SlideShare a Scribd company logo
We developsComputer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
BehavioralMalware Detection in
Delay TolerantNetworks
Abstract:
The delay-tolerant-network (DTN) model is becoming a viable communication
alternative to the traditional infrastructural model for modern mobile consumer
electronics equipped with short-range communication technologies such as
Bluetooth, NFC, and Wi-Fi Direct. Proximity malware is a class of malware that
exploits the opportunistic contacts and distributed nature of DTNs for propagation.
Behavioral characterization of malware is an effective alternative to pattern
matching in detecting malware, especially when dealing with polymorphic or
obfuscated malware. In this paper, we first propose a general behavioral
characterization of proximity malware which based on Naive Bayesian model,
which has been successfully applied in non-DTN settings such as filtering email
spams and detecting botnets. We identify two unique challenges for extending
Bayesian malware detection to DTNs (“in sufficient evidence vs. evidence
collection risk” and “filtering false evidence sequentially and distributedly”), and
propose a simple yet effective method, look-ahead, to address the challenges.
Furthermore, we propose two extensions to look-ahead, dogmatic filtering and
adaptive look-ahead, to address the challenge of “malicious nodes sharing false
evidence”. Real mobile network traces are used to verify the effectiveness of the
proposedmethods.
We developsComputer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
EXISTING SYSTEM
Almost all the existing work on routing in delay tolerant networks
has focused on the problem of delivery of messages inside a single region,
characterized by the same network infrastructure and namespace. However, many
deployment scenarios, especially in developing regions, will probably involve
routing among different regions composed of several heterogeneous types of
network domains such as satellite networks and ad hoc networks composed of
short- range radio enabled devices, like mobile phones with Bluetooth interface
PROPOSED SYSTEM
We introduce a proposal for inter-region routing based on both
probabilistic and deterministic forwarding mechanisms, embedded in an
architectural frame- work able to support it. We also compare our solution to
existing approaches in delay tolerant networking, discussing the main requirements
and possible solutions, and outlining the open research problems.
We developsComputer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
MODULE DESCRIPTION:
1. Store and forward message switching
2. Delay-tolerant networking
3. Gateway
4. Routing
Store and forward message switching
Hold data until it has a scheduled transfer in network storage. Suppose not
view the message means delivery status is not received otherwise receives
status.
Delay-tolerant networking
A Delay-Tolerant Network (DTN) is a general-purpose overlay network that
operates on top of varying regional networks, including the Internet. DTNs allow
regional networks with varying delay characteristics to interoperate by providing
mechanisms to translate between their respective network parameters. Therefore,
the underlying protocols and technologies for these regional networks may differ
We developsComputer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
considerably, but the flexibility of the DTN architecture allows them to be
connected to each other.
Gateway
Gateway is designed to forward bundles between two or more DTN region
networks and may optionally act as a host. The bundle overlay of gateways must
have persistent storage and allow custody transfers. Gateways link together
networks that operate on different lower-layer protocols.
Router
Router works within a single DTN region and is responsible for forwarding
bundles.Such user requires persistent storage to queue and keep bundles until
outbound.
System Configuration:-
H/W System Configuration:-
We developsComputer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
Processor - Pentium–III
Speed - 1.1 Ghz
RAM - 256 MB(min)
Hard Disk - 20 GB
Floppy Drive - 1.44 MB
Key Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - SVGA
S/W SystemConfiguration:-
Operating System :Windows95/98/2000/XP
Application Server : Tomcat5.0/6.X
Front End : HTML, Java, Jsp
Scripts : JavaScript.
Server side Script : Java Server Pages.
Database : Mysql
We developsComputer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
Database Connectivity : JDBC.

More Related Content

PPTX
Behavioral malware detection in delay tolerant network
PPTX
Delay Tolerant Network (DTN)
DOCX
Delay Tolerant Network
PDF
Behavioral malware detection in delay tolerant networks
DOCX
Behavioral malware detection in delay tolerant networks
DOCX
Behavioral malware detection in delay tolerant networks
PPT
Dynamic trust management for delay tolerant networks and its application to s...
PPTX
Vehicular Delay Tolerant Network (VDTN): Routing Perspectives
Behavioral malware detection in delay tolerant network
Delay Tolerant Network (DTN)
Delay Tolerant Network
Behavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networks
Dynamic trust management for delay tolerant networks and its application to s...
Vehicular Delay Tolerant Network (VDTN): Routing Perspectives

What's hot (19)

