Abstract

In present world applications of software in other domains have their own privileges and their own control over other application also fulfilling their own testing methods acting as a tool in solving the given problem. Application integrity is highlighted in existing work but in our proposed approach MCBA (Malicious Code Behavior Analysis). In our proposed study the method of MCBA approach error correcting codes in the kernel is incorporated. Our objective is to incorporate a protection mechanism that saves the application even though the system’s memory gets corrupted. In exploring the trusted MCBA Server to identify and monitor the portion of the system where corruption occurs and the server segregates the reason for various malicious impacts. Therefore, two approaches have been simulated: one is authenticated check and the next is unauthenticated check. In an authenticated check, a matching schema (e.g., the MCBA) applies dataset pattern recognition techniques to check malicious pattern by comparing it to the incoming applications during execution, if malicious packet is found it protects the system, in an unauthenticated check, the malicious packet from the guest OS for example root kits enters into our local system and it securely stores a cloned image of the guest OS memory at boot time, this method incorporates a VMM (Virtual Memory Monitor) and it allows only the instructions to read from the cloned copy of memory but never execute the instruction, though it is so, sometimes the instructions are malicious and it is unsecured. This paper emphasizes the MCBA architecture, incorporates monitoring, detecting and healing process which are so feasible to apply in real time environment ,it is very economically used for the technical programmers who are designing source code for various domains in Software market.

Highlights

  • In presently used commercial operating systems, the trusted software applications executes and they are very complex preventing most of the security and testing methods in finding malicious packets .Vulnerable applications running in the same machine increases False positive rate of the system .In critical application in order to modify the kernel of the memory we need to take over the OS privilege

  • MaliciousOriented Recovery (MOR)[1] makes the applications that are affected by malicious code can be backed up by means of using the detection algorithms and filtering the benign files for automatic backup

  • The approach that we adopt in this paper is to use a trusted MCBA (Malicious Code Behavior Analysis Architecture) to detect and repair the corrupted application memory pages

Read more

Summary

Introduction

In presently used commercial operating systems, the trusted software applications executes and they are very complex preventing most of the security and testing methods in finding malicious packets .Vulnerable applications running in the same machine increases False positive rate of the system .In critical application in order to modify the kernel of the memory we need to take over the OS privilege. We aim to detect memory corruption especially in the local host. MaliciousOriented Recovery (MOR)[1] makes the applications that are affected by malicious code can be backed up by means of using the detection algorithms and filtering the benign files for automatic backup. The approach that we adopt in this paper is to use a trusted MCBA (Malicious Code Behavior Analysis Architecture) to detect and repair the corrupted application memory pages. Our work can be seen as a technique for transparently incorporating MOR into the execution environment without modifying the original application code. The proposed approach is to employ a trusted MCBA that interacts between the OS and the malicious application, and restricts the kernel’s access with respect to the memory space of the protected. These MCBA - based solutions generally fall into two broad categories: Authenticated check and Unauthenticated check

Authenticated Check
Unauthenticated Check4
Related Systems
Proposed MCBA Architecture
Experimental Analysis of Virus Vulnerability Algorithm
2.30 Medium
On Shared Memory
Vulnerability Analysis
Application Vulnerabilities
Implementation and Evaluation
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call