Detection of Malware and Malicious Executables Using E-Birch Algorithm

Abstract

Malware detection is one of the challenges to the modern computing world. Web mining is the subset of data mining used to provide solutions for complex problems. Web intelligence is the new hope for the field of computer science to bring solution for the malware detection. Web mining is the method of web intelligence to make web as an intelligent tool to combat malware and phishing websites. Generally, malware injected through websites into the user system and modifies the executable file and paralyze the whole activity of the system. Antivirus application utilizes the data mining technique to find the malware in the web. There is a need of heuristic approach to solve the malware problem. Dynamic analysis methods yield better result than the static methods. Data mining is the best option for the dynamic analysis of malware or malicious program. The purpose of the research is to apply the enhanced Birch algorithm to find the malware and modified executables of Windows and Android operating system.

Authors and Affiliations

Dr. Ashit Dutta

Keywords

Related Articles

Gender Effect Canonicalization for Bangla ASR

This paper presents a Bangla (widely used as Bengali) automatic speech recognition system (ASR) by suppressing gender effects. Gender characteristic plays an important role on the performance of ASR. If there is a suppre...

Object-Oriented Context Description for Movie Based Context-Aware Language Learning

Context-aware ubiquitous learning is a promising way to learn languages; however, it requires developers and operators of much effort to construct, deploy, and use the specialized system. As its alternative, this paper p...

OpenCL-Accelerated Object Classification in Video Streams using Spatial Pooler of Hierarchical Temporal Memory

The paper presents a method to classify objects in video streams using a brain-inspired Hierarchical Temporal Memory (HTM) algorithm. Object classification is a challeng-ing task where humans still significantly outperfo...

Shape based Image Retrieval Utilising Colour Moments and Enhanced Boundary Object Detection Technique

The need for automatic object recognition and retrieval have increased rapidly in the last decade. In content-based image retrieval (CBIR) visual cues such as colour, texture, and shape are the most prominent features us...

A Block Cipher Involving a Key Bunch Matrix and an Additional Key Matrix, Supplemented with Xor Operation and Supported by Key-Based Permutation and Substitution

In this paper, we have developed a block cipher by extending the analysis of a Novel Block Cipher Involving a Key bunch Matrix and a Key-based Permutation and Substitution. Here we have include and additional key matrix,...

Download PDF file
  • EP ID EP153997
  • DOI 10.14569/IJACSA.2016.070118
  • Views 137
  • Downloads 0

How To Cite

Dr. Ashit Dutta (2016). Detection of Malware and Malicious Executables Using E-Birch Algorithm. International Journal of Advanced Computer Science & Applications, 7(1), 124-126. https://europub.co.uk/articles/-A-153997