首页    期刊浏览 2024年12月02日 星期一
登录注册

文章基本信息

  • 标题:Behavioral Game and Signature Verification for Effective Malware Detection in DTN
  • 本地全文:下载
  • 作者:B.Senthil Kumar ; Dina Stephan K
  • 期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
  • 印刷版ISSN:2320-9798
  • 电子版ISSN:2320-9801
  • 出版年度:2015
  • 卷号:3
  • 期号:11
  • DOI:10.15680/IJIRCCE.2015.0311128
  • 出版社:S&S Publications
  • 摘要:Delay tolerant network utilize the mobility of node and opportunistic contact among nodes for datacommunication. Due to this nature of DTNs, malware based attacks are increased tremendously. In modern network themalware is one of the life-threatening issues and it can be identified by many characters. Such character based issuesare named as email spam, Denial of service and Trojan like viruses. Now a day’s DTN (Delay Tolerant Network) issuffering from the above malware related issues. So defending those malware attacks using novel techniques is themain aim, of our proposed system. In order to thwart those attacks in DTN, our system introduces a new HybridMalware Detection and Removal technique in DTN named as HMDR. The proposed system deals with severalmalware detection issues and identifies the misbehaving nodes by collecting and validating their evidence usingeffective signature scheme. The hybrid malware detection and removal techniques analyses every node along with thebehavioral score using behavioral game theory. The proposed system uses a hybrid malware detection and removaltechnique to find and remove the malware. In HMDR, each node in the DTN itself checks for the malware, and nodecarry the acknowledgement when they completes the verification, and signature will be appended if their verification issuccessful. If node exceeds the behavioural score then declare that the node is a malicious, this information will bedisseminated to other nodes. To avoid further transmission from those nodes, HMDR put node information into theblacklist. No more than packets accept from attacker node. These are all the mechanisms effectively integrated againstthe malwares in DTN. The results show that the hybrid technique increases the efficiency and reduces the verificationtime.
  • 关键词:Delay and Disruption Tolerant (DTN); Malware detection; malware removal; Game theory; signature;schemes.
国家哲学社会科学文献中心版权所有