perform real-time indoor positioning. This system
is designed with fully distributed functionality and easy-to-plug-in localization algorithms. It is built around four
logical components are Transmitter, Landmark, Server, Solver. Transmitter: Any device that transmits packets
can be localized. Oftentimes, the application code does not need to be altered on a sensor node to localize it.
Behavioral Malware Detection…
www.theijes.com The IJES Page 2
Landmark: The Landmark component listens to the packet traffic and extracts the RSS reading for each
transmitter. It then forwards the RSS information to the Server component. The Landmark component is
stateless and is usually deployed on each landmark or AP with known locations.Server: A centralized server
collects RSS information from all the Landmark components. The identity-based detection is performed at the
Server component. The Server component summarizes RSS information such as averaging or clustering and
then forwards the information to the Solver component for localization estimation.
1.2 OVERVIEW OF PROJECT
The popularity of mobile consumer electronics, like laptop computers, PDAs, and more recently and
prominently, smartphones, revives the delay-tolerant-network (DTN) model as an alternative to the traditional
infrastructure model. The widespread adoption of these devices, coupled with strong economic incentives,
induces a class of malware that specifically targets DTNs. We call this class of malware proximity malware.
An early example of proximity malware is the Symbian-based Cabir worm, which propagated as a
Symbian Software Installation Script (.sis) package through the Bluetooth link between two spatially proximate
devices. A later example is the iOS-based Ikee worm, which exploited the default SSH password on jailbroken
iPhones to propagate through IP-based Wi-Fi connections. Previous researches quantify the threat of proximity
malware attack and demonstrate the possibility of launching such an attack, which is confirmed by recent
reports on hijacking hotel Wi-Fi hotspots for drive-by malware attacks. With the adoption of new short-range
communication technologies such as NFC and Wi-Fi Direct that facilitate spontaneous bulk data transfer
between spatially proximate mobile devices, the threat of proximity malware is becoming more realistic and
relevant than ever.
II. LITERATURE SURVEY
2. MASK: Anonymous On-Demand Routing in Mobile Ad Hoc Networks
MASK and D-ANODR have problems in meeting the un-indentify ability and un-link ability. The node IDs
in a neighborhood and along a route are possibly exposed in SDAR and Anon-DSR, respectively. The plain
node IDs are used in the route request of MASK and D-ANODR. In this work, we use the node’s pseudonym
instead of its real ID, to avoid the information leakage during RREQ and RREP processes.
Some of the protocols adopt additional authentication schemes to sign the routing packets, including
A3RP, RAODR, USOR, and PRISM. Although MASK provides neighborhood authentication, it cannot sign the
routing packets. RAODR deploys a master key mechanism, which cannot provide the anonymity, traceability,
and enforceability that are supported by a group signature. The drawbacks are Each protocol is active against
different attacks,Collective approach is not feasible, Coverage changes is not possible for a dynamic
environment.
EXITING SYSTEM
Consider a DTN consisting of ‘n’ nodes. The neighbors of a node are the nodes it has (opportunistic) contact
opportunities with. Proximity malware is a malicious program that disrupts the host node’s normal function and
has a chance of duplicating itself to other nodes during (opportunistic) contact opportunities between nodes in
the DTN. When duplication occurs, the other node is infected with the malware. In our model, we assume that
each node is capable of assessing the other party for suspicious actions after each encounter, resulting in a
binary assessment. For example, a node can assess a Bluetooth connection or a SSH session for potential Cabir
or Ikee infection. The watchdog components in previous works on malicious behavior detection in MANETs
and distributed reputation systems are other examples. A node is either evil or good, based on if it is or is not
infected by the malware. The suspicious-action assessment is assumed to be an imperfect but functional
indicator of malware infections: It may occasionally assess an evil node’s actions as “non-suspicious” or a good
node’s actions as “suspicious”, but most suspicious actions are correctly attributed to evil nodes. A previous
work on distributed IDS presents an example for such imperfect but functional binary classifier on nodes’
behaviors.
2.1.1 Neighborhood Watch
Besides using own assessments, incorporate other neighbors’ assessments in the cut-off decision against
another node. This extension to the evidence collection process is inspired by the real-life neighborhood (crime) watch
program, which encourages residents to report suspicious criminal activities in their neighborhood. Similarly, i shares
assessments on j with its neighbors, and receive their assessments on ‘j’ in return. In the neighborhood-watch model,
the malicious nodes that are able to transmit malware (we will see next that there may be malicious nodes whose
objective is other than transmitting malware) are assumed to be consistent over space and time. These are common
assumptions in distributed trust management systems, which incorporate neighboring nodes’ opinions in estimating a
local trust value. By being consistent over space, we mean that evil nodes’ suspicious actions are observable to all
their neighbors, rather than only a few. If this is not the case, the evidence provided by neighbors, even if truthful, will
contradict local evidence and, hence, cause confusions.
Behavioral Malware Detection…
www.theijes.com The IJES Page 3
PROPOSED SYSTEM
Using location based system the malware is detected using distance based calculation.To address the
challenges we use a simple yet effective techniques such as intrusion detection system and random routing
procedure.
III. SYSTEM ARCHITECTURE DESIGN