PPTX
Delay and Disruption Tolerance and the Internet of Things
PDF
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
DOCX
WLAN IP and Frame
PPTX
Always Offline: Delay-Tolerant Networking for the Internet of Things
PDF
Lt2520382043
PDF
Enhancing msf for mobile ad hoc network security though active handshaking &a...
PDF
DOCX
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
PDF
Hiding message from hacker using novel network techniques
PDF
E42022125
PPTX
Abdullah Mukhtar ppt
PPT
Flooding attack manet
PPTX
Dynamic trust management for delay tolerant networks and its application to s...
PDF
Ensuring Privacy in opportunistic Network
PDF
Wormhole attack detection algorithms in wireless network coding systems
PDF
N0363079085
PDF
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Delay and Disruption Tolerance and the Internet of Things
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
WLAN IP and Frame
Always Offline: Delay-Tolerant Networking for the Internet of Things
Lt2520382043
Enhancing msf for mobile ad hoc network security though active handshaking &a...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
Hiding message from hacker using novel network techniques
E42022125
Abdullah Mukhtar ppt
Flooding attack manet
Dynamic trust management for delay tolerant networks and its application to s...
Ensuring Privacy in opportunistic Network
Wormhole attack detection algorithms in wireless network coding systems
N0363079085
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
International Journal of Computational Engineering Research(IJCER)
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Ad

Similar to Behavioral malware detection in delay tolerant networks (20)

DOCX
Preserving location privacy in geo social applications
PDF
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
DOC
Xs path navigation on xml schemas made easy
PDF
IEEE Projects 2012-2013 Network Security
DOC
Key aggregate cryptosystem for scalable data sharing in cloud storage
PDF
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
PDF
Security issues performance in ad hoc oddv
PDF
Module 1_BETCK105H_Introduction to IoT.pdf
PDF
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
PPTX
Introduction-to-Networking-and-types(junaid_ali)[1].pptx
PDF
Basic lecture
PDF
Networking tutorial
PDF
IJMNDI.2015.069218
DOCX
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
DOCX
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
PDF
Cnetworks
PDF
Basic networking tutorial
PDF
fmxhnkmcjbg,lBasics of network
Preserving location privacy in geo social applications
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
Xs path navigation on xml schemas made easy
IEEE Projects 2012-2013 Network Security
Key aggregate cryptosystem for scalable data sharing in cloud storage
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Security issues performance in ad hoc oddv
Module 1_BETCK105H_Introduction to IoT.pdf
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Introduction-to-Networking-and-types(junaid_ali)[1].pptx
Basic lecture
Networking tutorial
IJMNDI.2015.069218
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
Cnetworks
Basic networking tutorial
fmxhnkmcjbg,lBasics of network
Ad

More from Adz91 Digital Ads Pvt Ltd (20)

DOCX
2016 ieee java .net project titles
PDF
Java project ideas topics for computer engineering students
DOCX
Dotnet 2015 2016 2017 ieee project list-with abstract
PDF
Adz91 business opportunity presentation
PPTX
Efficient instant fuzzy search with proximity ranking
PDF
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
DOC
Supporting privacy protection in personalized web search
DOC
Shared authority based privacy preserving authentication protocol in cloud co...
DOCX
Securing broker less publish subscribe systems using identity-based encryption
DOCX
Secure outsourced attribute based signatures
DOC
Privacy preserving optimal meeting location determination on mobile devices
DOC
Privacy preserving optimal meeting location determination on mobile devices
DOC
Oruta privacy preserving public auditing for shared data in the cloud
DOC
Mining weakly labeled web facial images for search based face annotation
DOCX
Efficient authentication for mobile and pervasive computing
DOC
Decentralized access control with anonymous authentication of data stored in ...
DOCX
Decentralized access control of data stored in cloud using key policy attribu...
DOCX
Dealing with concept drifts in process mining
DOCX
Cloud assisted mobile-access of health data with privacy and auditability
DOC
Building confidential and efficient query services in the cloud with rasp dat...
2016 ieee java .net project titles
Java project ideas topics for computer engineering students
Dotnet 2015 2016 2017 ieee project list-with abstract
Adz91 business opportunity presentation
Efficient instant fuzzy search with proximity ranking
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
Supporting privacy protection in personalized web search
Shared authority based privacy preserving authentication protocol in cloud co...
Securing broker less publish subscribe systems using identity-based encryption
Secure outsourced attribute based signatures
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
Oruta privacy preserving public auditing for shared data in the cloud
Mining weakly labeled web facial images for search based face annotation
Efficient authentication for mobile and pervasive computing
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control of data stored in cloud using key policy attribu...
Dealing with concept drifts in process mining
Cloud assisted mobile-access of health data with privacy and auditability
Building confidential and efficient query services in the cloud with rasp dat...

