IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Contact Us
CONTACT

IJSTR >> Volume 8 - Issue 11, November 2019 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Nasn: A Novel Approach For Securing Network From Malware Injection

[Full Text]

 

AUTHOR(S)

Nooh Bany Muhammad

 

KEYWORDS

Malware detection, Malware protection, Artificial Neural Network, Networks Security, Malware prevention, Internet security, secure communications.

 

ABSTRACT

With immense globalization and the fast growth of technologies, the world is now running with the real time technologies which means the communication made over the internet and the data is fetched simultaneously from the website. There are different websites which include the vulnerability of hosting the suspicious activities like hosting of the Malware or Worm which cause serious effect on the running system. Malware is such a threat which is injected silently and creates a massive affect on the system by creating different types of syndrome on the system like the system slow down, unexpected shut down and even the data breach. Data breach is actually the main target of the hackers through which the hacker steals data from the database and flies off. This is because of unsecured network protection and unreliable software hosting on system. So, to make the system secure over the network the protection should be upgraded with new approach so that the unauthorized access to the network can be restricted. As the hackers leave no stamp for their identification, so after the data breach takes place, the IP of the hacker cannot be recognized. This is the reason for which the hackers are hard to be recognized. There are different approaches to prevent the suspicious access but most of them are basically cracked by the data hijackers. In this paper, the discussion and the approach are made through which the unauthorized access can be obstructed and thereby the probability of hijacking of the host system can be minimized by using the Artificial Neural Network.

 