3.1 Network Diagram
3.1.1 frequency based
3.1.2 Location based
IV SYSTEM IMPLEMENTATION
4.1 Modules with description
4.1.1 Distance based node detection
Recent technological advances have made it possible to deploy large scale sensor networks consisting
of a large number of low-cost, low-power, and multi-functional sensor nodes that communicate in short
distances through wireless links. Such networks have a wide range of applications in civilian and military
operations such as target tracking and battlefield surveillance. Many researchers have been attracted to develop
protocols that can fulfill the requirements of these applications.
Sensors’ locations play a critical role in many sensor network applications. Not only do applications
such as environment monitoring and target tracking require sensors’ locations to accomplish their tasks, but
several fundamental techniques in wireless sensor networks also require sensors’ locations. For example, in
geographical routing (e.g., GPSR), sensor nodes make routing decisions at least partially based on their own and
their neighbors’ locations. However, due to the cost reasons, it is not practical to have a GPS receiver on every
sensor node. In the past several years, many location discovery protocols have been proposed to reduce or
completely remove the dependence on GPS in wireless sensor networks.
4.2.2 Location aware routing
The advancement in wireless communication and economical, portable computing devices has made
mobile computing possible. One research issue that has attracted a lot of attention recently is the design of
mobile ad hoc network (MANET). A MANET is one consisting of a set of mobile hosts which can communicate
with one another and roam around at their will. No base stations are supported in such an environment. Due to
considerations such as radio power limitation, power consumption, and channel utilization, a mobile host may
not be able to communicate directly with other hosts in a single-hop fashion. In this case, a multi-hop scenario
occurs, where the packets sent by the source host are relayed by several intermediate hosts before reaching the
destination host. Applications of MANETs occur in situations like battlefields or major disaster areas, where
networks need to be deployed immediately but base stations or fixed network infrastructures are not available. A
working group called “manet” has been formed by the Internet Engineering Task Force (IETF) to study the
related issues and stimulate research in MANET.
Behavioral Malware Detection…
www.theijes.com The IJES Page 4
V. CONCLUSION AND FUTURE WORK
Behavioral characterization of malware is an effective alternative to pattern matching in detecting
malware, especially when dealing with polymorphic or obfuscated malware. Naive Bayesian model has been
successfully applied in non-DTN settings, such as filtering email spams and detecting botnets. We propose a
general behavioral characterization of DTN-based proximity malware. We present look-ahead, along with
dogmatic filtering and adaptive look-ahead, to address two unique challenging in extending Bayesian filtering to
DTNs: “insufficient evidence vs. evidence collection risk” and “filtering false evidence sequentially and
distributedly”. In prospect, extension of the behavioral characterization of proximity malware to account for
strategic malware detection evasion with game theory is a challenging yet interesting future work.
REFERENCES
[1] Chun-jen Chung, jeogkeun Lee and Dijiang Huang,”NICE:Network Intrusion Detection and Countermeasure Selection in Virtual
Network System”, IEEE trans.Dependable And Secure Computing, vol. 610,no.4, July/August2013.
[2] N. Poolsappasit, R. Dewri, and I. Ray, “Dynamic Security RiskManagement Using Bayesian Attack Graphs,” IEEE Trans.Dependable
and Secure Computing, vol. 9, no. 1, pp. 61-74, Feb. 2012.
[3] L. Wang, A. Liu, and S. Jajodia, “Using Attack Graphs for Correlating, Hypothesizing, and Predicting Intrusion Alerts,”Computer
Comm., vol. 29, no. 15, pp. 2917-2933, Sept. 2006.
[4] R. Sadoddin and A. Ghorbani, “Alert Correlation Survey: Frameworkand Techniques,” Proc. ACM Int’l Conf. Privacy, Security
andTrust: Bridge the Gap between PST Technologies and Business Services (PST ’06), pp. 37:1-37:10, 2006.
[5] S. Roschke, F. Cheng, and C. Meinel,“A New Alert CorrelationAlgorithm Based on Attack Graph,” Proc. Fourth Int’l
Conf.Computational Intelligence in Security for Information Systems,
pp. 58-67 2011.
[6] A. Roy, D.S. Kim, and K. Trivedi, “Scalable Optimal Countermeasure Selection Using Implicit Enumeration on Attack
Countermeasure Trees,” Proc. IEEE Int’l Conf. Dependable Systems Networks (DSN ’12), June 2012.
[7] Wi-Fi Alliance. Wi-Fi Direct. [Online]. Available: http: //goo.gl/fZuyE
[8] C. Kolbitsch, P. Comparetti, C. Kruegel, E. Kirda, X. Zhou,and X. Wang, “Effective and efficient malware detection at the end host,”
in Proc. USENIX Security, 2009.
[9] U. Bayer, P. Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda, “Scalable, behavior-based malware clustering,” in Proc. IEEE
NDSS, 2009.
[10] D. Dash, B. Kveton, J. Agosta, E. Schooler, J. Chandrashekar, A. Bachrach, and A. Newman, “When gossip is good: Distributed
probabilistic inference for detection of slow network intrusions,” in Proc. AAAI, 2006.
[11] G. Zyba, G. Voelker, M. Liljenstam, A. M´ehes, and P. Johansson, “Defending mobile phones from proximity malware,” in Proc.
IEEE INFOCOM, 2009.
[12] F. Li, Y. Yang, and J. Wu, “CPMC: an efficient proximity malware coping scheme in smartphone-based mobile networks,” in Proc.
IEEE INFOCOM, 2010.
[13] I. Androutsopoulos, J. Koutsias, K. Chandrinos, and C. Spyropoulos, “An experimental comparison of naive bayesian and keyword-
based anti-spam filtering with personal e-mail messages,” in Proc. ACM SIGIR, 2000.
[14] P. Graham. Better Bayesian filtering. [Online]. Available: http://goo.gl/AgHkB
[15] J. Zdziarski, Ending spam: Bayesian content filtering and the art of statistical language classification. No Starch Press, 2005.
[16] R. Villamar´ın-Salom´on and J. Brustoloni, “Bayesian bot detection based on DNS traffic similarity,” in Proc. ACM SAC.

