International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014

Malware Detection and Tracer Approach for Operating System

Dokuparthi Prasanthi, V. Rama Krishna

Modern computer systems are built on a foundation of software components from a variety of vendors. While critical applications might undergo extensive testing and evaluation procedures, the heterogeneity of software sources hazardous the integrity of the execution environment for these trusted programs. For instance, if an attacker can be able to merge an application exploit with privilege increase vulnerability, the Operating System (OS) can become corrupted. Mandatory Access Control (MAC) in a commercial operating system to handle malware problem is a challenge but also a capable approach. The firmest barriers to apply MAC to defeat malware programs are the incompatible and unusable problems in existing MAC systems. The aim of our study is to address these issues design a novel Efficient Malware Detection and Tracer design (EMDT) using Hidden Markov model, which incorporates intrusion detection and tracing in an operating system. In this proposed approach conceptually consists of three actions: tracing, detecting and restricting deduced intruders.The novelty of the proposed study is that it leverages light-weight intrusion detection and tracing techniques to automate security label configuration that is widely acknowledged as a tough issue when applying a MAC system in practice. The other is that, rather than controlling information flow as a traditional MAC does, it traces intruders and restricts only their significant malware behaviours, where intruders characterize processes and executables that are potential agents of a remote attacker. Our prototyping and testings on Windows operating system show that Tracer can effectively defeat all malware samples tested via blocking malware behaviours while not causing a significant compatibility problem.

Keywords: Detection, intrusion, malware, tracing, vulnerability

Edition: Volume 3 Issue 9, September 2014

Pages: 1779 - 1783


How to Cite this Article?

Dokuparthi Prasanthi, V. Rama Krishna, "Malware Detection and Tracer Approach for Operating System", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP14492, Volume 3 Issue 9, September 2014, 1779 - 1783

28 PDF Views | 29 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Detection'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2623 - 2629

Object Detection and Pose Tracking In Augmented Reality

Vipul P.Chauhan, Dr. Manish M. Kayasth

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2352 - 2357

RS and OFDM Methods Over Encrypted and Data Embedded Video Streams

Jithya J. Prakash, Hemand E. P.

Share this article



Similar Articles with Keyword 'intrusion'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1860 - 1864

An Improved Real Time Method for Detection, Blocking and Traceback of Malicious Traffic Over TOR

Rinaj Gafoor, Charlse M Varghese

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1317 - 1328

An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Shaik Shanawaz, K. Thyagarajan

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1045 - 1051

Detecting Sinkhole and Selective Forwarding Attack in Wireless Sensor Networks

Umashri Karkikatti, Dr. Nalini N

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2071 - 2074

Survey on DDoS Attack in Cloud Network

Monalisa Shinde, Shripadrao Biradar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1292 - 1295

To Enhance Lifetime of WSN Using Multi-Hop Routing and Trust-Based Intrusion Detection

Sanghavi Parkhi, Hemlata Dakhore

Share this article



Similar Articles with Keyword 'malware'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1846 - 1849

An Innovative Technique to Detect Malicious Applications in Android

Sharvari Prakash Chorghe, Dr. Narendra Shekokar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 2792 - 2799

NASAM: Novel Approach to Secure Android Devices from Malware based on Apps Behaviour

Sagar Vitthal Shinde, Amrita A. Manjrekar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2302 - 2306

VILEEAR: Detection of Drive by Download attack on Malicious Web Pages

Chirag R. Desai, Dr. Narendra M. Shekokar

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 873 - 877

Enhanced Training Phase Reduction with Feature Filtering for Malware Detection Using Ensemble SVM

Shital Kuber, Prof. Digambar Padulkar

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1899 - 1903

Design of Application to Detect Images Embedded with Malicious Programs

Robert T. R. Shoniwa, Geogen George

Share this article



Similar Articles with Keyword 'tracing'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 690 - 695

Active Watermarking Approach in Detecting Encrypted Traffic Attack by Making Correlation Scheme Robust

Saptshree Dengle, Dr. Santosh Lomte

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1087 - 1088

A Survey on the Various Techniques of Data Leakage Detection

Saranya S. Devan, Minu Lalitha Madhavu

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 830 - 833

A Novel Set Level Technique for Image Segmentation Using Fuzzy Clustering and Self Organizing Map Network

Nidhi Kaushal, Murlidhar Vishwakarma, Ravi Singh Pippal

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2508 - 2514

Lock and Forward Hierarchical Routing Algorithm in MANET

Vikrant Verma, Dr. Manoj Kumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 143 - 146

Offline Signature Verification Using Contour Tracing

Madhuri, Alok

Share this article



Similar Articles with Keyword 'vulnerability'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1285 - 1288

Integrity Attestation for Software-as-a Service Clouds

Chashu Mol R, Alfia A P

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1556 - 1561

A Survey on SQL Injection Attack Countermeasures Techniques

Aniruddh R. Ladole, D. A. Phalke

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1416 - 1420

Mitigation of CSRF Attack

Nikunj Tandel, Kalpesh Patel

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 511 - 516

Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset

Swapnali G. Game, S. B. Natikar

Share this article
Top