Spyware Detection Using Data Mining

Journal Title: International Journal of Engineering and Techniques - Year 2015, Vol 1, Issue 2

Abstract

The systems connected to the network are vulnerable to many malicious programs which threatens the confidentiality, integrity and availability of a system. Many malicious programs such as viruses, worms, trojan horses, adware, scareware exists. A new malicious program has gained momentum known as spyware. Traditional techniques such as Signature-based Detection and Heuristic-based Detection have not performed well in detecting Spyware. Based on the recent studies it has been proven that data mining techniques yield better results than these traditional techniques. This paper presents detection of spyware using data mining approach. Here binary feature extraction takes place from executable files, which is then followed by feature reduction process so that it can be used as training set to generate classifiers. Hence, the generated classifiers classify new and previously unseen binaries as benign files or spywares.

Authors and Affiliations

Keywords

Related Articles

Carpooling Using Genetic Algorithm

Now a day’s traffic congestion is a main issue all over the world so we are proposing a carpool system that will increase the no of occupation seats by decreasing the no of empty seats. In carpooling, drivers share their...

Blue Brain Advance Technology

We are taking the paper presentation of Blue brain technology concept here we include the definition of blue brain, How it is possible? , Uploading human brain, what is virtual brain, function of a brain, advantages and...

RFID Emergency traffic control and theft alert system

The organized placement of emergency vehicles and traffic control devices on a roadway can create safer working conditions for emergency responders. The risks associated with working in moving traffic and the constantly...

Landscape Pattern Mining using Machine Learning Intelligence

The complexity of landscape pattern mining is well stated due to its non-linear spatial image formation and inhomogeneity of the satellite images. Land Ex tool of the literature work needs several seconds to answer input...

Mobile Distributed Personal Security Application

The goal of this project is to provide a location-based alarm system through which users can broadcast their last known position in emergency situations. The system will be able to send an SMS or an e-mail containing the...

Download PDF file
  • EP ID EP354443
  • DOI -
  • Views 123
  • Downloads 0

How To Cite

(2015). Spyware Detection Using Data Mining. International Journal of Engineering and Techniques, 1(2), 5-8. https://europub.co.uk/articles/-A-354443