More Related Content

What's hot

A privacy preserving-location_monitoring_system_for_wireless_sensor_networks
A privacy preserving-location_monitoring_system_for_wireless_sensor_networksA privacy preserving-location_monitoring_system_for_wireless_sensor_networks
A privacy preserving-location_monitoring_system_for_wireless_sensor_networkssamah72
 
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...IRJET Journal
 
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor NetworksA Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networksambitlick
 
Detection and Prevention of Attacks in Wireless Sensor Networks: A Survey
Detection and Prevention of Attacks in Wireless Sensor Networks: A SurveyDetection and Prevention of Attacks in Wireless Sensor Networks: A Survey
Detection and Prevention of Attacks in Wireless Sensor Networks: A Surveydbpublications
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksHarshal Ladhe
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksijdpsjournal
 
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKPERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKIJCNCJournal
 
A030101001006
A030101001006A030101001006
A030101001006theijes
 
An enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsnAn enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsneSAT Publishing House
 
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...ieijjournal
 
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkMalicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkCSCJournals
 
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Filtering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in WsnFiltering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in WsnIOSR Journals
 
Clone Node Detection in Wireless Sensor Networks
Clone Node Detection in Wireless Sensor NetworksClone Node Detection in Wireless Sensor Networks
Clone Node Detection in Wireless Sensor Networksrahulmonikasharma
 
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...1crore projects
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
 

What's hot (20)

A privacy preserving-location_monitoring_system_for_wireless_sensor_networks
A privacy preserving-location_monitoring_system_for_wireless_sensor_networksA privacy preserving-location_monitoring_system_for_wireless_sensor_networks
A privacy preserving-location_monitoring_system_for_wireless_sensor_networks
 
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
 
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor NetworksA Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
 
Detection and Prevention of Attacks in Wireless Sensor Networks: A Survey
Detection and Prevention of Attacks in Wireless Sensor Networks: A SurveyDetection and Prevention of Attacks in Wireless Sensor Networks: A Survey
Detection and Prevention of Attacks in Wireless Sensor Networks: A Survey
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networks
 
G0421040042
G0421040042G0421040042
G0421040042
 
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKPERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
 
A030101001006
A030101001006A030101001006
A030101001006
 
An enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsnAn enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsn
 
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...
 
