- 


ADVANCE VIRUS DETECTION USING COMBINED TECHNIQUES OF PATTERN MATCHING AND DYNAMIC INSTRUCTION SEQUENCES

J.Nandhini Dr.M. Nithya Dr.S.Prabhakaran.

Abstract
Network security has always been an important issue and its application is ready to perform powerful pattern matching to protect against virus attacks, spam and Trojan horses. However, attacks such as spam, spyware, worms, viruses, and phishing target the application layer rather than the network layer. Therefore, traditional firewalls no longer provide enough protection. However, the solutions in the literature for firewalls are not scalable, and they do not address the difficulty of an antivirus. The goal is to provide a systematic virus detection software solution for network security for computer systems. Instead of placing entire matching patterns on a chip, our solution is based on an antivirus processor that works as much of the filtering information as possible onto a reference memory. The infrequently accessing off-reference data to make the matching mechanism scalable to large pattern sets. In the first stage, the filtering engine can filter out more than 93.1% of data as safe, using a merged shift table. Only 6.9% or less of potentially unsafe data must be precisely checked in the second stage by the exact-matching engine from off-reference memory. In addition to that Dual port BITCAM processing program is used along with the Exact Matching Engine and Bloom Filter process. This Dual port BITCAM processes next to the exact matching engine and bloom filter process. This Dual port BITCAM process is placed exclusively for obtaining higher throughput. To reduce the memory gap and to improve the performance, we also propose three algorithms are used: 1) a skipping algorithm; 2) a cache method; and 3) a prefetching mechanism.

Key words: - Algorithmic Attacks Embedded System, Memory Gap, Network Security, and Virus Detection.


 
ARTICLE TOOLS
Abstract
PDF Fulltext
How to cite this articleHow to cite this article
Citation Tools
Related Records
 Articles by J.Nandhini Dr.M. Nithya Dr.S.Prabhakaran
on Google
on Google Scholar


How to Cite this Article
Pubmed Style

J.Nandhini Dr.M. Nithya Dr.S.Prabhakaran. ADVANCE VIRUS DETECTION USING COMBINED TECHNIQUES OF PATTERN MATCHING AND DYNAMIC INSTRUCTION SEQUENCES. . 2012; 1(1): 39-44. doi:10.31838/ijccts/01.01.06


Web Style

J.Nandhini Dr.M. Nithya Dr.S.Prabhakaran. ADVANCE VIRUS DETECTION USING COMBINED TECHNIQUES OF PATTERN MATCHING AND DYNAMIC INSTRUCTION SEQUENCES. http://www.ijccts.org/?mno=302643839 [Access: October 03, 2020]. doi:10.31838/ijccts/01.01.06


AMA (American Medical Association) Style

J.Nandhini Dr.M. Nithya Dr.S.Prabhakaran. ADVANCE VIRUS DETECTION USING COMBINED TECHNIQUES OF PATTERN MATCHING AND DYNAMIC INSTRUCTION SEQUENCES. . 2012; 1(1): 39-44. doi:10.31838/ijccts/01.01.06



Vancouver/ICMJE Style

J.Nandhini Dr.M. Nithya Dr.S.Prabhakaran. ADVANCE VIRUS DETECTION USING COMBINED TECHNIQUES OF PATTERN MATCHING AND DYNAMIC INSTRUCTION SEQUENCES. . (2012), [cited October 03, 2020]; 1(1): 39-44. doi:10.31838/ijccts/01.01.06



Harvard Style

J.Nandhini Dr.M. Nithya Dr.S.Prabhakaran (2012) ADVANCE VIRUS DETECTION USING COMBINED TECHNIQUES OF PATTERN MATCHING AND DYNAMIC INSTRUCTION SEQUENCES. , 1 (1), 39-44. doi:10.31838/ijccts/01.01.06



