International Journal of Advance Computational Engineering and Networking (IJACEN)
current issues
Volume-8,Issue-4  ( Apr, 2020 )
Past issues
  1. Volume-8,Issue-3  ( Mar, 2020 )
  2. Volume-8,Issue-2  ( Feb, 2020 )
  3. Volume-8,Issue-1  ( Jan, 2020 )
  4. Volume-7,Issue-12  ( Dec, 2019 )
  5. Volume-7,Issue-11  ( Nov, 2019 )
  6. Volume-7, Issue-10  ( Oct, 2019 )
  7. Volume-7, Issue-9  ( Sep, 2019 )
  8. Volume-7, Issue-8  ( Aug, 2019 )
  9. Volume-7, Issue-7  ( Jul, 2019 )
  10. Volume-7, Issue-6  ( Jun, 2019 )

Statistics report
Aug. 2020
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 87
Paper Published : 1231
No. of Authors : 3095
  Journal Paper

Paper Title
Identification Of Heterogeneous Malicious Nodes In The Crucial Dynamic Environment For Protecting Local And Remote Systems

Abstract: Computer Software applications are a heterogeneous emerging trend, third party software applications are increasing more and more today. Due to the enhancement in existing software applications, it must be integrated with COTS [Commercial off the Shelf] products. Sharing of information takes place between each Corporate for doing their concerns routine work for their development. As sharing of information takes place in their routine work, there is a chance for the intruders getting into the official Websites and also in the concern’s database. Also the intruder injects different categories of malicious code through programs written in HLL [High Level Languages].As a consequence of this the kernel of the operating system, system registry and various disk partitions get crashed. This leads to memory duplication and inconsistency in maintaining official data. The proposed approaches such as FECB [Fish Eye Code Behavior], EMDT [Efficient Malware Detector and Tracer] and MCBA [Malicious Code Behavior Analysis] are the novel approaches that are implemented to identify the number of Malicious files in Local host and Packets in the Remote host and heal the malware. Detecting and tracing the Malware behavior based on virus signatures and finally the Malicious packets [encrypted or decrypted] delivered to and fro in the network can be identified, traced and healed automatically by the method of intrusion detection algorithm. From the above explained techniques the behavior of malicious codes can be broadly divided into Benign and Suspicious files respectively. These two files are segregated and stored separately in the buffer to count the loss of packets, calculate Detection Rate and for estimation of the fitness value.

Author - A.Edwinrobert, M.Hemalatha

| PDF |
Viewed - 33
| Published on 2014-04-12
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World