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkMalicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
 
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Filtering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in WsnFiltering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in Wsn
 
Clone Node Detection in Wireless Sensor Networks
Clone Node Detection in Wireless Sensor NetworksClone Node Detection in Wireless Sensor Networks
Clone Node Detection in Wireless Sensor Networks
 
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
 

Viewers also liked

Rural development in Nigeria: problems and prospects for sustainable development
Rural development in Nigeria: problems and prospects for sustainable developmentRural development in Nigeria: problems and prospects for sustainable development
Rural development in Nigeria: problems and prospects for sustainable developmenttheijes
 
Behavioral Malware Detection in Dtn Using Intrusion Detection System
	Behavioral Malware Detection in Dtn Using Intrusion Detection System	Behavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection Systemtheijes
 
B031107018
B031107018B031107018
B031107018theijes
 
Study Analysis & Application of Bio-Composite Smart Material
Study Analysis & Application of Bio-Composite Smart MaterialStudy Analysis & Application of Bio-Composite Smart Material
Study Analysis & Application of Bio-Composite Smart Materialtheijes
 
Modeling of neural image compression using gradient decent technology
Modeling of neural image compression using gradient decent technologyModeling of neural image compression using gradient decent technology
Modeling of neural image compression using gradient decent technologytheijes
 
A New Temperature-Based Model for Estimating Global Solar Radiation in Port-...
	A New Temperature-Based Model for Estimating Global Solar Radiation in Port-...	A New Temperature-Based Model for Estimating Global Solar Radiation in Port-...
A New Temperature-Based Model for Estimating Global Solar Radiation in Port-...theijes
 
Physicochemical Characteristics of Fumarized and Maleinized Cottonseed Oil
Physicochemical Characteristics of Fumarized and Maleinized Cottonseed OilPhysicochemical Characteristics of Fumarized and Maleinized Cottonseed Oil
Physicochemical Characteristics of Fumarized and Maleinized Cottonseed Oiltheijes
 
Dielectric Behaviour of Pzt Ceramics at Microwave Frequencies
Dielectric Behaviour of Pzt Ceramics at Microwave FrequenciesDielectric Behaviour of Pzt Ceramics at Microwave Frequencies
Dielectric Behaviour of Pzt Ceramics at Microwave Frequenciestheijes
 
Explaining Customer Satisfaction with Experience, Customer Trust and Commitm...
	Explaining Customer Satisfaction with Experience, Customer Trust and Commitm...	Explaining Customer Satisfaction with Experience, Customer Trust and Commitm...
Explaining Customer Satisfaction with Experience, Customer Trust and Commitm...theijes
 
J031101064069
J031101064069J031101064069
J031101064069theijes
 
MEDITATION: A Pivot Factor to Start Up A Science Class
MEDITATION: A Pivot Factor to Start Up A Science ClassMEDITATION: A Pivot Factor to Start Up A Science Class
MEDITATION: A Pivot Factor to Start Up A Science Classtheijes
 
Determination of Work Index of Arufu Lead Ore, Nasarawa State, North-Central ...
Determination of Work Index of Arufu Lead Ore, Nasarawa State, North-Central ...Determination of Work Index of Arufu Lead Ore, Nasarawa State, North-Central ...
Determination of Work Index of Arufu Lead Ore, Nasarawa State, North-Central ...theijes
 
Mechanical behavior and statistical study of aluminum wires belonging to low...
	Mechanical behavior and statistical study of aluminum wires belonging to low...	Mechanical behavior and statistical study of aluminum wires belonging to low...
Mechanical behavior and statistical study of aluminum wires belonging to low...theijes
 
C031102018027
C031102018027C031102018027
C031102018027theijes
 
An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplica...
An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplica...An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplica...
An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplica...theijes
 
Understanding Cloud Computing, It's Services, Benefits, And Challenges
Understanding Cloud Computing, It's Services, Benefits, And ChallengesUnderstanding Cloud Computing, It's Services, Benefits, And Challenges
Understanding Cloud Computing, It's Services, Benefits, And Challengestheijes
 
Automatic Park and retrieve assissted systems for automobiles using smartphone
Automatic Park and retrieve assissted systems for automobiles using smartphoneAutomatic Park and retrieve assissted systems for automobiles using smartphone
Automatic Park and retrieve assissted systems for automobiles using smartphonetheijes
 
Critical Factors Influencing to Management Risk in Construction Projects
Critical Factors Influencing to Management Risk in Construction ProjectsCritical Factors Influencing to Management Risk in Construction Projects
Critical Factors Influencing to Management Risk in Construction Projectstheijes
 

Viewers also liked (18)

Rural development in Nigeria: problems and prospects for sustainable development
Rural development in Nigeria: problems and prospects for sustainable developmentRural development in Nigeria: problems and prospects for sustainable development
Rural development in Nigeria: problems and prospects for sustainable development
 
Behavioral Malware Detection in Dtn Using Intrusion Detection System
	Behavioral Malware Detection in Dtn Using Intrusion Detection System	Behavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection System
 
B031107018
B031107018B031107018
B031107018
 
Study Analysis & Application of Bio-Composite Smart Material
Study Analysis & Application of Bio-Composite Smart MaterialStudy Analysis & Application of Bio-Composite Smart Material
Study Analysis & Application of Bio-Composite Smart Material
 
Modeling of neural image compression using gradient decent technology
Modeling of neural image compression using gradient decent technologyModeling of neural image compression using gradient decent technology
Modeling of neural image compression using gradient decent technology
 
A New Temperature-Based Model for Estimating Global Solar Radiation in Port-...
	A New Temperature-Based Model for Estimating Global Solar Radiation in Port-...	A New Temperature-Based Model for Estimating Global Solar Radiation in Port-...
A New Temperature-Based Model for Estimating Global Solar Radiation in Port-...
 
