Worm Attack Classification Using Ensemble Classifier and DAG

Abstract

the growth of internet technology spread a large amount of data communication. The communication of data compromised network threats and security issues. The network threats and security issues raised a problem of data integrity and loss of data. For the purpose of data integrity and loss of data before 20 year Anderson developed a model of Malware Classification technique. Initially Malware Classification technique work on process of satirical frequency of audit technique logs. Latter on this technique improved by various researchers and apply some other approach such as data mining technique, neural network and expert technique. Now in current research trend of Malware Classification technique used soft computing approach such as fuzzy logic, genetic algorithm and machine learning. For malware classification feature selection is important. The selection of feature in attack attributes and normal traffic attribute is challenging task. The selection of known and unknown attack is also faced a problem of classification. DAG is graph based technique used for the process of feature selection in classification. The acyclic nature of DAG select attribute on selection of entropy. The attribute entropy is high the feature value of DAG network is selected and the attribute value is low the DAG feature selector reduces the value of feature selection. After selection of feature the Gaussian kernel of support vector machine is integrated for classification.

Authors and Affiliations

Abhishek A. Nibe, Avinash B. Anap, Jaydeep T. Arote

Keywords

Related Articles

Primary user signal detection over fading channel in the presence of weakly correlated noise

The rapid deployment of new wireless devices and application leads to increase in demands for wireless radio spectrum. But the fixed spectrum assignment policy becomes a bottleneck for more efficient spectrum utilizatio...

Antecedents and Outcomes of Sport Commitment: An Indian Cricket Case Study

There are two primary objectives of this paper. Firstly, to understand how cricket players conceptualize sport commitment and secondly, to investigate and model the factors that facilitate young cricket player’s commit...

Deblurring of Noisy or Blurred Image by Using Kernel Estimation Algorithm

This paper presents, taking the photos under dim lighting conditions using a hand-held camera becomes blurry or noisy. If the camera is set to a long exposure time, the image is blurred due to camera shake. While, the i...

A Study on Factors Affecting Maintainability and Maintainability Models

In the day-to-day life, Quality of software is essential. To achieve this quality, the main factor associated is Maintainability. So it is important to measure the maintainability of the system. Maintainability is defin...

Mining of infrequent itemset From Transactional Weighted Datasets Using Frequent Pattern Growth

Itemset mining is a data mining method extensively used for learning important correlations among data. Initially item sets mining was made on discovering frequent itemsets. Frequent weighted item set characterizes data...

Download PDF file
  • EP ID EP20080
  • DOI -
  • Views 322
  • Downloads 4

How To Cite

Abhishek A. Nibe, Avinash B. Anap, Jaydeep T. Arote (2015). Worm Attack Classification Using Ensemble Classifier and DAG. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(4), -. https://europub.co.uk/articles/-A-20080