Delay Tolerant Networking (DTN) is pioneered as
an approach in network architecture to address the technical
problems in non-homogeneous networks that may reduce
continuous network connectivity. The behavioral
characterization of malware based on Naive Bayesian model
is an alternative approach to pattern matching for detecting
proximity malware. Computer is an important part of an
everyday life to many people across the world. Computer in
the hand of consumer to lack the knowledge of protection
tools and to have limited administrator skill are vulnerable to
Virus attack .these system are extremely valuable to
intruders as they have lot of secret personal information
about the users. Attacker exploit vulnerabilities in the
software layers to install malicious program on users
Machine to steal secret data for financial gains. Security
protocols have been in place for some time to counter the
threat posed by the attack however, despite the presence of
such measures; the number of attacks on consumer computer
is growing rapidly. A recent trend in attacks has been the
attempt to disable security protocol In a place at the host
machine. This type of attacks leaves the host computer
completely defenseless and vulnerable to many further
exploits through the internet.
Published In : IJCAT Journal Volume 3, Issue 3
Date of Publication : March 2016
Pages : 134 - 136
Figures :01
Tables : --
Publication Link :Behavioral Malware Detection in Delay-Tolerant
Networks
Najim Sheikh : M-Tech 1st RGPV
Priya Patil : BE RTMNU
Sneha Pillewan : BE RTMNU
Suman Suryavanshi : BE RTMNU
Vaishnavi Nilapwar : BE RTMNU
DTN, Signature-Based Malware Detection
Techniques
In this survey a series of malware detection techniques
have been presented. The problems related to traditional
signature based detection method is also highlighted. Rate
of new malware’s causing destruction to systems
worldwide is increasing at alarming rate. Detection of
malware’s changing their signatures frequently has posed
many open research issues. Challenge lies in the
development of good disassemble, similarity analysis
algorithm so that the variants of malware’s can be detected
in shorter time there by reducing the computation over
head. Behavioral characterization of malware is an
effective alternative to pattern matching in detecting
malware, especially when dealing with polymorphic or
obfuscated malware. Naive Bayesian model has been
successfully applied in non-DTN settings. The general
behavioral characterization of DTN-based proximity
malware with look ahead proposed, along with dogmatic
filtering and adaptive look ahead, to address two unique
challenging in extending Bayesian filtering to DTNs:
“insufficient evidence versus evidence collection risk” and
“filtering false evidence sequentially and in a distribute
manner.”
[1] Trend Micro Inc. SYMBOS_CABIR.A.,
http://goo.gl/aHcES, 2004.
[2] http://goo.gl/iqk7, 20 13.
[3] Trend Micro Inc. IOS_IKEE.A., http://goo.gl/z0j56,
2009.
[4] P. Akritidis, W. Chin, V. Lam, S. Sidiroglou, and K.
Anagnostakis, “Proximity Breeds Danger: Emerging
Threats in Metro-Area Wireless Networks,” Proc. 16th
USENIX Security Sympssssss., 2007.
[5] A. Lee, “FBI Warns: New Malware Threat Targets
Travelers, Infects via Hotel Wi-Fi,” http://goo.gl/D8vNU,
2012.
[6] NFC Forum.about NFC, http://goo.gl/zSJqb, 2013.