Malicious Code Detection through Data Mining Techniques

Abstract

Nowadays computer systems and communication infrastructures are likely to be influenced by different types of attacks so there is need to put further efforts for improving the software trust. Therefore, there will be increase in necessity in the coming time, as the number of software developers and applications will likely grow very significantly. As important advances have been already made on malware executables detection in personal computers in the previous decades which we have reviewed in previous works. However there is more need to adopt some better techniques which can ensure the malware code detection efficiently by testing method over a large set of malicious executables. This paper explores the application of data mining methods to predict rootkits based on the attributes extracted from the information contained in the log files. The rootkit records were categorized as Inline and Other based on the attribute values. In this paper, we proposed three algorithms named as RIPPER, Naives Bayes approach, and Multi-Naïve Bayes using data mining techniques and the comparison of these algorithms.

Authors and Affiliations

Ms. Milan Jain , Ms. Punam Bajaj

Keywords

Related Articles

Text Extraction from Image Using MSER Approach

The automated understanding of textual information in images is an important problem to solve for the Computer Vision and Document Analysis for extracting that information for processing. This needs to generate required...

Secure Image Steganography Algorithm using RGB Image Format and Encryption Technique

The aim of this research is to design a steganography algorithm which not only hide the message behind the image but also provide more security than others. For the purpose of security, encryption technique is used with...

A Comparative Study of cloud and mCloud Computing

Cloud Computing is one of the latest technology. It makes many changes in industry. It is a platform which includes technology, resources and infrastructure. It is a concept of sharing resources to achieve economical ben...

Paramount role of sequencing in Ubiquitous forms of Nucleotide

Protein microarrays allow biologist to measure the characteristics of amino acid sequence on a small chip. It generates voluminous of data and new intelligent methods are needed to analyze them. Sequence alignment is cha...

TOWARDS DEVELOPMENT OF CLOUD OPERATING SYSTEMS

Cloud operating system provides the abstraction of complex physical datacenter infrastructure by providing different interfaces for local and remote users. It manages the interaction between aplications and their interfa...

Download PDF file
  • EP ID EP147410
  • DOI -
  • Views 112
  • Downloads 0

How To Cite

Ms. Milan Jain, Ms. Punam Bajaj (2014). Malicious Code Detection through Data Mining Techniques. International Journal of Computer Science & Engineering Technology, 5(5), 553-557. https://europub.co.uk/articles/-A-147410