My-Network Security Presentation
My-Network Security Presentation
PRESENTATION
OF
NETWORK SECURITY
DATE OF PRESENTATION : 23/06/2016
Presented by
Arvind Lal (141407)
ME-MODULAR-2014
7/8/16 08:27:47 AM
".
OBJECTIVES OF PRESENTATION
1 .IN TR O D U C TI O N
( EX PL AIN IN G
SE L EC T ED ) .
2 . R EVI EW O F R E SEA R C H PAPE R .
3 .C O N C L U S IO N AN D F U TU R E SC O PE O F R ESE AR C H PAPER .
7/8/16 08:27:47 AM
The Society of Digital Information and Wireless Communications, 2013 (ISSN: 2305-0012)
7/8/16 08:27:47 AM
2. R E VIE W OF RE SE A RC H PAPE R
A. Introduction.
B. Related works.
C. Proposed approaches.
D. Conclusion and future work.
7/8/16 08:27:47 AM
A.INTRODUCTION OF TOPIC
IN THIS PAPER RESEARCHERS DONE THE FOLLOWING THINGS:
They tried to explain about the scenarios in security problem like:- a new kind of war takes
place between the security community and malicious software developers.
They also highlighted about the works done till date for stopping security breaching in
mobile apps and in computer systems like :- the security specialists use all possible
techniques, methods and strategies to stop and remove the threats while the malware
developers utilize new types of malwares that bypass implemented security features.
So, researchers has done thorough study and closely looked into malware, to understand the
definition, types, propagation of malware, and detecting/defending mechanisms in order to
contribute to the process of protection and security enhancement.
Author has propose a method of analyzing and deciding malware on the basis of similarity
with existing malware families on the popular platform, Android and other OS.
To remove the malware from the system, researcher focus on the checking visual similarity
among other malware families to help distributing to inspector appropriately.
7/8/16 08:27:47 AM
B .
R E L A TE D
W O R K S .
To solve the Android and other OS malware problems, following researchers has also
taken similar initiatives like:
(i) Zhou finds that 86.0% of malwares are repackaged in diverse ways, that is hackers
disassemble existing malwares or legitimate(real) apps, enclose malicious ( mischiefs )
payloads, and then re-assemble and submit the new apps or update apps to official third party
Android or other OS market.
(ii) M.Cho- proposed AndroScope technique which is a performance analysis tool for the
Android platform and other OS which provides a trace mechanism for tracing of core libraries,
android libraries, windows libraries and even Linux kernels. This tool enables viewer to load
the trace file and display basic information like enter and exit times of each method.
(iii)J.Ko-propsed techniques to determine similarity of Android and other OS application via
reversing and k-gram birthmarking. In this technique he develop a system to identify
software reuse illegally, then this system decompiles the apps and make the birthmarks based
on k-gram and determines the similarity between the sample apps by comparing the
birthmarks.
7/8/16 08:27:47 AM
C. PROPOSED APPROACHES
In this paper researcher has designed new system to detect and remove the malware from the O.S by the technique
called CFG(Call Flow Graph). With the help of this, researcher visualize characteristics of application, by selecting the
representative CFG from each family and then suspected applications are checked on the basis of degree of similarity.
Then according to the degree of similarity, malwares are distributed to the inspectors discriminately according to the level
of difficulty appropriately.
In this system there are four sub-systema. System of making CFGs of known malware families,
b. System of selection of representative of malware families,
c. System of making CFG of suspected application, and
d. System of measuring similarity and distribution malware to inspector.
The above system should work efficiently and appropriately, he proposed the rules for measuring
difficulty are as follows:
i. Inverse proportion to the number of application in each known malware family.
ii. Proportion to the appearance frequency within the limited time of the last in each known malware
family.
iii. Inverse proportion to the number of application in a known malware family.
iv. Proportion to whether to apply the code obfuscation(confusion).
7/8/16 08:27:47 AM
v. Inverse proportion to the degree of similarity among the known malware families.
D .
C O N C L U S I O N
A N D
F E A T U R E
W O R K .
This work presents the method of detecting an Android malware with visualization of application and
measuring similarity among known malware families. Also, he proposed that malware is distributed to
various inspectors discriminately according to degree of difficulty to analyze. In particular, he suggested the
rules for measuring difficulty. In the future, he plan to develop this system and apply in real-world.
7/8/16 08:27:47 AM
REFERENCES
[1] Yajin Zhou, Xuxian Jiang, Dissecting Android Malware : Characterization and Evolution
Proceeding 33rd IEEE Symposium Security and Privacy, 2012
[2] AndroScope: An insightful performance analyzer for all software layers of the android-based
systems, ETRI Journal, 2013
[3] Traceview, http://developer.android.com/tools/help/traceview.html
[4] J. Ko, et al. Measuring Similarity of Android Applications via Reversing and K-gram
Birthmarking, RACS13 pp.336-341, Oct, 2013
[5] L. Zager, Graph similarity amd matching, MS Thesis, EECS, MIT, 2005.
7/8/16 08:27:47 AM
Thank you
&
query session
7/8/16 08:27:47 AM
10