Recently uploaded (20)

PDF
PPT on Performance Review to get promotions
PDF
Digital Logic Computer Design lecture notes
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
additive manufacturing of ss316l using mig welding
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPT
Mechanical Engineering MATERIALS Selection
DOCX
573137875-Attendance-Management-System-original
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPT on Performance Review to get promotions
Digital Logic Computer Design lecture notes
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
R24 SURVEYING LAB MANUAL for civil enggi
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
additive manufacturing of ss316l using mig welding
Automation-in-Manufacturing-Chapter-Introduction.pdf
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
CH1 Production IntroductoryConcepts.pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Foundation to blockchain - A guide to Blockchain Tech
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Mechanical Engineering MATERIALS Selection
573137875-Attendance-Management-System-original
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx

Behavioral malware detection in delay tolerant networks

  • 1. We developsComputer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra) BehavioralMalware Detection in Delay TolerantNetworks Abstract: The delay-tolerant-network (DTN) model is becoming a viable communication alternative to the traditional infrastructural model for modern mobile consumer electronics equipped with short-range communication technologies such as Bluetooth, NFC, and Wi-Fi Direct. Proximity malware is a class of malware that exploits the opportunistic contacts and distributed nature of DTNs for propagation. Behavioral characterization of malware is an effective alternative to pattern matching in detecting malware, especially when dealing with polymorphic or obfuscated malware. In this paper, we first propose a general behavioral characterization of proximity malware which based on Naive Bayesian model, which has been successfully applied in non-DTN settings such as filtering email spams and detecting botnets. We identify two unique challenges for extending Bayesian malware detection to DTNs (“in sufficient evidence vs. evidence collection risk” and “filtering false evidence sequentially and distributedly”), and propose a simple yet effective method, look-ahead, to address the challenges. Furthermore, we propose two extensions to look-ahead, dogmatic filtering and adaptive look-ahead, to address the challenge of “malicious nodes sharing false evidence”. Real mobile network traces are used to verify the effectiveness of the proposedmethods.
  • 2. We developsComputer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra) EXISTING SYSTEM Almost all the existing work on routing in delay tolerant networks has focused on the problem of delivery of messages inside a single region, characterized by the same network infrastructure and namespace. However, many deployment scenarios, especially in developing regions, will probably involve routing among different regions composed of several heterogeneous types of network domains such as satellite networks and ad hoc networks composed of short- range radio enabled devices, like mobile phones with Bluetooth interface PROPOSED SYSTEM We introduce a proposal for inter-region routing based on both probabilistic and deterministic forwarding mechanisms, embedded in an architectural frame- work able to support it. We also compare our solution to existing approaches in delay tolerant networking, discussing the main requirements and possible solutions, and outlining the open research problems.
  • 3. We developsComputer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra) MODULE DESCRIPTION: 1. Store and forward message switching 2. Delay-tolerant networking 3. Gateway 4. Routing Store and forward message switching Hold data until it has a scheduled transfer in network storage. Suppose not view the message means delivery status is not received otherwise receives status. Delay-tolerant networking A Delay-Tolerant Network (DTN) is a general-purpose overlay network that operates on top of varying regional networks, including the Internet. DTNs allow regional networks with varying delay characteristics to interoperate by providing mechanisms to translate between their respective network parameters. Therefore, the underlying protocols and technologies for these regional networks may differ
  • 4. We developsComputer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra) considerably, but the flexibility of the DTN architecture allows them to be connected to each other. Gateway Gateway is designed to forward bundles between two or more DTN region networks and may optionally act as a host. The bundle overlay of gateways must have persistent storage and allow custody transfers. Gateways link together networks that operate on different lower-layer protocols. Router Router works within a single DTN region and is responsible for forwarding bundles.Such user requires persistent storage to queue and keep bundles until outbound. System Configuration:- H/W System Configuration:-
  • 5. We developsComputer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra) Processor - Pentium–III Speed - 1.1 Ghz RAM - 256 MB(min) Hard Disk - 20 GB Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA S/W SystemConfiguration:- Operating System :Windows95/98/2000/XP Application Server : Tomcat5.0/6.X Front End : HTML, Java, Jsp Scripts : JavaScript. Server side Script : Java Server Pages. Database : Mysql
  • 6. We developsComputer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra) Database Connectivity : JDBC.