Physicochemical Characteristics of Fumarized and Maleinized Cottonseed Oil
Physicochemical Characteristics of Fumarized and Maleinized Cottonseed OilPhysicochemical Characteristics of Fumarized and Maleinized Cottonseed Oil
Physicochemical Characteristics of Fumarized and Maleinized Cottonseed Oil
 
Dielectric Behaviour of Pzt Ceramics at Microwave Frequencies
Dielectric Behaviour of Pzt Ceramics at Microwave FrequenciesDielectric Behaviour of Pzt Ceramics at Microwave Frequencies
Dielectric Behaviour of Pzt Ceramics at Microwave Frequencies
 
Explaining Customer Satisfaction with Experience, Customer Trust and Commitm...
	Explaining Customer Satisfaction with Experience, Customer Trust and Commitm...	Explaining Customer Satisfaction with Experience, Customer Trust and Commitm...
Explaining Customer Satisfaction with Experience, Customer Trust and Commitm...
 
J031101064069
J031101064069J031101064069
J031101064069
 
MEDITATION: A Pivot Factor to Start Up A Science Class
MEDITATION: A Pivot Factor to Start Up A Science ClassMEDITATION: A Pivot Factor to Start Up A Science Class
MEDITATION: A Pivot Factor to Start Up A Science Class
 
Determination of Work Index of Arufu Lead Ore, Nasarawa State, North-Central ...
Determination of Work Index of Arufu Lead Ore, Nasarawa State, North-Central ...Determination of Work Index of Arufu Lead Ore, Nasarawa State, North-Central ...
Determination of Work Index of Arufu Lead Ore, Nasarawa State, North-Central ...
 
Mechanical behavior and statistical study of aluminum wires belonging to low...
	Mechanical behavior and statistical study of aluminum wires belonging to low...	Mechanical behavior and statistical study of aluminum wires belonging to low...
Mechanical behavior and statistical study of aluminum wires belonging to low...
 
C031102018027
C031102018027C031102018027
C031102018027
 
An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplica...
An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplica...An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplica...
An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplica...
 
Understanding Cloud Computing, It's Services, Benefits, And Challenges
Understanding Cloud Computing, It's Services, Benefits, And ChallengesUnderstanding Cloud Computing, It's Services, Benefits, And Challenges
Understanding Cloud Computing, It's Services, Benefits, And Challenges
 
Automatic Park and retrieve assissted systems for automobiles using smartphone
Automatic Park and retrieve assissted systems for automobiles using smartphoneAutomatic Park and retrieve assissted systems for automobiles using smartphone
Automatic Park and retrieve assissted systems for automobiles using smartphone
 
Critical Factors Influencing to Management Risk in Construction Projects
Critical Factors Influencing to Management Risk in Construction ProjectsCritical Factors Influencing to Management Risk in Construction Projects
Critical Factors Influencing to Management Risk in Construction Projects
 

Similar to Behavioral Malware Detection in Dtn Using Intrusion Detection System

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Behavioral malware detection in delay tolerant network
Behavioral malware detection in delay tolerant networkBehavioral malware detection in delay tolerant network
Behavioral malware detection in delay tolerant networkBittu Roy
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)Mumbai Academisc
 
Protocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor networkProtocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor networkIOSR Journals
 
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYSECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYJournal For Research
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...IJERA Editor
 
Security Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETsSecurity Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETsIJTET Journal
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
 
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc NetworksProviding The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc NetworksIOSR Journals
 
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNA NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNIJCNCJournal
 
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKSCONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKSpharmaindexing
 
Detection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyDetection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyIOSR Journals
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...IOSR Journals
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
 

Similar to Behavioral Malware Detection in Dtn Using Intrusion Detection System (20)

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Behavioral malware detection in delay tolerant network
Behavioral malware detection in delay tolerant networkBehavioral malware detection in delay tolerant network
Behavioral malware detection in delay tolerant network
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
 
Protocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor networkProtocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor network
 
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYSECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
 
Security Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETsSecurity Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETs
 
I1802046780
I1802046780I1802046780
I1802046780
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc NetworksProviding The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
 
B017130508
B017130508B017130508
B017130508
 
C0511318
C0511318C0511318
C0511318
 
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNA NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
 
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKSCONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
 
M026075079
M026075079M026075079
M026075079
 
Detection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyDetection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A Survey
 
