Fuzzy Logic for Computer Virus Detection
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 2
Abstract
Computer viruses are big threat to computer world; researchers doing work in this area have made various efforts in the direction of classification and detection methods of these viruses. Graph mining, system call arrangement and CFG analysis are some latest research activities in this field. The computability theory and the semi computable functions are quite important in our context of analyzing malicious activities. A mathematical model like random access stored program machine with the association of attached background is used by Ferenc Leitold while explaining modeling of viruses in his paper. Computer viruses like polymorphic viruses and metamorphic viruses use more efficient techniques for their evolution so it is required to use strong models for understanding their evolution and then apply detection followed by the process of removal. Code Emulation is one of the strongest ways to analyze computer viruses but the anti-emulation activities made by virus designers are also active. This paper involves the fuzzy logic techniques used for detection of computer viruses in better manner.
Authors and Affiliations
Ankur Singh Bist
Effect of Clipping Ratio on Bit Error Rate Performance of Clipped and Filtered OFDM Signal
Wireless communications is regarded as the most important development with wide range of applications. Advances and development in this field aim for fast and reliable communication. Orthogonal frequency division...
DATA MINING: A TECHNIQUE WITH WIDENING APPLICATIONS AND HAVING SOME ISSUES
Data mining, the extraction of hidden predictive information from large databases, invented as a powerful new technology with great potential to help companies and organizations to focus on the most important info...
Trust Aware Routing Framework
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or...
FINITE ELEMENT ANALYSIS OF TRI - CLAMP
The objective of this paper is to analyze the Tri - Clamp. This work describes a model of the tri clamp is developed using Catia. Finite element analysis performed by the Ansys software. The Tri - Clamp will be u...
Priority Based Congestion Control Protocol and Fair Rate Allocation in WSN
Due to event-driven nature of Wireless Sensor Network, network load enhances which leads to congestion. As a result of congestion, network suffers from energy wastage, throughput reduction and packet loss. In orde...