Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014
Malware Detection and Tracer Approach for Operating System
Dokuparthi Prasanthi, V. Rama Krishna
Modern computer systems are built on a foundation of software components from a variety of vendors. While critical applications might undergo extensive testing and evaluation procedures, the heterogeneity of software sources hazardous the integrity of the execution environment for these trusted programs. For instance, if an attacker can be able to merge an application exploit with privilege increase vulnerability, the Operating System (OS) can become corrupted. Mandatory Access Control (MAC) in a commercial operating system to handle malware problem is a challenge but also a capable approach. The firmest barriers to apply MAC to defeat malware programs are the incompatible and unusable problems in existing MAC systems. The aim of our study is to address these issues design a novel Efficient Malware Detection and Tracer design (EMDT) using Hidden Markov model, which incorporates intrusion detection and tracing in an operating system. In this proposed approach conceptually consists of three actions: tracing, detecting and restricting deduced intruders.The novelty of the proposed study is that it leverages light-weight intrusion detection and tracing techniques to automate security label configuration that is widely acknowledged as a tough issue when applying a MAC system in practice. The other is that, rather than controlling information flow as a traditional MAC does, it traces intruders and restricts only their significant malware behaviours, where intruders characterize processes and executables that are potential agents of a remote attacker. Our prototyping and testings on Windows operating system show that Tracer can effectively defeat all malware samples tested via blocking malware behaviours while not causing a significant compatibility problem.
Keywords: Detection, intrusion, malware, tracing, vulnerability
Edition: Volume 3 Issue 9, September 2014
Pages: 1779 - 1783
How to Cite this Article?
Dokuparthi Prasanthi, V. Rama Krishna, "Malware Detection and Tracer Approach for Operating System", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP14492, Volume 3 Issue 9, September 2014, 1779 - 1783
28 PDF Views | 29 PDF Downloads
Similar Articles with Keyword 'Detection'
Object Detection and Pose Tracking In Augmented Reality
Vipul P.Chauhan, Dr. Manish M. Kayasth
Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks
Nikhita Nerkar, Vina M Lomte
RS and OFDM Methods Over Encrypted and Data Embedded Video Streams
Jithya J. Prakash, Hemand E. P.
Similar Articles with Keyword 'intrusion'
An Improved Real Time Method for Detection, Blocking and Traceback of Malicious Traffic Over TOR
Rinaj Gafoor, Charlse M Varghese
An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
Shaik Shanawaz, K. Thyagarajan
Detecting Sinkhole and Selective Forwarding Attack in Wireless Sensor Networks
Umashri Karkikatti, Dr. Nalini N
Survey on DDoS Attack in Cloud Network
Monalisa Shinde, Shripadrao Biradar
To Enhance Lifetime of WSN Using Multi-Hop Routing and Trust-Based Intrusion Detection
Sanghavi Parkhi, Hemlata Dakhore
Similar Articles with Keyword 'malware'
An Innovative Technique to Detect Malicious Applications in Android
Sharvari Prakash Chorghe, Dr. Narendra Shekokar
NASAM: Novel Approach to Secure Android Devices from Malware based on Apps Behaviour
Sagar Vitthal Shinde, Amrita A. Manjrekar
VILEEAR: Detection of Drive by Download attack on Malicious Web Pages
Chirag R. Desai, Dr. Narendra M. Shekokar
Enhanced Training Phase Reduction with Feature Filtering for Malware Detection Using Ensemble SVM
Shital Kuber, Prof. Digambar Padulkar
Design of Application to Detect Images Embedded with Malicious Programs
Robert T. R. Shoniwa, Geogen George
Similar Articles with Keyword 'tracing'
Active Watermarking Approach in Detecting Encrypted Traffic Attack by Making Correlation Scheme Robust
Saptshree Dengle, Dr. Santosh Lomte
A Survey on the Various Techniques of Data Leakage Detection
Saranya S. Devan, Minu Lalitha Madhavu
A Novel Set Level Technique for Image Segmentation Using Fuzzy Clustering and Self Organizing Map Network
Nidhi Kaushal, Murlidhar Vishwakarma, Ravi Singh Pippal
Lock and Forward Hierarchical Routing Algorithm in MANET
Vikrant Verma, Dr. Manoj Kumar
Offline Signature Verification Using Contour Tracing
Similar Articles with Keyword 'vulnerability'
A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Integrity Attestation for Software-as-a Service Clouds
Chashu Mol R, Alfia A P
A Survey on SQL Injection Attack Countermeasures Techniques
Aniruddh R. Ladole, D. A. Phalke
Mitigation of CSRF Attack
Nikunj Tandel, Kalpesh Patel
Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset
Swapnali G. Game, S. B. Natikar