Call of Papers for Current Volume **************** OnLine Submission of Paper

Title: MALWARE DETECTION APPROACH BASED ON ADVANCED CRYPTOGRAPHIC PROVENANCE VERIFICATION

_____________________________________________________________________________

Title:
MALWARE DETECTION APPROACH BASED ON ADVANCED CRYPTOGRAPHIC PROVENANCE VERIFICATION
Author Name:
Anirudha B. Vikhe and Prema S. Desai
Abstract:
In this paper, the problem of fake network calls on outgoing data packets, initiated by malware with intent to disrupt regular system operations and affect the sensitive as well crucial information residing on host is tackle. The provenance of such data is achieved with new advanced cryptographic approach which provides assurance to OS and helps for identifying the malware attacks. The goal of this new technique is to maintained data integrity and improve the trustiness of such data in order achieve guaranteed assurance of correct origin of system data. Based on the advance verification technique used, new security property has been avail for improving data surety and assurance. For implementing new security model, two special cryptographic modules, sign and verify are employed for ensuring the correct origin or source of system data and prevent adversaries from tampering with intent to threat its integrity. The hardware component, trusted platform modules helps to improve security level by providing attestation for cryptographic keys and storage for critical information. With the utilization of signing and symmetric at both modules the secure verification process put forth. Sign module is responsible for signature generation of input data along with UMAC and unique signing key. Verification process takes at verify module for the data under consideration. The signature task is enhanced with use of advanced cryptographic algorithm which much more effective and fast as compare to AES. The implantation result show that ACA is secure and fast for provenance verification approach.
Back