SlideShare a Scribd company logo
BEHAVIORAL MALWARE DETECTION IN DELAY TOLERANT NETWORKS Abstract: The delay-tolerant-network (DTN) model is becoming a viable communication alternative to the traditional infrastructural model for modern mobile consumer electronics equipped with short-range communication technologies such as Bluetooth, NFC, and Wi-Fi Direct. Proximity malware is a class of malware that exploits the opportunistic contacts and distributed nature of DTNs for propagation. Behavioral characterization of malware is an effective alternative to pattern matching in detecting malware, especially when dealing with polymorphic or obfuscated malware. In this paper, we first propose a general behavioral characterization of proximity malware which based on Naive Bayesian model, which has been successfully applied in non-DTN settings such as filtering email spams and detecting botnets. We identify two unique challenges for extending Bayesian malware detection to DTNs (“in sufficient evidence vs. evidence collection risk” and “filtering false evidence sequentially and distributedly”), and propose a simple yet effective method, look-ahead, to address the challenges. Furthermore, we propose two extensions to look-ahead, dogmatic filtering and adaptive look- ahead, to address the challenge of “malicious nodes sharing false evidence”. Real mobile network traces are used to verify the effectiveness of the proposed methods. EXISTING SYSTEM Almost all the existing work on routing in delay tolerant networks has focused on the problem of delivery of messages inside a single region, characterized by the same network infrastructure and namespace. However, many deployment scenarios, especially in developing regions, will probably involve routing among different regions composed of several heterogeneous types of network domains such as satellite networks and ad hoc networks composed of short- range radio enabled devices, like mobile phones with Bluetooth interface
PROPOSED SYSTEM We introduce a proposal for inter-region routing based on both probabilistic and deterministic forwarding mechanisms, embedded in an architectural frame- work able to support it. We also compare our solution to existing approaches in delay tolerant networking, discussing the main requirements and possible solutions, and outlining the open research problems. MODULE DESCRIPTION: 
1. Store and forward message switching 
2. Delay-tolerant networking 
3. Gateway 
4. Routing 
Store and forward message switching Hold data until it has a scheduled transfer in network storage. Suppose not view the message means delivery status is not received otherwise receives status. Delay-tolerant networking A Delay-Tolerant Network (DTN) is a general-purpose overlay network that operates on top of varying regional networks, including the Internet. DTNs allow regional networks with varying delay characteristics to interoperate by providing mechanisms to translate between their respective network parameters. Therefore, the underlying protocols and technologies for these regional networks may differ considerably, but the flexibility of the DTN architecture allows them to be connected to each other. Gateway 
Gateway is designed to forward bundles between two or more DTN region networks and may optionally act as a host. The bundle overlay of gateways must have persistent storage and allow custody transfers. Gateways link together networks that operate on different lower-layer protocols.
Router Router works within a single DTN region and is responsible for forwarding bundles.Such user requires persistent storage to queue and keep bundles until outbound. System Configuration:- H/W System Configuration:- Processor - Pentium –III Speed - 1.1 Ghz RAM - 256 MB(min) Hard Disk - 20 GB Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA S/W System Configuration:- Operating System :Windows95/98/2000/XP Application Server : Tomcat5.0/6.X Front End : HTML, Java, Jsp Scripts : JavaScript. Server side Script : Java Server Pages. Database : Mysql 
Database Connectivity : JDBC.

More Related Content

DOCX
Behavioral malware detection in delay tolerant networks
DOCX
Behavioral malware detection in delay tolerant networks
DOCX
Behavioral malware detection in delay tolerant networks
PPTX
Behavioral malware detection in delay tolerant network
DOCX
Delay Tolerant Network
PPTX
Delay tolerant networking
PPTX
Delay Tolerant Network (DTN)
DOCX
WLAN IP and Frame
Behavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant network
Delay Tolerant Network
Delay tolerant networking
Delay Tolerant Network (DTN)
WLAN IP and Frame

What's hot (20)