P017129296
P017129296P017129296
P017129296
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
 

Recently uploaded

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Behavioral Malware Detection in Dtn Using Intrusion Detection System

  • 1. The International Journal Of Engineering And Science (IJES) || Volume || 4 || Issue || 4 || Pages || PP.01-04|| 2015 || ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805 www.theijes.com The IJES Page 1 Behavioral Malware Detection in Dtn Using Intrusion Detection System 1 R.Sankari Devi, 2 R.Dinesh Kumar 1 PG Scholar, Department of Computer Science and Engineering , Bharathiyar College Of Engineering And Technology, Karaikal 2 Assistant Professor , Department of Computer Science and Engineering, Bharathiyar College Of Engineering and technology.karaikal --------------------------------------------------------ABSTRACT----------------------------------------------------------- The delay-tolerant-network (DTN) model is becoming a viable communication to communicate with short-range technologies such as Bluetooth, NFC and Wi-Fi Direct. Proximity malware is a malicious program that spreads critically. Behavioral characterization of malware is an effective alternative to pattern matching in detecting malware, especially when dealing with polymorphic or obfuscated malware. In this paper we first propose a frequency based method to detect the malware in delay tolerant network. We identify the challenges in frequency based model such as frequency coexistence, non location aware and hidden duplicate source. We propose effective technique such as location based model, intrusion detection system and random routing procedure to address the challenges. Keywords – frequency coexistence ,hidden duplicate source ,nonlocation aware ,pattern matching --------------------------------------------------------------------------------------------------------------------------- Date of Submission: 31-March-2015 Date of Accepted: 20-April-2015 --------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION 1.1SCOPE OF PROJECT 1.1.1 Distance Based Detection The distance-based redeployment detection is based on the following insight: without node redeployment attack, the monitee’s location will not change and the distance measurements at its neighboring nodes should be consistent, respectively. Thus, if the monitee is redeployed into a different location, a monitor can detect the redeployment by noticing the inconsistency in the distance measurements. In other words, the distributions of the distance measurements before and after redeployment are different. More specifically, if a monitor makes before and after distance measurements on the monitee, it can calculate the difference between the before and after distance-measurement pairs and determine whether that monitee has been redeployed or not. The before measurement, which consists of a set of distance measurements, is collected right after the initial deployment, and we denote the set of data in before measurement as the reference-set. The after measurement is done at sometime thereafter and we denote the collected data set at this time as the testing-set. 1.1.2 Re-Routing Rerouting, sometimes known as chaining or parent/child, allows you to route Helix Universal Rerouting requests through other Helix Universal Rerouting. The rerouting routing feature instructs Helix Universal Rerouting to look at the address of the requested material, and to send it either to a specific Helix Universal Rerouting, or to send it directly to the Helix Universal Server that hosts the content. The main Helix Universal Rerouting which handles requests bound for the Internet is called the parent Helix Universal Rerouting; the Helix Universal Rerouting located closest to the clients are called child Helix Universal Rerouting. Typical uses for this feature include routing all requests for locally-served material directly to the Helix Universal Server, and forwarding all other requests through a gateway Helix Universal Rerouting. 1.1.3 Localization System We have developed a general-purpose localization system to perform real-time indoor positioning. This system is designed with fully distributed functionality and easy-to-plug-in localization algorithms. It is built around four logical components are Transmitter, Landmark, Server, Solver. Transmitter: Any device that transmits packets can be localized. Oftentimes, the application code does not need to be altered on a sensor node to localize it.
  • 2. Behavioral Malware Detection… www.theijes.com The IJES Page 2 Landmark: The Landmark component listens to the packet traffic and extracts the RSS reading for each transmitter. It then forwards the RSS information to the Server component. The Landmark component is stateless and is usually deployed on each landmark or AP with known locations.Server: A centralized server collects RSS information from all the Landmark components. The identity-based detection is performed at the Server component. The Server component summarizes RSS information such as averaging or clustering and then forwards the information to the Solver component for localization estimation. 