Detection of Malware and Malicious Executables Using E-Birch Algorithm

Abstract

Malware detection is one of the challenges to the modern computing world. Web mining is the subset of data mining used to provide solutions for complex problems. Web intelligence is the new hope for the field of computer science to bring solution for the malware detection. Web mining is the method of web intelligence to make web as an intelligent tool to combat malware and phishing websites. Generally, malware injected through websites into the user system and modifies the executable file and paralyze the whole activity of the system. Antivirus application utilizes the data mining technique to find the malware in the web. There is a need of heuristic approach to solve the malware problem. Dynamic analysis methods yield better result than the static methods. Data mining is the best option for the dynamic analysis of malware or malicious program. The purpose of the research is to apply the enhanced Birch algorithm to find the malware and modified executables of Windows and Android operating system.

Authors and Affiliations

Dr. Ashit Dutta

Keywords

Related Articles

Design and Realization of Mongolian Syntactic Retrieval System Based on Dependency Treebank

In the past seven years, Language Research Institute of Inner Mongolia University has constructed a 500,000-word scale Mongolian dependency treebank. The syntactic treebank provides a favorable data platform for language...

Interactive Application Development Policy Object 3D Virtual Tour History Pacitan District based Multimedia

Pacitan has a wide range of tourism activity. One of the tourism district is Pacitan historical attractions. These objects have a history tour of the educational values, history and culture, which must be maintained and...

Medical Image Inpainting with RBF Interpolation Technique

Inpainting is a method for repairing damaged images or to remove unwanted parts of an image. While this process has been performed by professional artists in the past, today, the use of this technology is emerging in the...

Reengineering Framework to Enhance the Performance of Existing Software

Term reengineering refers to improve the quality of the system. Continues maintenance and aging degrade the performance of the software system. Right approach and methodology must be adapted to perform reengineering. Wit...

FPGA Implementation of SVM for Nonlinear Systems Regression

This work resumes the previous implementations of Support Vector Machine for Classification and Regression and explicates the different methods and approaches adopted. Ever since the rarity of works in the field of nonli...

Download PDF file
  • EP ID EP153997
  • DOI 10.14569/IJACSA.2016.070118
  • Views 114
  • Downloads 0

How To Cite

Dr. Ashit Dutta (2016). Detection of Malware and Malicious Executables Using E-Birch Algorithm. International Journal of Advanced Computer Science & Applications, 7(1), 124-126. https://europub.co.uk/articles/-A-153997