Turabian Style

J.Nandhini Dr.M. Nithya Dr.S.Prabhakaran. 2012. ADVANCE VIRUS DETECTION USING COMBINED TECHNIQUES OF PATTERN MATCHING AND DYNAMIC INSTRUCTION SEQUENCES. International Journal of Communication and Computer Technologies, 1 (1), 39-44. doi:10.31838/ijccts/01.01.06



Chicago Style

J.Nandhini Dr.M. Nithya Dr.S.Prabhakaran. "ADVANCE VIRUS DETECTION USING COMBINED TECHNIQUES OF PATTERN MATCHING AND DYNAMIC INSTRUCTION SEQUENCES." International Journal of Communication and Computer Technologies 1 (2012), 39-44. doi:10.31838/ijccts/01.01.06



MLA (The Modern Language Association) Style

J.Nandhini Dr.M. Nithya Dr.S.Prabhakaran. "ADVANCE VIRUS DETECTION USING COMBINED TECHNIQUES OF PATTERN MATCHING AND DYNAMIC INSTRUCTION SEQUENCES." International Journal of Communication and Computer Technologies 1.1 (2012), 39-44. Print. doi:10.31838/ijccts/01.01.06



APA (American Psychological Association) Style

J.Nandhini Dr.M. Nithya Dr.S.Prabhakaran (2012) ADVANCE VIRUS DETECTION USING COMBINED TECHNIQUES OF PATTERN MATCHING AND DYNAMIC INSTRUCTION SEQUENCES. International Journal of Communication and Computer Technologies, 1 (1), 39-44. doi:10.31838/ijccts/01.01.06




Current Issue : 2020, Vol: 8, Issue: 2
ISSN : 2278-9723
ISSUES : 02 per year
PUBLISHER :

Benefits of publishing in International Journal of Communication and Computer Technologies

  • Online submission
  • Wider visibility through open access
  • Higher impact
  • Prompt review

Abstracting and Indexing Information

Google Scholar

General Impact Factor (GIF)

DOAJ

Scopus citation 

 

Scopus
EXPORT DATE:24 Nov 2018

Gnanambigai, J., Rengarajan, D.R., Anbukkarasi, K.
Leach and Its Descendant Protocols: A Survey
(2012) International Journal of Communication and Computer Technologies,
 1 (3), pp. 15-22. Cited 25 times.


Gangwar, A., Bhardwaj, M.
An overview: Peak to average power ratio in OFDM system & its effect
(2012) International Journal of Communication and Computer Technologies, 
1 (2), pp. 22-25. Cited 20 times.


Sharma, A., Gupta, P.C.
Predicting the number of blood donors through their age and blood group by using data mining tool
(2012) International Journal of Communication and Computer Technology,
1 (2-6), pp. 6-10. Cited 9 times.


Sundhar, C., Archana, D.
Automatic screening of fundus images for detection of diabetic retinopathy
(2014) International Journal of Communication and Computer Technologies,
 2 (1), pp. 100-105. Cited 8 times.


Kaur, M., Mahajan, M.
Using encryption algorithms to enhance the data security in cloud computing
(2013) International Journal of Communication and Computer Technologies, 
1 (3), pp. 56-60. Cited 6 times.


Abinaya, V., Vennila, M., Padmanabhan, N.
Sentence level text clustering using a hierarchical fuzzy relational clustering algorithm
(2014) Proc. of International Journal of Communication and Computer Technologies, 2 (2).
Cited 3 times.


Malakar, S., Mohanta, D., Sarkar, R., Nasipuri, M.
A Novel Noise-Removal Technique for Document Images
(2010) International Journal of Communications and Computer Technology, 2, pp. 120-124. Cited 3 times.


Ramahrishnan, S., Elakkiya, B., Geetha, R., Vasuki, P., Mahalingam, S.
Image encryption using chaotic maps in hybrid domain
(2014) International Journal of Communication and Computer Technologies, 2 (5), pp. 44-48. Cited 2 times.


