International Journal of Emerging Trends & Technology in Computer Science
A Motivation for Recent Innovation & Research
ISSN 2278-6856
www.ijettcs.org
Call for Paper, Published Articles, Indexing Infromation
Title: |
MALWARE DETECTION APPROACH BASED ON ADVANCED CRYPTOGRAPHIC PROVENANCE VERIFICATION
|
Author Name: |
Anirudha B. Vikhe and Prema S. Desai |
Abstract: |
Abstract
In this paper, the problem of fake network calls on outgoing
data packets, initiated by malware with intent to disrupt
regular system operations and affect the sensitive as well
crucial information residing on host is tackle. The provenance
of such data is achieved with new advanced cryptographic
approach which provides assurance to OS and helps for
identifying the malware attacks. The goal of this new
technique is to maintained data integrity and improve the
trustiness of such data in order achieve guaranteed assurance
of correct origin of system data. Based on the advance
verification technique used, new security property has been
avail for improving data surety and assurance. For
implementing new security model, two special cryptographic
modules, sign and verify are employed for ensuring the correct
origin or source of system data and prevent adversaries from
tampering with intent to threat its integrity. The hardware
component, trusted platform modules helps to improve security
level by providing attestation for cryptographic keys and
storage for critical information. With the utilization of signing
and symmetric at both modules the secure verification process
put forth. Sign module is responsible for signature generation
of input data along with UMAC and unique signing key.
Verification process takes at verify module for the data under
consideration. The signature task is enhanced with use of
advanced cryptographic algorithm which much more effective
and fast as compare to AES. The implantation result show that
ACA is secure and fast for provenance verification approach.
Keywords: Authentication, cryptography, forgery,
integrity, keystroke events, malware detection, provenance,
trusted computing.
|
Cite this article: |
Anirudha B. Vikhe and Prema S. Desai , "
MALWARE DETECTION APPROACH BASED ON ADVANCED CRYPTOGRAPHIC PROVENANCE VERIFICATION " , International Journal of Emerging Trends & Technology in Computer Science (IJETTCS),
Volume 3, Issue 4, July - August 2014 , pp.
177-182 , ISSN 2278-6856.
|