PDF
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
PPTX
Delay telerant network
PDF
Delay Tolerant Network - Journal
PPTX
Delay and Disruption Tolerance and the Internet of Things
PPTX
Basic concept of networking
PPT
934 Ch1 Networks
PPTX
Vehicular Delay Tolerant Network (VDTN): Routing Perspectives
PDF
Hiding message from hacker using novel network techniques
PDF
Enhancing msf for mobile ad hoc network security though active handshaking &a...
PPT
Rmdtn ppt
PDF
Router bridge
PPT
Opportunistic Networking
PPT
Dynamic trust management for delay tolerant networks and its application to s...
PDF
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
PPTX
Peer To Peer Protocols
PPTX
Network essentials chapter 4
PDF
Osi model
PDF
N0363079085
PPTX
P2P Lookup Protocols
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Delay telerant network
Delay Tolerant Network - Journal
Delay and Disruption Tolerance and the Internet of Things
Basic concept of networking
934 Ch1 Networks
Vehicular Delay Tolerant Network (VDTN): Routing Perspectives
Hiding message from hacker using novel network techniques
Enhancing msf for mobile ad hoc network security though active handshaking &a...
Rmdtn ppt
Router bridge
Opportunistic Networking
Dynamic trust management for delay tolerant networks and its application to s...
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
Peer To Peer Protocols
Network essentials chapter 4
Osi model
N0363079085
P2P Lookup Protocols
Ad

Viewers also liked (12)

DOC
Shared authority based privacy preserving authentication protocol in cloud co...
PDF
Secure outsourced attribute based signatures
DOCX
Certificateless remote anonymous authentication
PDF
A hybrid cloud approach for secure authorized deduplication
DOCX
Qos aware geographic opportunistic routing in wireless sensor networks
PDF
Cloud assisted mobile-access of health data with privacy and auditability
DOCX
Improved privacy preserving p2 p multimedia distribution based on recombined ...
DOC
Exploiting service similarity for privacy in location based search queries
DOC
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
DOCX
Secure and distributed data discovery and dissemination in wireless sensor ne...
PDF
Shakastech thesis titles 2016
DOC
Behavior rule specification based intrusion detection for safety critical med...
Shared authority based privacy preserving authentication protocol in cloud co...
Secure outsourced attribute based signatures
Certificateless remote anonymous authentication
A hybrid cloud approach for secure authorized deduplication
Qos aware geographic opportunistic routing in wireless sensor networks
Cloud assisted mobile-access of health data with privacy and auditability
Improved privacy preserving p2 p multimedia distribution based on recombined ...
Exploiting service similarity for privacy in location based search queries
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
Secure and distributed data discovery and dissemination in wireless sensor ne...
Shakastech thesis titles 2016
Behavior rule specification based intrusion detection for safety critical med...
Ad

Similar to Behavioral malware detection in delay tolerant networks (20)

PDF
E42022125
PDF
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
PDF
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
PDF
Distributeddatabasesforchallengednet
PDF
PDF
Content Sharing over Smartphone-Based Delay-Tolerant Networks
PDF
Ijciet 08 02_002
PDF
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
PDF
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
PDF
Delay‐Tolerant Routing in Opportunistic Delay‐Tolerant Routing in Opportunist...
PDF
Trabalho berckley
PDF
Advanced Computing Techonologies
PDF
Iaetsd a secured based information sharing scheme via
PDF
Delay tolerant network routing protocol a comprehensive survey with hybrid...
PDF
Delay Tolerant Networking routing as a Game Theory problem – An Overview
PPTX
Delay Tolerant Network - Presentation
PDF
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
PDF
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
PDF
dtn-180110112549.pdf
PDF
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
E42022125
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Distributeddatabasesforchallengednet
Content Sharing over Smartphone-Based Delay-Tolerant Networks
Ijciet 08 02_002
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
Delay‐Tolerant Routing in Opportunistic Delay‐Tolerant Routing in Opportunist...
Trabalho berckley
Advanced Computing Techonologies
Iaetsd a secured based information sharing scheme via
Delay tolerant network routing protocol a comprehensive survey with hybrid...
Delay Tolerant Networking routing as a Game Theory problem – An Overview
Delay Tolerant Network - Presentation
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
dtn-180110112549.pdf
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
DOCX
A Novel Framework for Credit Card.
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
DOCX
NS2 Final Year Project Titles 2023- 2024
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
DOCX
Latest Python IEEE Project Titles 2023-2024
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
A Review on Deep-Learning-Based Cyberbullying Detection
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Novel Framework for Credit Card.
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
NS2 Final Year Project Titles 2023- 2024
MATLAB Final Year IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Fighting Money Laundering With Statistics and Machine Learning.docx
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...

