SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 534
SANDBOX TECHNOLOGY
Arockia Panimalar.S1, Tamilselvi.K2, Vani.K3
1Assistant Professor, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Tamilnadu
2,3 III BCA ‘A’, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Tamilnadu
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract: The sandbox technology aimstocreateasecureand
virtualized sandbox environment at the level of respective
applications. The sandbox is considered to have a minimal
impact on the semantics as well as the program which is
executed at a time and provides an efficient sandbox
configuration.Themalwares which arecalledasviruses,worms
and bolts have an anti analysis functions to confirm the
connectivity of certain hosts which detects the virtualized
environments. To avoid the impacts from the Internet, the
analyzed environments should be disconnected from the
Internet but they must be able to make malwares believe that
they are connected to the real Internet.
Key Words: Sandbox, System Sandbox, Operating
System Security, Controller Nodes.
1. INTRODUCTION
Sandbox technology is used to avoid a security threat which
runs as separate programsin computer systems. Sandbox is
especially used to execute the code which is not tested or it
may be possibly unverified without harming the host
machine or the operating system. A set of guest programs
are set for the disk to run in a tightly controlled set of
resources. Sandbox in a testing environment is that the
untested codes can be changed and productionenvironment
can be experimented as out righted which includes revision
control and web development.
Fig 1: Production of Data Warehouse in Sandbox
The live servers are protected by sandboxing where the
source code gets distributed and the changes may cause
some of the damages to a mission critical system. The main
aim of the sandbox is to test the minimal functionality of the
code or to test the programs accurately under the wed
development process. To access the development
environment variables are needed. The sandbox can be also
called as a test server or as a working directory or directory
server. This test directory is built with the help of revision
control software. The revision control softwaresareCVSand
sub version (SVN). These softwares are used by developers
to copy a source code tree or a branch of code to work and
examine the process. After testing the code, if thedevelopers
find any changes in the code they should move back to the
own sandbox and merge with their repositoriesand thereby
it will used by other users or else by end users.
2. IMPLEMENTATION OF SANDBOX
A sandbox isespecially implemented for testingthesoftware
in an operating system environment. It is also used for
controlling the resources like file descriptors, memory, file
system space. If the implementation is made by any unified
processthen individual systemresourcesareaccessedwhich
are provided by the operating system. So the system
sandbox provides access control to the individual operating
system components.
3. KEY SYSTEM OF SANDBOX
Some of the operating system key system components are
files, the registry, network interfaces, the CPU, I/O,locksand
processes.
A. Files
The user and operating system data are stored in the file
system. If there is any change in the file system without the
knowledge of user then the data can be removed or it can be
modified directly using the operating system security. The
target of file system is to access the requests which are to be
mapped directly to the required directory containing the
root of the file system. There are two ways for accessing the
file: 1) host of the file system does not know the content 2)
another process reads the arbitrary files in the host system.
B. Registry
The registry contains the configured data of operating
system and also the other applications. As registry is the
main component, it should be specifically secured. Malware
doesn’t alter the data which is stored in the registry.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 535
Fig 2: Sandbox
C. Network Interfaces
Network interfaces are the computer worms which are
contacted through remote servers and also they coordinate
their activities within the system. Network is the creation of
independent environment where the process of arbitrary
communicates with the local network and also on the
internet. Any of the process is unique with its virtual IP
address then the kind of isolation does not get supported
with the sandbox systems. Network isolation is the most
specific sense which is used for controlling and limiting the
access during the process of communication on local
network and also on the internet.
4. ISOLATED SANDBOX AND CONTROLLER NODES
The nodes can be built with the help function based on the
isolated sandboxes. When the environment is disconnected,
it can be managed through actions such as executing and
introducing specimens. The related logs are collected and
carried out without network connections. It can separate
virtual local area network which acts as a security gateway
and a controller node. The control messages from the
management terminal are maintained by mimetic internet
and the malware incubator. The nodesare collectedfromthe
malware incubator.
5. MIMETIC INTERNET
The main role of mimetic internet is to identify the mistakes
made by the malwares. The end view host can be modeledas
the collection of behavior to target the hosts which involves
services like the count of gateways and some of the link
qualities such as the bandwidth and a term called as RTT
which targets each hosts. The mimetic internet consists of
emulated routes and a mimetic target hosts. Mimetic
internet constructs on the virtual environment because it
helps to detect the virtualized environment techniques.
6. CONCLUSION
The goal is to design a system sandbox in the Microsoft
windows system which provides security for the executed
applications. The sandbox model helpsin solvingthecurrent
security problems. The security test showsthe functionality
model. The main drawback of the sandbox is the waste of
storage space. The mimetic internet and the malware
incubator are used with a renewable node. A tool is used by
developers and it is applied to java sandbox to the
applications. Due to the large numberofexistingframeworks
and libraries without the knowledge arise some of the
complaints which are too difficult
7. FUTURE SCOPE
The mechanism of malwares is isolated in a sand box. By
using the mimetic internet the malware incubator can be
renewed actual node. The specimens can be enabled to
download the files and to join the command through real
networks. The applications of the mimetic internet can be
experimented by IP trace based routing devices.
8. REFERENCES
[1] E. Skoudis and L. Zeltser, “MALWARE – Fighting
Malicious Code”, Prentice Hall PTR, ISBN 0-13-1014056,
Pearson Education Inc., 2004.
[2] S. Miwa and H. Ohno, “A Development of Experimental
Environments ”SIOS” and ”VM Nebula” for Reproducing
Internet Security Incidents”, Journal of the NationalInstitute
of Information and Communications Technology, Vol.52
Numbers 1/2 (pp.23-34) 2005, ISSN 1349-3205, Oct. 2005.
[3] E. Eilam, “Reversing: Secrets of Reverse Engineering”,
ISBN 0-7645-7481-7, Wiley Publishing, Inc., 2005.
[4] M. Vrable, J. Ma, J. Chen, D. Moore, E. Vandekieft and A. C.
Snoeren, “Scalability, Fidelity, and Containment in the
Potemkin Virtual Honeyfarm”, Oct. 2005.
[5] S. Crosby, D. E. Williamsand J. Garcia, “Virtualizationwith
Xen: Including Xen Enterprise, Xen Server and Xen Express”,
Syngress Media Inc., ISBN 1-597-491675, 2007.
[6] T. Miyachi, K. Chinen, and Y. Shinoda, “StarBED and
SpringOS: Large-scale GeneralPurposeNetworkTestbedand
Supporting Software”, Valuetools, Oct. 2006.