Jeevanand, D., Keerthivasan, K., Mohamed Rilwan, J., Murugan, P.
Real Time Embedded Network Video Capture And SMS Alerting system
(2014) International Journal of Communication and Computer Technologies. Cited 2 times.


Rethesh, D.
Analysis on fpga designs of parallel high performance multipliers
(2014) International Journal of Communication and Computer Technologies, 2 (12), pp. 70-77. Cited 2 times.


Atchaya, S., Dhanalakshmi, N., Veeramani, R.
A compact design of multiband microstrip patch antenna for GSM, Bluetooth and Wi-MAX applications
(2014) International Journal of Communication and Computer Technologies, 2 (1), pp. 1-4. Cited 2 times.


Xavier, N.
Security of PHR in cloud computing using ABE technique
(2013) International Journal of Communication and Computer Technologies, 1 (72), pp. 265-269. Cited 2 times.


Vijay, V., Gowri, K., Velmurugan, S., Basha, A.M.
Detection and extraction of p wave an T wave in ECG to improve sensitivity for e-health monitoring
(2016) International Journal of Communication and Computer Technologies, 4 (4). Cited 1 time.


Santhosh, M.
Electronic voting machine using internet
(2016) International Journal of Communication and Computer Technologies. Cited 1 time.


Suba, R., Satheeskumar, R.
Efficient cluster-based congestion control in wireless mesh network
(2016) International Journal of Communication and Computer Technologies, pp. 4059-4064. Cited 1 time.


Sundararaju, K., Sukumar, P.
Improvement of power quality using PQ Theory based series hybrid active power filter
(2016) International Journal of Communication and Computer Technologies., 4 (2), pp. 4007-4011. Cited 1 time.


Rajasudhan, S., Nallusamy, R.
A study on cryptographic methods in cloud storage
(2014) International Journal of Communication and Computer Technologies, 2 (2), pp. 1-5. Cited 1 time.


Jeba Pon Elizabeth, S., Vedhapriya Vadhana, R.
Comparing PSNR by using Integer and Haar Wavelet Transform in Reversible Data Hiding Technique
(2014) International Journal of Communication and Computer Technologies, 2 (10). Cited 1 time.


Rajasudhan, S., Nallusamy
A Study on Cryptography Methods in Cloud Storage
(2014) International Journal of Communication and Computer Technologies, 2 (2). Cited 1 time.


Kavitha, P., Keerthana, C., Niroja, V., Vivekanandhan, V.
Mobile-id based sybil attack detection on the Mobile ADHOC Network
(2014) International Journal of Communication and Computer Technologies, 2 (2), pp. 56-63. Cited 1 time.


Singh, S.P., Goyal, N.
Security Configuration and Performance Analysis of FTP Server
(2014) International Journal of Communication and Computer Technologies, 2 (3), pp. 39-42. Cited 1 time.


Jayasinghe, J.W., Anguera, J., Uduwawala, D.N.
A simple design of multi band microstrip patch antennas robust to fabrication tolerances for gsm, umts, lte, and bluetooth applications by using genetic algorithm optimization
(2014) International Journal of Communication and Computer Technologies, 2 (1). Cited 1 time.


Sharma, S., Shiwani, S.
Data mining based accuracy enhancement of ANN using Swarm intelligence
(2014) International Journal of Communication and Computer Technologies, 2 (9). Cited 1 time.


Rajasudhan, S., Nallusamy, R.
A study on cryptographic methods in cloud storage
(2014) International Journal of Communication and Computer Technologies, 2, pp. 2278-9723. Cited 1 time.


Kavitha, P., Keerthana, C., Niroja, V., Vivekanandhan, V.
(2014) International Journal of Communication and Computer Technologies, 2. Cited 1 time.


Srivastava, K.A., Yadav, K.D., Pandey, K.S.
The security in private cloud computing
(2013) International Journal of Communication and Computer Technologies, 1 (4). Cited 1 time.