1.2 OVERVIEW OF PROJECT The popularity of mobile consumer electronics, like laptop computers, PDAs, and more recently and prominently, smartphones, revives the delay-tolerant-network (DTN) model as an alternative to the traditional infrastructure model. The widespread adoption of these devices, coupled with strong economic incentives, induces a class of malware that specifically targets DTNs. We call this class of malware proximity malware. An early example of proximity malware is the Symbian-based Cabir worm, which propagated as a Symbian Software Installation Script (.sis) package through the Bluetooth link between two spatially proximate devices. A later example is the iOS-based Ikee worm, which exploited the default SSH password on jailbroken iPhones to propagate through IP-based Wi-Fi connections. Previous researches quantify the threat of proximity malware attack and demonstrate the possibility of launching such an attack, which is confirmed by recent reports on hijacking hotel Wi-Fi hotspots for drive-by malware attacks. With the adoption of new short-range communication technologies such as NFC and Wi-Fi Direct that facilitate spontaneous bulk data transfer between spatially proximate mobile devices, the threat of proximity malware is becoming more realistic and relevant than ever. II. LITERATURE SURVEY 2. MASK: Anonymous On-Demand Routing in Mobile Ad Hoc Networks MASK and D-ANODR have problems in meeting the un-indentify ability and un-link ability. The node IDs in a neighborhood and along a route are possibly exposed in SDAR and Anon-DSR, respectively. The plain node IDs are used in the route request of MASK and D-ANODR. In this work, we use the node’s pseudonym instead of its real ID, to avoid the information leakage during RREQ and RREP processes. Some of the protocols adopt additional authentication schemes to sign the routing packets, including A3RP, RAODR, USOR, and PRISM. Although MASK provides neighborhood authentication, it cannot sign the routing packets. RAODR deploys a master key mechanism, which cannot provide the anonymity, traceability, and enforceability that are supported by a group signature. The drawbacks are Each protocol is active against different attacks,Collective approach is not feasible, Coverage changes is not possible for a dynamic environment. EXITING SYSTEM Consider a DTN consisting of ‘n’ nodes. The neighbors of a node are the nodes it has (opportunistic) contact opportunities with. Proximity malware is a malicious program that disrupts the host node’s normal function and has a chance of duplicating itself to other nodes during (opportunistic) contact opportunities between nodes in the DTN. When duplication occurs, the other node is infected with the malware. In our model, we assume that each node is capable of assessing the other party for suspicious actions after each encounter, resulting in a binary assessment. For example, a node can assess a Bluetooth connection or a SSH session for potential Cabir or Ikee infection. The watchdog components in previous works on malicious behavior detection in MANETs and distributed reputation systems are other examples. A node is either evil or good, based on if it is or is not infected by the malware. The suspicious-action assessment is assumed to be an imperfect but functional indicator of malware infections: It may occasionally assess an evil node’s actions as “non-suspicious” or a good node’s actions as “suspicious”, but most suspicious actions are correctly attributed to evil nodes. A previous work on distributed IDS presents an example for such imperfect but functional binary classifier on nodes’ behaviors. 2.1.1 Neighborhood Watch Besides using own assessments, incorporate other neighbors’ assessments in the cut-off decision against another node. This extension to the evidence collection process is inspired by the real-life neighborhood (crime) watch program, which encourages residents to report suspicious criminal activities in their neighborhood. Similarly, i shares assessments on j with its neighbors, and receive their assessments on ‘j’ in return. In the neighborhood-watch model, the malicious nodes that are able to transmit malware (we will see next that there may be malicious nodes whose objective is other than transmitting malware) are assumed to be consistent over space and time. These are common assumptions in distributed trust management systems, which incorporate neighboring nodes’ opinions in estimating a local trust value. By being consistent over space, we mean that evil nodes’ suspicious actions are observable to all their neighbors, rather than only a few. If this is not the case, the evidence provided by neighbors, even if truthful, will contradict local evidence and, hence, cause confusions.
  • 3. Behavioral Malware Detection… www.theijes.com The IJES Page 3 PROPOSED SYSTEM Using location based system the malware is detected using distance based calculation.To address the challenges we use a simple yet effective techniques such as intrusion detection system and random routing procedure. III. SYSTEM ARCHITECTURE DESIGN 3.1 Network Diagram 3.1.1 frequency based 3.1.2 Location based IV SYSTEM IMPLEMENTATION 4.1 Modules with description 4.1.1 Distance based node detection Recent technological advances have made it possible to deploy large scale sensor networks consisting of a large number of low-cost, low-power, and multi-functional sensor nodes that communicate in short distances through wireless links. Such networks have a wide range of applications in civilian and military operations such as target tracking and battlefield surveillance. Many researchers have been attracted to develop protocols that can fulfill the requirements of these applications. Sensors’ locations play a critical role in many sensor network applications. Not only do applications such as environment monitoring and target tracking require sensors’ locations to accomplish their tasks, but several fundamental techniques in wireless sensor networks also require sensors’ locations. For example, in geographical routing (e.g., GPSR), sensor nodes make routing decisions at least partially based on their own and their neighbors’ locations. However, due to the cost reasons, it is not practical to have a GPS receiver on every sensor node. In the past several years, many location discovery protocols have been proposed to reduce or completely remove the dependence on GPS in wireless sensor networks. 