Weitere ähnliche Inhalte

Was ist angesagt?

Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Aaron ND Sawmadal
 
ht-f02-inside-the-world-of-java-applets_final
ht-f02-inside-the-world-of-java-applets_finalht-f02-inside-the-world-of-java-applets_final
ht-f02-inside-the-world-of-java-applets_final
Abhishek Singh
 
A honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityA honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network security
IAEME Publication
 

Was ist angesagt? (19)

IRJET- A Review on Honeypots
IRJET-  	  A Review on HoneypotsIRJET-  	  A Review on Honeypots
IRJET- A Review on Honeypots
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless Biometric
 
Research Paper on Rootkit.
Research Paper on Rootkit.Research Paper on Rootkit.
Research Paper on Rootkit.
 
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
 
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
 
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
 
IRJET- Detection of SQL Injection using Machine Learning : A Survey
IRJET- Detection of SQL Injection using Machine Learning : A SurveyIRJET- Detection of SQL Injection using Machine Learning : A Survey
IRJET- Detection of SQL Injection using Machine Learning : A Survey
 
Website vulnerability to session fixation attacks
Website vulnerability to session fixation attacksWebsite vulnerability to session fixation attacks
Website vulnerability to session fixation attacks
 
Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS
 
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
 
Ld3420072014
Ld3420072014Ld3420072014
Ld3420072014
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
A look at current cyberattacks in Ukraine
A look at current cyberattacks in UkraineA look at current cyberattacks in Ukraine
A look at current cyberattacks in Ukraine
 
ht-f02-inside-the-world-of-java-applets_final
ht-f02-inside-the-world-of-java-applets_finalht-f02-inside-the-world-of-java-applets_final
ht-f02-inside-the-world-of-java-applets_final
 