Recently uploaded (20)

PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Cell Structure & Organelles in detailed.
PPTX
Cell Types and Its function , kingdom of life
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
RMMM.pdf make it easy to upload and study
PDF
Classroom Observation Tools for Teachers
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Computing-Curriculum for Schools in Ghana
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
GDM (1) (1).pptx small presentation for students
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Cell Structure & Organelles in detailed.
Cell Types and Its function , kingdom of life
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
RMMM.pdf make it easy to upload and study
Classroom Observation Tools for Teachers
O5-L3 Freight Transport Ops (International) V1.pdf
human mycosis Human fungal infections are called human mycosis..pptx
2.FourierTransform-ShortQuestionswithAnswers.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Renaissance Architecture: A Journey from Faith to Humanism
Abdominal Access Techniques with Prof. Dr. R K Mishra
Computing-Curriculum for Schools in Ghana
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Module 4: Burden of Disease Tutorial Slides S2 2025
GDM (1) (1).pptx small presentation for students
O7-L3 Supply Chain Operations - ICLT Program
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf

Behavioral malware detection in delay tolerant networks

  • 1. BEHAVIORAL MALWARE DETECTION IN DELAY TOLERANT NETWORKS Abstract: The delay-tolerant-network (DTN) model is becoming a viable communication alternative to the traditional infrastructural model for modern mobile consumer electronics equipped with short-range communication technologies such as Bluetooth, NFC, and Wi-Fi Direct. Proximity malware is a class of malware that exploits the opportunistic contacts and distributed nature of DTNs for propagation. Behavioral characterization of malware is an effective alternative to pattern matching in detecting malware, especially when dealing with polymorphic or obfuscated malware. In this paper, we first propose a general behavioral characterization of proximity malware which based on Naive Bayesian model, which has been successfully applied in non-DTN settings such as filtering email spams and detecting botnets. We identify two unique challenges for extending Bayesian malware detection to DTNs (“in sufficient evidence vs. evidence collection risk” and “filtering false evidence sequentially and distributedly”), and propose a simple yet effective method, look-ahead, to address the challenges. Furthermore, we propose two extensions to look-ahead, dogmatic filtering and adaptive look- ahead, to address the challenge of “malicious nodes sharing false evidence”. Real mobile network traces are used to verify the effectiveness of the proposed methods. EXISTING SYSTEM Almost all the existing work on routing in delay tolerant networks has focused on the problem of delivery of messages inside a single region, characterized by the same network infrastructure and namespace. However, many deployment scenarios, especially in developing regions, will probably involve routing among different regions composed of several heterogeneous types of network domains such as satellite networks and ad hoc networks composed of short- range radio enabled devices, like mobile phones with Bluetooth interface
  • 2. PROPOSED SYSTEM We introduce a proposal for inter-region routing based on both probabilistic and deterministic forwarding mechanisms, embedded in an architectural frame- work able to support it. We also compare our solution to existing approaches in delay tolerant networking, discussing the main requirements and possible solutions, and outlining the open research problems. MODULE DESCRIPTION: 1. Store and forward message switching 2. Delay-tolerant networking 3. Gateway 4. Routing Store and forward message switching Hold data until it has a scheduled transfer in network storage. Suppose not view the message means delivery status is not received otherwise receives status. Delay-tolerant networking A Delay-Tolerant Network (DTN) is a general-purpose overlay network that operates on top of varying regional networks, including the Internet. DTNs allow regional networks with varying delay characteristics to interoperate by providing mechanisms to translate between their respective network parameters. Therefore, the underlying protocols and technologies for these regional networks may differ considerably, but the flexibility of the DTN architecture allows them to be connected to each other. Gateway Gateway is designed to forward bundles between two or more DTN region networks and may optionally act as a host. The bundle overlay of gateways must have persistent storage and allow custody transfers. Gateways link together networks that operate on different lower-layer protocols.
  • 3. Router Router works within a single DTN region and is responsible for forwarding bundles.Such user requires persistent storage to queue and keep bundles until outbound. System Configuration:- H/W System Configuration:- Processor - Pentium –III Speed - 1.1 Ghz RAM - 256 MB(min) Hard Disk - 20 GB Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA S/W System Configuration:- Operating System :Windows95/98/2000/XP Application Server : Tomcat5.0/6.X Front End : HTML, Java, Jsp Scripts : JavaScript. Server side Script : Java Server Pages. Database : Mysql Database Connectivity : JDBC.