4.2.2 Location aware routing The advancement in wireless communication and economical, portable computing devices has made mobile computing possible. One research issue that has attracted a lot of attention recently is the design of mobile ad hoc network (MANET). A MANET is one consisting of a set of mobile hosts which can communicate with one another and roam around at their will. No base stations are supported in such an environment. Due to considerations such as radio power limitation, power consumption, and channel utilization, a mobile host may not be able to communicate directly with other hosts in a single-hop fashion. In this case, a multi-hop scenario occurs, where the packets sent by the source host are relayed by several intermediate hosts before reaching the destination host. Applications of MANETs occur in situations like battlefields or major disaster areas, where networks need to be deployed immediately but base stations or fixed network infrastructures are not available. A working group called “manet” has been formed by the Internet Engineering Task Force (IETF) to study the related issues and stimulate research in MANET.
  • 4. Behavioral Malware Detection… www.theijes.com The IJES Page 4 V. CONCLUSION AND FUTURE WORK Behavioral characterization of malware is an effective alternative to pattern matching in detecting malware, especially when dealing with polymorphic or obfuscated malware. Naive Bayesian model has been successfully applied in non-DTN settings, such as filtering email spams and detecting botnets. We propose a general behavioral characterization of DTN-based proximity malware. We present look-ahead, along with dogmatic filtering and adaptive look-ahead, to address two unique challenging in extending Bayesian filtering to DTNs: “insufficient evidence vs. evidence collection risk” and “filtering false evidence sequentially and distributedly”. In prospect, extension of the behavioral characterization of proximity malware to account for strategic malware detection evasion with game theory is a challenging yet interesting future work. REFERENCES [1] Chun-jen Chung, jeogkeun Lee and Dijiang Huang,”NICE:Network Intrusion Detection and Countermeasure Selection in Virtual Network System”, IEEE trans.Dependable And Secure Computing, vol. 610,no.4, July/August2013. [2] N. Poolsappasit, R. Dewri, and I. Ray, “Dynamic Security RiskManagement Using Bayesian Attack Graphs,” IEEE Trans.Dependable and Secure Computing, vol. 9, no. 1, pp. 61-74, Feb. 2012. [3] L. Wang, A. Liu, and S. Jajodia, “Using Attack Graphs for Correlating, Hypothesizing, and Predicting Intrusion Alerts,”Computer Comm., vol. 29, no. 15, pp. 2917-2933, Sept. 2006. [4] R. Sadoddin and A. Ghorbani, “Alert Correlation Survey: Frameworkand Techniques,” Proc. ACM Int’l Conf. Privacy, Security andTrust: Bridge the Gap between PST Technologies and Business Services (PST ’06), pp. 37:1-37:10, 2006. [5] S. Roschke, F. Cheng, and C. Meinel,“A New Alert CorrelationAlgorithm Based on Attack Graph,” Proc. Fourth Int’l Conf.Computational Intelligence in Security for Information Systems, pp. 58-67 2011. [6] A. Roy, D.S. Kim, and K. Trivedi, “Scalable Optimal Countermeasure Selection Using Implicit Enumeration on Attack Countermeasure Trees,” Proc. IEEE Int’l Conf. Dependable Systems Networks (DSN ’12), June 2012. [7] Wi-Fi Alliance. Wi-Fi Direct. [Online]. Available: http: //goo.gl/fZuyE [8] C. Kolbitsch, P. Comparetti, C. Kruegel, E. Kirda, X. Zhou,and X. Wang, “Effective and efficient malware detection at the end host,” in Proc. USENIX Security, 2009. [9] U. Bayer, P. Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda, “Scalable, behavior-based malware clustering,” in Proc. IEEE NDSS, 2009. [10] D. Dash, B. Kveton, J. Agosta, E. Schooler, J. Chandrashekar, A. Bachrach, and A. Newman, “When gossip is good: Distributed probabilistic inference for detection of slow network intrusions,” in Proc. AAAI, 2006. [11] G. Zyba, G. Voelker, M. Liljenstam, A. M´ehes, and P. Johansson, “Defending mobile phones from proximity malware,” in Proc. IEEE INFOCOM, 2009. [12] F. Li, Y. Yang, and J. Wu, “CPMC: an efficient proximity malware coping scheme in smartphone-based mobile networks,” in Proc. IEEE INFOCOM, 2010. [13] I. Androutsopoulos, J. Koutsias, K. Chandrinos, and C. Spyropoulos, “An experimental comparison of naive bayesian and keyword- based anti-spam filtering with personal e-mail messages,” in Proc. ACM SIGIR, 2000. [14] P. Graham. Better Bayesian filtering. [Online]. Available: http://goo.gl/AgHkB [15] J. Zdziarski, Ending spam: Bayesian content filtering and the art of statistical language classification. No Starch Press, 2005. [16] R. Villamar´ın-Salom´on and J. Brustoloni, “Bayesian bot detection based on DNS traffic similarity,” in Proc. ACM SAC.