Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Presented by,
K.Surya,
951513405019.
ABSTRACT
From the aspect of malware, since some sophisticated malware
that can bypass the signature detection would emerge with the
development of the defense system, new defense mechanisms
will be required.
At the same time, our work considers the case of OS-targeting
malware. Although most of the current existing malware is OS
targeted, cross-OS malware will emerge and propagate in the
near future.
How to efficiently deploy the defense system with the
consideration of cross-OS malware is another important
problem
INTRODUCTION
Defense system distribute the optimal signature using special
nodes.
To deploy an efficient defense system to help infected nodes
to recover and prevent healthy nodes from further infection.
Avoiding whole network unnecessary redundancy using
distribute signatures.
The efficiency of our defense scheme in reducing the amount
of infected nodes in the system.
Security and authentication mechanisms should be considered.
EXISTING SYSTEM
Develop a simulation and analytic model for Bluetooth
worms, and show that mobility has a significant impact on the
propagation dynamics.
The former one has the limitations that signature flooding
costs too much and the local view of each node constrains the
global optimal solution.
Not using design of defence System to detect malware. Could
not optimally distribute the signatures.
PROPOSED SYSTEM
To deploy an efficient defense system to help infected nodes
to recover and prevent healthy nodes from further infection.
Introduce an optimal distributed solution to efficiently avoid
malware spreading and to help infected nodes to recover.
To encounter and diffuse the detected malware using digest
algorithm
It helps us to evaluate the malware free transmission
between nodes even helper nodes are also present
MODULES
Node Creation
Helper Creation
Distribute Signatures
Malware encounter and Digest
MODULES
DESCRIPTION
Node Creation:
Create a mobile networks including a number of nodes.
First defined number of nodes and also defined source node,
destination node, intermediate nodes.
The network contains heterogeneous devices as nodes.
Mobile nodes are more efficient to disseminate content and
information in the network.
Distribute Signatures:
This module is used to analyzing the malware nodes through
passing the signatures.
This signatures distributed for every intermediate node from
source node to destination node with the help of the special
node.
The special node is the helper node. Helper node distribute the
signatures for every intermediate nodes based on the file
contents key will be generated.
LITERATURE SURVEY