SlideShare a Scribd company logo
Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices 
Optimal Distributed Malware Defense in Mobile Networks with 
Heterogeneous Devices 
As malware attacks become more frequently in mobile networks, deploying an efficient defense 
system to protect against infection and to help the infected nodes to recover is important to 
prevent serious spreading and outbreaks. The technical challenges are that mobile devices are 
heterogeneous in terms of operating systems, the malware infects the targeted system in any 
opportunistic fashion via local and global connectivity, while the to-be-deployed defense system 
on the other hand would be usually resource limited. In this paper, we investigate the problem of 
how to optimally distribute the content-based signatures of malware, which helps to detect the 
corresponding malware and disable further propagation, to minimize the number of infected 
nodes. We model the defense system with realistic assumptions addressing all the above 
challenges that have not been addressed in previous analytical work. Based on the framework of 
optimizing the system welfare utility, which is the weighted summation of individual utility 
depending on the final number of infected nodes through the signature allocation, we propose an 
encounter-based distributed algorithm based on Metropolis sampler. Through theoretical analysis 
and simulations with both synthetic and realistic mobility traces, we show that the distributed 
algorithm achieves the optimal solution, and performs efficiently in realistic environments. 
Mobile malware can propagate through two different dominant approaches. Via MMS, a 
malware may send a copy of itself to all devices whose numbers are found in the address book of 
the infected handset. This kind of malware propagates in the social graph formed by the address 
books, and can spread very quickly without geographical limitations. 
The other approach is to use the short-range wireless media such as Bluetooth to infect the 
devices in proximity as “proximity malware.” 
Recent work of Wang et al. has investigated the proximity malware propagation features, and 
finds that it spreads slowly because of the human mobility, which offers ample opportunities to 
Contact: 9703109334, 9533694296 
ABSTRACT: 
EXISTING SYSTEM: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices 
deploy the defense system. However, the approach for efficiently deploying such a system is still 
an ongoing research problem. 
DISADVANTAGES OF EXISTING SYSTEM: 
 There is a problem for optimal signature distribution to defend mobile networks 
against the propagation of both proximity and MMS-based malware. 
 The existing system offers only protection against only one attack at a time. 
 To Design a defense system for both MMS and proximity malware. Our research 
problem is to deploy an efficient defense system to help infected nodes to recover and 
prevent healthy nodes from further infection. 
 We formulate the optimal signature distribution problem with the consideration of the 
heterogeneity of mobile devices and malware, and the limited resources of the defense 
system. Moreover, our formulated model is suitable for both the MMS and proximity 
malware propagation. 
 We give a centralized greedy algorithm for the signature distribution problem. We prove 
that the proposed greedy algorithm obtains the optimal solution for the system, which 
provides the benchmark solution for our distributed algorithm design. 
 We propose an encounter-based distributed algorithm to disseminate the malware 
signatures using Metropolis sampler. It only relies on local information and opportunistic 
contacts. 
ADVANTAGES OF PROPOSED SYSTEM: 
 The system provides optimal signature distribution to defend mobile networks against the 
propagation of both proximity and MMS-based malware. 
Contact: 9703109334, 9533694296 
PROPOSED SYSTEM: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices 
 The proposed system offers protection against both MMS based attack and Bluetooth 
based attack at the same time. 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL 
Ong Li, Member, IEEE, Pan Hui, Member, IEEE, Depeng Jin, Member, IEEE, Li Su, and 
Lieguang Zeng, Member, IEEE. ”Optimal Distributed Malware Defense in Mobile Networks 
with Heterogeneous Devices”. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 
13, NO. 2, FEBRUARY 2014 
Contact: 9703109334, 9533694296 
REFERENCE: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in

More Related Content

DOCX
JPJ1451 Optimal Distributed Malware Defense in Mobile Networks with Heteroge...
DOCX
An optimal distributed malware defense system for mobile networks with hetero...
PDF
Malware propagation in large scale networks
DOCX
Malware propagation in large scale networks
PDF
Malware propagation in large scale networks
PDF
Secure and Reliable Data Transmission in Generalized E-Mail
PPTX
Malwareppt
JPJ1451 Optimal Distributed Malware Defense in Mobile Networks with Heteroge...
An optimal distributed malware defense system for mobile networks with hetero...
Malware propagation in large scale networks
Malware propagation in large scale networks
Malware propagation in large scale networks
Secure and Reliable Data Transmission in Generalized E-Mail
Malwareppt

What's hot (20)

