Paper Title :Identification Of Heterogeneous Malicious Nodes In The Crucial Dynamic Environment For Protecting Local And Remote Systems
Author :A.Edwinrobert, M.Hemalatha
Article Citation :A.Edwinrobert ,M.Hemalatha ,
(2014 ) " Identification Of Heterogeneous Malicious Nodes In The Crucial Dynamic Environment For Protecting Local And Remote Systems " ,
International Journal of Advance Computational Engineering and Networking (IJACEN) ,
pp. 35-38,
Volume-2,Issue-4
Abstract : Abstract: Computer Software applications are a heterogeneous emerging trend, third party software applications are
increasing more and more today. Due to the enhancement in existing software applications, it must be integrated with COTS
[Commercial off the Shelf] products. Sharing of information takes place between each Corporate for doing their concerns
routine work for their development. As sharing of information takes place in their routine work, there is a chance for the
intruders getting into the official Websites and also in the concern’s database. Also the intruder injects different categories of
malicious code through programs written in HLL [High Level Languages].As a consequence of this the kernel of the
operating system, system registry and various disk partitions get crashed. This leads to memory duplication and
inconsistency in maintaining official data. The proposed approaches such as FECB [Fish Eye Code Behavior], EMDT
[Efficient Malware Detector and Tracer] and MCBA [Malicious Code Behavior Analysis] are the novel approaches that are
implemented to identify the number of Malicious files in Local host and Packets in the Remote host and heal the malware.
Detecting and tracing the Malware behavior based on virus signatures and finally the Malicious packets [encrypted or
decrypted] delivered to and fro in the network can be identified, traced and healed automatically by the method of intrusion
detection algorithm. From the above explained techniques the behavior of malicious codes can be broadly divided into
Benign and Suspicious files respectively. These two files are segregated and stored separately in the buffer to count the loss
of packets, calculate Detection Rate and for estimation of the fitness value.
Type : Research paper
Published : Volume-2,Issue-4
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-595
View Here
Copyright: © Institute of Research and Journals
|
|
| |
|
PDF |
| |
Viewed - 39 |
| |
Published on 2014-04-12 |
|