DocumentCode :
238615
Title :
Debugging using MD5 process firewall
Author :
Om Kumar, C.U. ; Kishore, S. ; Geetha, A.
Author_Institution :
Dept. of CSE., Easwari Eng. Coll., Chennai, India
fYear :
2014
fDate :
27-29 Nov. 2014
Firstpage :
1279
Lastpage :
1284
Abstract :
An Operating system (OS) is software that manages computer hardware and software resources by providing services to computer programs. One of the important user expectations of the operating system is to provide the practice of defending information from unauthorized access, disclosure, modification, inspection, recording or destruction. Operating system is always vulnerable to the attacks of malwares such as computer virus, worm, Trojan horse, backdoors, ransomware, spyware, adware, scareware and more. And so the anti-virus software were created for ensuring security against the prominent computer viruses by applying a dictionary based approach. The anti-virus programs are not always guaranteed to provide security against the new viruses proliferating every day. To clarify this issue and to secure the computer system, our proposed expert system concentrates on authorizing the processes as wanted and unwanted by the administrator for execution. The Expert system maintains a database which consists of hash code of the processes which are to be allowed. These hash codes are generated using MD5 message-digest algorithm which is a widely used cryptographic hash function. The administrator approves the wanted processes that are to be executed in the client in a Local Area Network by implementing Client-Server architecture and only the processes that match with the processes in the database table will be executed by which many malicious processes are restricted from infecting the operating system. The add-on advantage of this proposed Expert system is that it limits CPU usage and minimizes resource utilization. Thus data and information security is ensured by our system along with increased performance of the operating system.
Keywords :
authorisation; client-server systems; cryptography; firewalls; invasive software; local area networks; operating systems (computers); program debugging; software architecture; MD5 message-digest algorithm; MD5 process firewall; client-server architecture; computer programs; cryptographic hash function; debugging; local area network; malwares; operating system; unauthorized access; user expectations; Computers; Databases; Dictionaries; Expert systems; Malware; Operating systems; Adware; CPU Usage and Resource Utilization; MD5; Process Table; Ransomware; Scareware; Spyware; Sticky Software; Trojan horse; Virus; back doors; worm;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Contemporary Computing and Informatics (IC3I), 2014 International Conference on
Conference_Location :
Mysore
Type :
conf
DOI :
10.1109/IC3I.2014.7019657
Filename :
7019657
Link To Document :
بازگشت