Spyware Detection Using Data Mining

Journal Title: International Journal of Engineering and Techniques - Year 2015, Vol 1, Issue 2

Abstract

The systems connected to the network are vulnerable to many malicious programs which threatens the confidentiality, integrity and availability of a system. Many malicious programs such as viruses, worms, trojan horses, adware, scareware exists. A new malicious program has gained momentum known as spyware. Traditional techniques such as Signature-based Detection and Heuristic-based Detection have not performed well in detecting Spyware. Based on the recent studies it has been proven that data mining techniques yield better results than these traditional techniques. This paper presents detection of spyware using data mining approach. Here binary feature extraction takes place from executable files, which is then followed by feature reduction process so that it can be used as training set to generate classifiers. Hence, the generated classifiers classify new and previously unseen binaries as benign files or spywares.

Authors and Affiliations

Keywords

Related Articles

Synchronized Overlapped Schedules for Clusters in Wireless Sensor Networks

This paper proposes medium access control (MAC) layer protocol for wireless sensor networks. Sensor nodes are battery operated so the energy efficiency is an important aspect for the wireless sensor networks WSNs. The pr...

A review paper on Process Mining

This study aims to enlighten the researchers about the details of process mining. research area, it includes process modelling and process analysis, as well as business intelligence and data mining. Also it is used as a...

Analysis of Loss Reduction for Radial Distribution System Using Network Reconfiguration

Nowadays, the electricity demand is increasing daily and hence it is important not only to extract electrical energy from all possible new power resources but also to reduce power losses to an acceptable minimum level in...

Solution To Carpool Problems using Genetic Algorithms

Recently, rates of vehicle ownership have risen globally, exacerbating problems including air pollution, lack of parking, and traffic congestion. While many solutions to these problems have been proposed, Carpooling is o...

Analysis of C-F Short Cylindrical Shells under Internal Hydrostatic Pressure using Polynomial Series Shape Function

The analysis of short cylindrical shells with one end clamped and the other end free (C-F) under internal hydrostatic pressure was presented. The study was carried out through a theoretical formulation based on polynomia...

Download PDF file
  • EP ID EP354443
  • DOI -
  • Views 98
  • Downloads 0

How To Cite

(2015). Spyware Detection Using Data Mining. International Journal of Engineering and Techniques, 1(2), 5-8. https://europub.co.uk/articles/-A-354443