PPTX
Modeling and restraining of mobile virus propagation
PDF
A framework to detect novel computer viruses via system calls
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOCX
A stochastic model of multivirus dynamics
PDF
Detection and Prevention of Attacks in Wireless Sensor Networks: A Survey
PPTX
Wireless sensor network security issues
PDF
CONTROLLING IP FALSIFYING USING REALISTIC SIMULATION
PDF
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
PDF
Application of hardware accelerated extensible network nodes for internet wor...
PDF
@@@Rf8 polymorphic worm detection using structural infor (control flow gra...
PDF
Limiting self propagating malware based
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOC
Modeling & automated containment of worms(synopsis)
PPTX
dos attacks
PPT
Malware and Modern Propagation Techniques
PDF
Modeling and Containment of Uniform Scanning Worms
PDF
2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...
PDF
Automated worm fingerprinting
PDF
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
PDF
D43021519
Modeling and restraining of mobile virus propagation
A framework to detect novel computer viruses via system calls
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
A stochastic model of multivirus dynamics
Detection and Prevention of Attacks in Wireless Sensor Networks: A Survey
Wireless sensor network security issues
CONTROLLING IP FALSIFYING USING REALISTIC SIMULATION
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
Application of hardware accelerated extensible network nodes for internet wor...
@@@Rf8 polymorphic worm detection using structural infor (control flow gra...
Limiting self propagating malware based
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
Modeling & automated containment of worms(synopsis)
dos attacks
Malware and Modern Propagation Techniques
Modeling and Containment of Uniform Scanning Worms
2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...
Automated worm fingerprinting
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
D43021519
Ad

Viewers also liked (10)

PDF
PPT
Computer viruses
DOCX
2014 java ieee
PDF
An Antivirus API for Android Malware Recognition
PPTX
Artificial Intelligence in Virus Detection & Recognition
ODP
Scalability, Fidelity and Stealth in the DRAKVUF Dynamic Malware Analysis System
PDF
Malware Collection and Analysis via Hardware Virtualization
PPTX
Feasibility study
Computer viruses
2014 java ieee
An Antivirus API for Android Malware Recognition
Artificial Intelligence in Virus Detection & Recognition
Scalability, Fidelity and Stealth in the DRAKVUF Dynamic Malware Analysis System
Malware Collection and Analysis via Hardware Virtualization
Feasibility study
Ad

Similar to optimal distributed malware defense in mobile networks with heterogeneous devices (20)

PDF
X-ware: a proof of concept malware utilizing artificial intelligence
PDF
L018118083.new ramya publication (1)
PDF
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
DOCX
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
PDF
The Next Generation Cognitive Security Operations Center: Adaptive Analytic L...
PDF
An email worm vaccine architecture
PDF
network_security.docx_2.pdf
PDF
A network worm vaccine architecture
PDF
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
PDF
Intrusion Detection against DDoS Attack in WiMAX Network by Artificial Immune...
PDF
Data Mining For Intrusion Detection in Mobile Systems
PDF
Malware analysis and detection using reverse Engineering, Available at: www....
PDF
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
PDF
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
PDF
Virus detection based on virus throttle technology
PDF
Image Morphing: A Literature Study
PDF
Intrusion Detection System Using Self Organizing Map Algorithms
PDF
Intrusion Detection System Using Self Organizing Map Algorithms
DOCX
Journal of Computer and System Sciences 80 (2014) 973–993Con
X-ware: a proof of concept malware utilizing artificial intelligence
L018118083.new ramya publication (1)
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
The Next Generation Cognitive Security Operations Center: Adaptive Analytic L...
An email worm vaccine architecture
network_security.docx_2.pdf
A network worm vaccine architecture
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Intrusion Detection against DDoS Attack in WiMAX Network by Artificial Immune...
Data Mining For Intrusion Detection in Mobile Systems
Malware analysis and detection using reverse Engineering, Available at: www....
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
Virus detection based on virus throttle technology
Image Morphing: A Literature Study
Intrusion Detection System Using Self Organizing Map Algorithms
Intrusion Detection System Using Self Organizing Map Algorithms
Journal of Computer and System Sciences 80 (2014) 973–993Con

More from swathi78 (20)

DOC
secure mining of association rules in horizontally distributed databases
DOCX
a system for denial-of-service attack detection based on multivariate correla...
DOCX
web service recommendation via exploiting location and qo s information
DOCX
privacy-enhanced web service composition
DOCX
friend book a semantic-based friend recommendation system for social networks
DOCX
efficient authentication for mobile and pervasive computing
DOCX
cooperative caching for efficient data access in disruption tolerant networks
DOCX
an incentive framework for cellular traffic offloading
DOCX
secure outsourced attribute-based signatures
DOCX
traffic pattern-based content leakage detection for trusted content delivery ...
DOCX
the design and evaluation of an information sharing system for human networks
DOCX
the client assignment problem for continuous distributed interactive applicat...
DOCX
sos a distributed mobile q&a system based on social networks
DOCX
securing broker-less publish subscribe systems using identity-based encryption
DOCX
rre a game-theoretic intrusion response and recovery engine
DOCX
on false data-injection attacks against power system state estimation modelin...
DOCX
loca ward a security and privacy aware location-based rewarding system
DOCX
exploiting service similarity for privacy in location-based search queries
DOCX
enabling trustworthy service evaluation in service-oriented mobile social net...
DOCX
secure data retrieval for decentralized disruption-tolerant military networks
secure mining of association rules in horizontally distributed databases
a system for denial-of-service attack detection based on multivariate correla...
web service recommendation via exploiting location and qo s information
privacy-enhanced web service composition
friend book a semantic-based friend recommendation system for social networks
efficient authentication for mobile and pervasive computing
cooperative caching for efficient data access in disruption tolerant networks
an incentive framework for cellular traffic offloading
secure outsourced attribute-based signatures
traffic pattern-based content leakage detection for trusted content delivery ...
the design and evaluation of an information sharing system for human networks
the client assignment problem for continuous distributed interactive applicat...
sos a distributed mobile q&a system based on social networks
securing broker-less publish subscribe systems using identity-based encryption
rre a game-theoretic intrusion response and recovery engine
on false data-injection attacks against power system state estimation modelin...
loca ward a security and privacy aware location-based rewarding system
exploiting service similarity for privacy in location-based search queries
enabling trustworthy service evaluation in service-oriented mobile social net...
secure data retrieval for decentralized disruption-tolerant military networks

