{"id":5505,"date":"2023-08-25T18:35:47","date_gmt":"2023-08-25T18:35:47","guid":{"rendered":"https:\/\/getmyprojects.in\/projects\/?post_type=product&#038;p=5505"},"modified":"2023-10-26T10:56:26","modified_gmt":"2023-10-26T05:26:26","slug":"behavioral-malware-detection-in-delay-tolerant-networks","status":"publish","type":"product","link":"https:\/\/getmyprojects.in\/projects\/product\/behavioral-malware-detection-in-delay-tolerant-networks\/","title":{"rendered":"Behavioral Malware Detection in Delay Tolerant Networks"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"color: #000000;\">The delay-tolerant-network (DTN) model is becoming a viable communication alternative to the traditional infrastructural model for modern mobile consumer electronics equipped with short-range communication technologies such as Bluetooth, NFC, and Wi-Fi Direct. Proximity malware is a class of malware that exploits the opportunistic contacts and distributed nature of DTNs for propagation. Behavioral characterization of malware is an effective alternative to pattern matching in detecting malware, especially when dealing with polymorphic or obfuscated malware.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">In this project, we first propose a general behavioral characterization of proximity malware which based on naive Bayesian model, which has been successfully applied in non-DTN settings such as filtering email spams and detecting botnets. We identify two unique challenges for extending Bayesian malware detection to DTNs (\u201cinsufficient evidence versus evidence collection risk\u201d and \u201cfiltering false evidence sequentially and distributedly\u201d), and propose a simple yet effective method, look ahead, to address the challenges. Furthermore, we propose two extensions to look ahead, dogmatic filtering, and adaptive look ahead, to address the challenge of \u201cmalicious nodes sharing false evidence.\u201d Real mobile network traces are used to verify the effectiveness of the proposed methods.<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li><span style=\"color: #000000;\">Behavioral characterization, in terms of system call and program flow, has been previously proposed as an effective alternative to pattern matching for malware detection.<\/span><\/li>\n<li><span style=\"color: #000000;\">In our model, malware-infected nodes\u2019 behaviors are observed by others during their multiple opportunistic encounters: Individual observations may be imperfect, but abnormal behaviors of infected nodes are identifiable in the long-run.<\/span><\/li>\n<li><span style=\"color: #000000;\">I identify the challenges for extending Bayesian malware detection to DTNs, and propose a simple yet effective method, look-ahead, to address the challenges.<\/span><\/li>\n<li><span style=\"color: #000000;\">Furthermore, I propose two extensions to look-ahead, dogmatic filtering and adaptive look-ahead, to address the challenge of \u201cmalicious nodes sharing false evidence\u201d.<\/span><\/li>\n<li><span style=\"color: #000000;\">Assessments come from two models. 1. Household watch 2. Neighborhood watch. The Household watch source node\u2019s own assessments only. The Neighborhood watch source node own assessments with its neighbors&#8217;.<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><strong>\u00a0<\/strong><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<table>\n<tbody>\n<tr>\n<th><strong>Project Name<\/strong><\/th>\n<td>Behavioral Malware Detection in Delay Tolerant Networks<\/td>\n<\/tr>\n<tr class=\"alt\">\n<th><strong>Front End\u00a0<\/strong><\/th>\n<td><\/td>\n<\/tr>\n<tr>\n<th><strong>Back End<\/strong><\/th>\n<td><\/td>\n<\/tr>\n<tr class=\"alt\">\n<th><strong>Software<\/strong><\/th>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":5898,"comment_status":"open","ping_status":"closed","template":"","meta":{"inline_featured_image":false},"product_cat":[29,28],"product_tag":[369,370,371,372,373,374,375,307,376,377,378,379,380,381,33,382,383,384,385,386,45,387,388,389,390,391],"_links":{"self":[{"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product\/5505"}],"collection":[{"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/comments?post=5505"}],"version-history":[{"count":2,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product\/5505\/revisions"}],"predecessor-version":[{"id":6387,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product\/5505\/revisions\/6387"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/media\/5898"}],"wp:attachment":[{"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/media?parent=5505"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product_cat?post=5505"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product_tag?post=5505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}