REFERENCES

[1] G. O. Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),” in Plastics, 2nd ed. vol. 3, J. Peters, Ed. New York: McGraw-Hill, 1964, pp. 15–64.
[2] D. Dzung, M. Naedele, T. P. von Hoff, and M. Crevatin, “Security for industrial communication systems,” Proceedings of the IEEE, vol. 93, no. 6, pp. 1152–1177, 2005.
[3] E. Lisova, E. Uhlemann, J. Akerberg, and M. Bojrkman, “Towards secure wireless TTEthernet for industrial process automation applications,” in Proceedings of the IEEE Emerging Technology and Factory Automation (ETFA '14), pp. 1–4, Barcelona, Spain, September 2014.
[4] E. Lisova, E. Uhlemann, W. Steiner, J. Akerberg, and M. Bjorkman, “A survey of security frameworks suitable for distributed control systems,” in Proceedings of the International Conference on Computing and Network Communications (CoCoNet '15), pp. 205–211, Trivandrum, India, December 2015.
[5] E. Lisova, E. Uhlemann, W. Steiner, and J. Åkerberg, “Risk evaluation of an ARP poisoning attack on clock synchronization for industrial applications,” in Proceedings of the IEEE International Conference on Industrial Technology (ICIT '16), Taipei, Taiwan, 2016.
[6] B. Mukherjee, L. T. Heberlein, and K. N. Levitt, “Network intrusion detection,” IEEE Network, vol. 8, no. 3, pp. 26–41, 1994.
[7] Armando, D. Basin, Y. Boichut et al., “The AVISPA tool for the automated validation of internet security protocols and applications,” in Computer Aided Verification, K. Etessami and S. K. Rajamani, Eds., vol. 3576 of Lecture Notes in Computer Science, pp. 281–285, Springer, Berlin, Germany, 2005.
[8] M. Ullmann and M. Vogeler, “Delay attacks—implication on NTP and PTP time synchronization,” in Proceedings of the International Symposium on Precision Clock Synchronization for Measurement, Control and Communication (ISPCS '09), pp. 1–6, October 2009.
[9] B. Hirschler and A. Treytl, “Validation and verification of IEEE 1588 annex K,” in Proceedings of the International IEEE Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS '11), pp. 44–49, Munich, Germany, September 2011.
[10] T. Mizrahi, “A game theoretic analysis of delay attacks against time synchronization protocols,” in Proceedings of the International IEEE Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS '12), pp. 1–6, San Francisco, Calif, USA, September 2012.
[11] M. Gutiérrez, W. Steiner, R. Dobrin, and S. Punnekkat, “A configuration agent based on the time-triggered paradigm for real-time networks,” in Proceedings of the IEEE World Conference on Factory Communication Systems (WFCS '15), pp. 1–4, IEEE, Palma, Majorca, Spain, May 2015.
[12] M. Gutiérrez, W. Steiner, R. Dobrin, and S. Punnekkat, “Learning the parameters of periodic traffic based on network measurements,” in Proceedings of the IEEE International Workshop on Measurements & Networking (M&N '15), pp. 1–6, October 2015.
[13] L. Heberlein, G. Dias, K. Levitt, B. Mukherjee, J. Wood, and D. Wolber, “A network security monitor,” in Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 296–304, IEEE, Oakland, Calif, USA, May 1990.
[14] M. Eslahi, M. S. Rohmad, H. Nilsaz, M. V. Naseri, N. Tahir, and H. Hashim, “Periodicity classification of HTTP traffic to detect HTTP Botnets,” in Proceedings of the IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE '15), pp. 119–123, Langkawi, Malaysia, April 2015.
[15] M. Garuba, C. Liu, and D. Fraites, “Intrusion techniques: comparative study of network intrusion detection systems,” in Proceedings of the 5th International Conference on Information Technology: New Generations (ITNG '08), pp. 592–598, Las Vegas, Nev, USA, April 2008.
[16] G. Fink, B. Chappell, T. Turner, and K. O'Donoghue, “A metricsbased approach to intrusion detection system evaluation for distributed real-time systems,” in Proceedings 16th the International Parallel and Distributed Processing Symposium (IPDPS '02), Abstracts and CD-ROM, p. 8, Ft. Lauderdale, Fla, USA, April 2002.
[17] IEEE, “IEEE standard for a precision clock synchronization protocol for networked measurement and control systems,” IEEE Std 1588-2008, Revision of IEEE Std 1588-2002, 2008.
[18] B. Kang, P. Maynard, K. McLaughlin et al., “Investigating cyber-physical attacks against IEC 61850 photovoltaic inverter installations,” in Proceedings of the IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA '15), pp. 1–8, Luxembourg City, Luxembourg, 2015.
[19] TCXO, Temperature Compensated Crystal Oscillator, http://www.radio-electronics.com/info/data/crystals/tcxo.php.
[20] D. Basin, S. Modersheim, and L. Vigano, “OFMC: a symbolic model checker for security protocols,” International Journal of Information Security, vol. 4, no. 3, pp. 181–208, 2005.
[21] Y. Tao and S. Yu, “DDoS attack detection at local area networks using information theoretical metrics,” in Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Comm, pp. 233–240, Melbourne, Australia, July 2013. View at Publisher • View at Google Scholar
[22] S. Yu, W. Zhou, R. Doss, and W. Jia, “Traceback of DDoS attacks using entropy variations,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 3, pp. 412–425, 2012.
[23] S. Yu, W. Zhou, and R. Doss, “Information theory based detection against network behavior mimicking DDoS attacks,” IEEE Communications Letters, vol. 12, no. 4, pp. 318–321, 2008.
[24] Y. Xiang, K. Li, and W. Zhou, “Low-rate DDoS attacks detection and traceback by using new information metrics,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 426–437, 2011.