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
 
A honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityA honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network security
 
Optimised malware detection in digital forensics
Optimised malware detection in digital forensicsOptimised malware detection in digital forensics
Optimised malware detection in digital forensics
 
1738 1742
1738 17421738 1742
1738 1742
 
44641917 091011
44641917 09101144641917 091011
44641917 091011
 

Ähnlich wie IRJET- Sandbox Technology

Ähnlich wie IRJET- Sandbox Technology (20)

IRJET - A Comprehensive Review on Security Issues and Challenges in Lightweig...
IRJET - A Comprehensive Review on Security Issues and Challenges in Lightweig...IRJET - A Comprehensive Review on Security Issues and Challenges in Lightweig...
IRJET - A Comprehensive Review on Security Issues and Challenges in Lightweig...
 
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingCrypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
 
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
IRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud Storage
 
publishable paper
publishable paperpublishable paper
publishable paper
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
 
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud Environment
 
IRJET- Analysis of Forensics Tools in Cloud Environment
IRJET-  	  Analysis of Forensics Tools in Cloud EnvironmentIRJET-  	  Analysis of Forensics Tools in Cloud Environment
IRJET- Analysis of Forensics Tools in Cloud Environment
 
Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat app
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
 
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast Environment
 
Vulnerability Management in IT Infrastructure
Vulnerability Management in IT InfrastructureVulnerability Management in IT Infrastructure
Vulnerability Management in IT Infrastructure
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
 
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
 
IRJET- Data Deduplication Security with Dynamic Ownership Management
IRJET- Data Deduplication Security with Dynamic Ownership ManagementIRJET- Data Deduplication Security with Dynamic Ownership Management
IRJET- Data Deduplication Security with Dynamic Ownership Management
 

Mehr von IRJET Journal

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Kürzlich hochgeladen

Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Kürzlich hochgeladen (20)

