Data Mining Techniques for Computer Virus Detection
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 1
Abstract
Computer viruses are big threat to computer world, researchers doing work in this area have made various efforts in the direction of classification and detection methods of these viruses. Graph mining and system call arrangement are some latest research activities in this field. The computability theory and the semi computable functions are quite important in our context of analyzing malicious activity. A mathematical model like random access stored program machine with the association of attached background is used by Ferenc Leitold while explaining modeling of viruses in his paper. Computer viruses like polymorphic viruses and metamorphic viruses use more efficient techniques for their evolution so it is required to use strong models to understand their evolution and then apply detection followed by the process of removal. Code Emulation is one the strongest way to analyze computer viruses but the anti-emulation activities made by virus designers are working against it. This paper explains the data mining techniques that are used for detection of computer viruses in better manner.
Authors and Affiliations
Ankur Singh Bist
Research on Analysis of Different Image Steganography Techniques
Steganography means the process of thrashing information by embedding messages within other. Information can be in the form of text, audio, video. There are several approaches for the categorization of Steganogra...
PARTICAL SWARM OPTIMIZATION OF TASK SCHEDULING IN CLOUD COMPUTING
Resource provisioning and pricing modeling in cloud computing makes it an inevitable technology both on developer and consumer end. Easy accessibility of software and freedom of hardware configuration increase its...
MODULATION AND PARSEVAL’S THEOREM FOR DISTRIBUTIONAL TWO DIMENSIONAL FOURIER-MELLIN TRANSFORM
The Mellin transform is an integral transform that may be regarded as the multiplicative version of the two-sided Laplace transform and the Fourier transform is a reversible, linear transform with many important pr...
Study of Rear Impact Analysis using Sled Procedure
Rear impact on seat structure and Procedure of sled testing, safety requirement can be decided by deformation and damage caused during sled testing it is kind of dynamic analysis. The projected seat went a complete simu...
GLITCH-FREE NAND-BASED DIGITALLY CONTROLLED DELAY LINES
Glitch is an undesired transition that occurs before the signal settles to its intended value. It is an electrical pulse of short duration that is usually the result of a fault or design error, particularly in a digital...