Cryptographic Provenance Verification For Secure Hosts
نویسنده
چکیده
To improve the trustworthiness of a host and system data cryptographic verification technique is used.From these approach users keystroke to identify the legitimate user’s to get the service from the server by using integrity verification and malicious traffic detection. But the main issue of this approach is keystroke hacking by the bots or autonomous program. The key logger’s records the user’s password or security code and send to the hacker to login the service when the user is no longer online. This project aims to propose a malware detection approach based on the characteristic behaviour of human user’s. Finally explore the human-bots differences by using TUBA(Telling hUman and Bots Apart) thereby prevent bots forgeries. By using classifier algorithm the currentwork identify the human and malware activities. KeywordsMalware,TUBA,Cryptography,Classifier.
منابع مشابه
Data-provenance Verification for Secure Hosts
Network or host-based signature scanning approaches alone were proven inadequate against new and emerging malware. We view malicious bots or malware in general as entities stealthily residing on a human user’s computer and interacting with the user’s computing resources. In this existing work we need to improve the trustworthiness of a host and its system data. Specifically, we provide a new me...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملA Cryptographic Provenance Verification Approach For Host-Based Malware Detection
We present a malware detection approach by focusing on the characteristic behaviors of human users. We explore the human-malware differences and utilize them to aid the detection of infected hosts. There are two main research challenges in this study: one is how to select characteristic behavior features, and the other is how to prevent malware forgeries. We address both questions in this paper...
متن کاملSecure Data Collection with Updates
This paper describes a protocol to protect data collected by mobile agents roaming through a set of potentially malicious hosts. This protocol is based on an original secure cryptographic technique that assures the integrity of a sequence of data segments regardless of the order of each segment in the sequence. The protocol allows each host to update the data it previously submitted in a way th...
متن کاملSPROV 2.0: A Highly-Configurable Platform-Independent Library for Secure Provenance
Data provenance allows us to explore the lineage and derivation history of data objects. As data and its provenance flow between people and tasks in potentially untrusted environments, it becomes essential to provide integrity and confidentiality assurances for provenance. Any solution also needs to be efficient, modular, and easy to deploy. In this poster and demonstration proposal, we discuss...
متن کامل