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 

IRJET- Sandbox Technology

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 534 SANDBOX TECHNOLOGY Arockia Panimalar.S1, Tamilselvi.K2, Vani.K3 1Assistant Professor, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Tamilnadu 2,3 III BCA ‘A’, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Tamilnadu ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract: The sandbox technology aimstocreateasecureand virtualized sandbox environment at the level of respective applications. The sandbox is considered to have a minimal impact on the semantics as well as the program which is executed at a time and provides an efficient sandbox configuration.Themalwares which arecalledasviruses,worms and bolts have an anti analysis functions to confirm the connectivity of certain hosts which detects the virtualized environments. To avoid the impacts from the Internet, the analyzed environments should be disconnected from the Internet but they must be able to make malwares believe that they are connected to the real Internet. Key Words: Sandbox, System Sandbox, Operating System Security, Controller Nodes. 1. INTRODUCTION Sandbox technology is used to avoid a security threat which runs as separate programsin computer systems. Sandbox is especially used to execute the code which is not tested or it may be possibly unverified without harming the host machine or the operating system. A set of guest programs are set for the disk to run in a tightly controlled set of resources. Sandbox in a testing environment is that the untested codes can be changed and productionenvironment can be experimented as out righted which includes revision control and web development. Fig 1: Production of Data Warehouse in Sandbox The live servers are protected by sandboxing where the source code gets distributed and the changes may cause some of the damages to a mission critical system. The main aim of the sandbox is to test the minimal functionality of the code or to test the programs accurately under the wed development process. To access the development environment variables are needed. The sandbox can be also called as a test server or as a working directory or directory server. This test directory is built with the help of revision control software. The revision control softwaresareCVSand sub version (SVN). These softwares are used by developers to copy a source code tree or a branch of code to work and examine the process. After testing the code, if thedevelopers find any changes in the code they should move back to the own sandbox and merge with their repositoriesand thereby it will used by other users or else by end users. 2. IMPLEMENTATION OF SANDBOX A sandbox isespecially implemented for testingthesoftware in an operating system environment. It is also used for controlling the resources like file descriptors, memory, file system space. If the implementation is made by any unified processthen individual systemresourcesareaccessedwhich are provided by the operating system. So the system sandbox provides access control to the individual operating system components. 3. KEY SYSTEM OF SANDBOX Some of the operating system key system components are files, the registry, network interfaces, the CPU, I/O,locksand processes. A. Files The user and operating system data are stored in the file system. If there is any change in the file system without the knowledge of user then the data can be removed or it can be modified directly using the operating system security. The target of file system is to access the requests which are to be mapped directly to the required directory containing the root of the file system. There are two ways for accessing the file: 1) host of the file system does not know the content 2) another process reads the arbitrary files in the host system. B. Registry The registry contains the configured data of operating system and also the other applications. As registry is the main component, it should be specifically secured. Malware doesn’t alter the data which is stored in the registry.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 535 Fig 2: Sandbox C. Network Interfaces Network interfaces are the computer worms which are contacted through remote servers and also they coordinate their activities within the system. Network is the creation of independent environment where the process of arbitrary communicates with the local network and also on the internet. Any of the process is unique with its virtual IP address then the kind of isolation does not get supported with the sandbox systems. Network isolation is the most specific sense which is used for controlling and limiting the access during the process of communication on local network and also on the internet. 4. ISOLATED SANDBOX AND CONTROLLER NODES The nodes can be built with the help function based on the isolated sandboxes. When the environment is disconnected, it can be managed through actions such as executing and introducing specimens. The related logs are collected and carried out without network connections. It can separate virtual local area network which acts as a security gateway and a controller node. The control messages from the management terminal are maintained by mimetic internet and the malware incubator. The nodesare collectedfromthe malware incubator. 5. MIMETIC INTERNET The main role of mimetic internet is to identify the mistakes made by the malwares. The end view host can be modeledas the collection of behavior to target the hosts which involves services like the count of gateways and some of the link qualities such as the bandwidth and a term called as RTT which targets each hosts. The mimetic internet consists of emulated routes and a mimetic target hosts. Mimetic internet constructs on the virtual environment because it helps to detect the virtualized environment techniques. 6. CONCLUSION The goal is to design a system sandbox in the Microsoft windows system which provides security for the executed applications. The sandbox model helpsin solvingthecurrent security problems. The security test showsthe functionality model. The main drawback of the sandbox is the waste of storage space. The mimetic internet and the malware incubator are used with a renewable node. A tool is used by developers and it is applied to java sandbox to the applications. Due to the large numberofexistingframeworks and libraries without the knowledge arise some of the complaints which are too difficult 7. FUTURE SCOPE The mechanism of malwares is isolated in a sand box. By using the mimetic internet the malware incubator can be renewed actual node. The specimens can be enabled to download the files and to join the command through real networks. The applications of the mimetic internet can be experimented by IP trace based routing devices. 8. REFERENCES [1] E. Skoudis and L. Zeltser, “MALWARE – Fighting Malicious Code”, Prentice Hall PTR, ISBN 0-13-1014056, Pearson Education Inc., 2004. [2] S. Miwa and H. Ohno, “A Development of Experimental Environments ”SIOS” and ”VM Nebula” for Reproducing Internet Security Incidents”, Journal of the NationalInstitute of Information and Communications Technology, Vol.52 Numbers 1/2 (pp.23-34) 2005, ISSN 1349-3205, Oct. 2005. [3] E. Eilam, “Reversing: Secrets of Reverse Engineering”, ISBN 0-7645-7481-7, Wiley Publishing, Inc., 2005. [4] M. Vrable, J. Ma, J. Chen, D. Moore, E. Vandekieft and A. C. Snoeren, “Scalability, Fidelity, and Containment in the Potemkin Virtual Honeyfarm”, Oct. 2005. [5] S. Crosby, D. E. Williamsand J. Garcia, “Virtualizationwith Xen: Including Xen Enterprise, Xen Server and Xen Express”, Syngress Media Inc., ISBN 1-597-491675, 2007. [6] T. Miyachi, K. Chinen, and Y. Shinoda, “StarBED and SpringOS: Large-scale GeneralPurposeNetworkTestbedand Supporting Software”, Valuetools, Oct. 2006.