Recently uploaded (20)

PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
additive manufacturing of ss316l using mig welding
PDF
Well-logging-methods_new................
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
Digital Logic Computer Design lecture notes
PDF
composite construction of structures.pdf
PPTX
CH1 Production IntroductoryConcepts.pptx
PPT
Mechanical Engineering MATERIALS Selection
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Geodesy 1.pptx...............................................
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Construction Project Organization Group 2.pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPT
Project quality management in manufacturing
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Model Code of Practice - Construction Work - 21102022 .pdf
additive manufacturing of ss316l using mig welding
Well-logging-methods_new................
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Digital Logic Computer Design lecture notes
composite construction of structures.pdf
CH1 Production IntroductoryConcepts.pptx
Mechanical Engineering MATERIALS Selection
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Geodesy 1.pptx...............................................
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Construction Project Organization Group 2.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Automation-in-Manufacturing-Chapter-Introduction.pdf
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Project quality management in manufacturing

optimal distributed malware defense in mobile networks with heterogeneous devices

  • 1. Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices As malware attacks become more frequently in mobile networks, deploying an efficient defense system to protect against infection and to help the infected nodes to recover is important to prevent serious spreading and outbreaks. The technical challenges are that mobile devices are heterogeneous in terms of operating systems, the malware infects the targeted system in any opportunistic fashion via local and global connectivity, while the to-be-deployed defense system on the other hand would be usually resource limited. In this paper, we investigate the problem of how to optimally distribute the content-based signatures of malware, which helps to detect the corresponding malware and disable further propagation, to minimize the number of infected nodes. We model the defense system with realistic assumptions addressing all the above challenges that have not been addressed in previous analytical work. Based on the framework of optimizing the system welfare utility, which is the weighted summation of individual utility depending on the final number of infected nodes through the signature allocation, we propose an encounter-based distributed algorithm based on Metropolis sampler. Through theoretical analysis and simulations with both synthetic and realistic mobility traces, we show that the distributed algorithm achieves the optimal solution, and performs efficiently in realistic environments. Mobile malware can propagate through two different dominant approaches. Via MMS, a malware may send a copy of itself to all devices whose numbers are found in the address book of the infected handset. This kind of malware propagates in the social graph formed by the address books, and can spread very quickly without geographical limitations. The other approach is to use the short-range wireless media such as Bluetooth to infect the devices in proximity as “proximity malware.” Recent work of Wang et al. has investigated the proximity malware propagation features, and finds that it spreads slowly because of the human mobility, which offers ample opportunities to Contact: 9703109334, 9533694296 ABSTRACT: EXISTING SYSTEM: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 2. Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices deploy the defense system. However, the approach for efficiently deploying such a system is still an ongoing research problem. DISADVANTAGES OF EXISTING SYSTEM:  There is a problem for optimal signature distribution to defend mobile networks against the propagation of both proximity and MMS-based malware.  The existing system offers only protection against only one attack at a time.  To Design a defense system for both MMS and proximity malware. Our research problem is to deploy an efficient defense system to help infected nodes to recover and prevent healthy nodes from further infection.  We formulate the optimal signature distribution problem with the consideration of the heterogeneity of mobile devices and malware, and the limited resources of the defense system. Moreover, our formulated model is suitable for both the MMS and proximity malware propagation.  We give a centralized greedy algorithm for the signature distribution problem. We prove that the proposed greedy algorithm obtains the optimal solution for the system, which provides the benchmark solution for our distributed algorithm design.  We propose an encounter-based distributed algorithm to disseminate the malware signatures using Metropolis sampler. It only relies on local information and opportunistic contacts. ADVANTAGES OF PROPOSED SYSTEM:  The system provides optimal signature distribution to defend mobile networks against the propagation of both proximity and MMS-based malware. Contact: 9703109334, 9533694296 PROPOSED SYSTEM: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 3. Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices  The proposed system offers protection against both MMS based attack and Bluetooth based attack at the same time. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL Ong Li, Member, IEEE, Pan Hui, Member, IEEE, Depeng Jin, Member, IEEE, Li Su, and Lieguang Zeng, Member, IEEE. ”Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices”. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 13, NO. 2, FEBRUARY 2014 Contact: 9703109334, 9533694296 REFERENCE: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 4. Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices Contact: 9703109334, 9533694296 Email id: academicliveprojects@gmail.com, www.logicsystems.org.in