Gangwar, A., Bhardwaj, M.
'An Overview: Peak to Average Power Ratio in OFDM system & its Effect'
(2013) International Journal of Communication and Computer Technologies. Cited 1 time.


Kaur, M., Mahajan, M.
Using encryption Algorithms to enhance the Data Security in Cloud Computing
(2013) International Journal of Communication and Computer Technologies, 1 (12). Cited 1 time.


Nandhini, J., Nithya, M., Prabhakaran, S.
Advance virus detection using combined techniques of pattern matching and dynamic instruction sequences
(2013) International Journal of Communication and Computer Technologies, pp. 156-161. Cited 1 time.


Gupta, P., Shiwani, S.
Computer Science Department Suresh Gyan Vihar University India RECITAL INVESTIGATION of IPv4 and IPv6 USING WIRED NETWORKS in OMNET++
(2013) International Journal of Communication and Computer Technologies, 1 (47). Cited 1 time.


Goyal, N., Hemrajani, N.
Comparative study of AODV and DSR routing protocols for MANET: Performance analysis
(2013) International Journal of Communication and Computer Technologies, 1 (57). Cited 1 time.


Kaur, M., Mahajan, M.
Using encryption algorithm to enhance data security in cloud computing
(2013) International Journal of Communication and Computer Technology. Cited 1 time.


Kumar Srivastava, K., Tripathi, A., Kumar Tiwari, A.
Secure data transmission in AODV routing protocol
(2013) International Journal of Communication and Computer Technologies, 1 (4). Cited 1 time.


Mandeep, T., Manish, Y.
Using encryption algorithms to enhance the data security in cloud computing
(2013) International Journal of Communication and Computer Technologies, 1 (12), pp. 78-89. Cited 1 time.


Goyal, N., Hemrajani, N.
Comparative study of AODV and DSR routing protocols for MANET: Performance analysis
(2013) International Journal of Communication and Computer Technologies, 1 (57), pp. 198-202. Cited 1 time.


Shoeb, M., Kumar Gupta, V.
A crypt analysis of the tiny encryption algorithm in key generation
(2013) International Journal of Communication and Computer Technologies, 1 (38). Cited 1 time.


Shoeb, M., Gupta, V.K.
A cryptanalysis of the tiny encryption algorithm in key generation
(2013) International Journal of Communication and Computer Technologies (IJCCTS), 1 (5), pp. 123-128. Cited 1 time.


Gangwar, A., Bhardwaj, M.
"An Overview: PAPR in OFDM Systems and its Effects"
(2012) International journal of communication and computer technology, 1 (2). Cited 1 time.


Gnanambigai, J., Rengarajan, N., Anbukkarasi, K.
(2012) International Journal of Communication and Computer Technologies, 1. Cited 1 time.


Arthi, R.
Robotica and Automation nanorobots-design and applications
(2012) International Journal of Communication and Computer Technology, 1 (1), pp. 26-32. Cited 1 time.


Bishnoi, D.K., Lakhwani, K.
Advanced approaches of handwritten digit recognition using hybrid algorithm
(0000) International Journal of Communication and Computer Technologies, 1 (57), pp. 186-191. Cited 1 time.


Goyal, D., Hemrajani, N., Paliwal, K.
GPH Algorithm: Improved CBC improved BIFID cipher Symmetric Key Algorithm
(0000) International Journal of Communication and Computer Technologies, 1 (60), pp. 208-211. Cited 1 time.


Gupta, P.C., Sharma, A.
(0000) Predicting the Number of Blood Donors Through Their Age and Blood Group by Using Data Mining Too International Journal of Communication and Computer Technologies, 1. Cited 1 time.


(0000) Dr.N.Rengarajan#2,K.Anbukkarasi#3 International Journal of Communication and Computer Technologies, 101 (2-3). Cited 1 time.