Spyware Detection Using Data Mining
Journal Title: International Journal of Engineering and Techniques - Year 2015, Vol 1, Issue 2
Abstract
The systems connected to the network are vulnerable to many malicious programs which threatens the confidentiality, integrity and availability of a system. Many malicious programs such as viruses, worms, trojan horses, adware, scareware exists. A new malicious program has gained momentum known as spyware. Traditional techniques such as Signature-based Detection and Heuristic-based Detection have not performed well in detecting Spyware. Based on the recent studies it has been proven that data mining techniques yield better results than these traditional techniques. This paper presents detection of spyware using data mining approach. Here binary feature extraction takes place from executable files, which is then followed by feature reduction process so that it can be used as training set to generate classifiers. Hence, the generated classifiers classify new and previously unseen binaries as benign files or spywares.
Carpooling Using Genetic Algorithm
Now a day’s traffic congestion is a main issue all over the world so we are proposing a carpool system that will increase the no of occupation seats by decreasing the no of empty seats. In carpooling, drivers share their...
Blue Brain Advance Technology
We are taking the paper presentation of Blue brain technology concept here we include the definition of blue brain, How it is possible? , Uploading human brain, what is virtual brain, function of a brain, advantages and...
RFID Emergency traffic control and theft alert system
The organized placement of emergency vehicles and traffic control devices on a roadway can create safer working conditions for emergency responders. The risks associated with working in moving traffic and the constantly...
Landscape Pattern Mining using Machine Learning Intelligence
The complexity of landscape pattern mining is well stated due to its non-linear spatial image formation and inhomogeneity of the satellite images. Land Ex tool of the literature work needs several seconds to answer input...
Mobile Distributed Personal Security Application
The goal of this project is to provide a location-based alarm system through which users can broadcast their last known position in emergency situations. The system will be able to send an SMS or an e-mail containing the...