[25] M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, “Information metrics for low-rate DDoS attack detection: a comparative evaluation,” in Proceedings of the 7th International Conference on Contemporary Computing (IC3 '14), pp. 80–84, IEEE, Noida, India, August 2014.
[26] Y. Xiang, Y. Lin, W. L. Lei, and S. J. Huang, “Detecting DDOS attack based on network self-similarity,” IEE Proceedings: Communications, vol. 151, no. 3, pp. 292–295, 2004.
[27] Chonka, J. Singh, and W. Zhou, “Chaos theory based detection against network mimicking DDoS attacks,” IEEE Communications Letters, vol. 13, no. 9, pp. 717–719, 2009.
[28] Y. Chen, X. Ma, and X. Wu, “DDoS detection algorithm based on preprocessing network traffic predicted method and chaos theory,” IEEE Communications Letters, vol. 17, no. 5, pp. 1052–1054, 2013.
[29] X. Wu and Y. Chen, “Validation of chaos hypothesis in NADA and improved DDoS detection algorithm,” IEEE Communications Letters, vol. 17, no. 12, pp. 2396–2399, 2013.
[30] B. Joshi, A. S. Vijayan, and B. K. Joshi, “Securing cloud computing environment against DDoS attacks,” in Proceedings of the International Conference on Computer Communication and Informatics (ICCCI '12), pp. 1–5, IEEE, Coimbatore, India, January 2012.
[31] V. L. Thing, M. Sloman, and N. Dulay, “Locating network domain entry and exit point/path for DDoS attack traffic,” IEEE Transactions on Network and Service Management, vol. 6, no. 3, pp. 163–174, 2009.
[32] Y. Xie and S.-Z. Yu, “Monitoring the application-layer DDoS sttacks for popular websites,” IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 15–25, 2009.
[33] H. Luo, Y. Lin, H. Zhang, and M. Zukerman, “Preventing DDoS attacks by identifier/locator separation,” IEEE Network, vol. 27, no. 6, pp. 60–65, 2013.
[34] M. Barati, A. Abdullah, N. I. Udzir, R. Mahmod, and N. Mustapha, “Distributed Denial of Service detection using hybrid machine learning technique,” in Proceedings of the 4th International Symposium on Biometrics and Security Technologies (ISBAST '14), pp. 268–273, Kuala Lumpur, Malaysia, August 2014.
[35] S. Yu, Y. Tian, S. Guo, and D. O. Wu, “Can we beat DDoS attacks in clouds?” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 9, pp. 2245–2254, 2014.
[36] T. Thapngam, S. Yu, W. Zhou, and G. Beliakov, “Discriminating DDoS attack traffic from flash crowd through packet arrival patterns,” in Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS '11), pp. 952–957, Shanghai, China, April 2011.
[37] K. Hwang, M. Cai, Y. Chen, and M. Qin, “Hybrid intrusion detection with weighted signature generation over anomalous internet episodes,” IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 1, pp. 41–55, 2007.
[38] J. Gómez, C. Gil, N. Padilla, R. Baños, and C. Jiménez, “Design of a snort-based hybrid intrusion detection system,” in Distributed Computing, Artificial Intelligence, Bioinformatics, Soft Computing, and Ambient Assisted Living, pp. 515–522, Springer, Berlin, Germany, 2009.
[39] R. A. Redner and H. F. Walker, “Mixture densities, maximum likelihood and the EM algorithm,” SIAM Review, vol. 26, no. 2, pp. 195–239, 1984.
[40] Gartner, “Gartner says worldwide traditional PC, tablet, ultramobile and mobile phone shipments on pace to grow 7.6 percent in 2014,” October 2015, http://www.gartner.com/newsroom/id/2645115.
[41] G. Suarez-Tangil, J. E. Tapiador, P. Peris-Lopez, and J. Blasco, “Dendroid: a text mining approach to analyzing and classifying code structures in Android malware families,” Expert Systems with Applications, vol. 41, no. 4, pp. 1104–1117, 2014.
[42] Y. Zhang, M. Yang, B. Xu et al., “Vetting undesirable behaviors in android apps with permission use analysis,” in Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS '13), pp. 611–622, ACM, Berlin, Germany, November 2013.
[43] R. T. Fielding, Architectural styles and the design of network-based software architectures [Ph.D. thesis], University of California, Irvine, Calif, USA, 2000.
[44] Sufatrio, D. J. J. Tan, T.-W. Chua, and V. L. L. Thing, “Securing android: a survey, taxonomy, and challenges,” ACM Computing Surveys, vol. 47, no. 4, article 58, 2015.
[45] P. Faruki, A. Bharmal, V. Laxmi et al., “Android security: a survey of issues, malware penetration, and defenses,” IEEE Communications Surveys & Tutorials, vol. 17, no. 2, pp. 998–1022, 2015.
[46] S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, and A.-R. Sadeghi, “Xmandroid: a new android evolution to mitigate privilege escalation attacks,” Tech. Rep. TR-2011-04, Technische Universität Darmstadt, Darmstadt, Germany, 2011.
[47] K. W. Y. Au, Y. F. Zhou, Z. Huang, and D. Lie, “PScout: analyzing the Android permission specification,” in Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS '12), pp. 217–228, ACM, Raleigh, NC, USA, October 2012.
[48] J. Jeon, K. K. Micinski, J. A. Vaughan et al., “Dr. android and Mr. hide: fine-grained permissions in android applications,” in Proceedings of the 2nd ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '12), pp. 3–14, ACM, Raleigh, NC, USA, October 2012.
[49] Burguera, U. Zurutuza, and S. Nadjm-Tehrani, “Crowdroid: behaviorbased malware detection system for android,” in Proceedings of the 1st ACM Workshop on Security And Privacy in Smartphones and Mobile Devices, pp. 15–26, ACM, 2011.
[50] Patel and B. Buddhadev, “Predictive rule discovery for network intrusion detection,” in Intelligent Distributed Computing, vol. 321 of Advances in Intelligent Systems and Computing, pp. 287–298, Springer, Basel, Switzerland, 2015.