Worm Attack Classification Using Ensemble Classifier and DAG

Abstract

the growth of internet technology spread a large amount of data communication. The communication of data compromised network threats and security issues. The network threats and security issues raised a problem of data integrity and loss of data. For the purpose of data integrity and loss of data before 20 year Anderson developed a model of Malware Classification technique. Initially Malware Classification technique work on process of satirical frequency of audit technique logs. Latter on this technique improved by various researchers and apply some other approach such as data mining technique, neural network and expert technique. Now in current research trend of Malware Classification technique used soft computing approach such as fuzzy logic, genetic algorithm and machine learning. For malware classification feature selection is important. The selection of feature in attack attributes and normal traffic attribute is challenging task. The selection of known and unknown attack is also faced a problem of classification. DAG is graph based technique used for the process of feature selection in classification. The acyclic nature of DAG select attribute on selection of entropy. The attribute entropy is high the feature value of DAG network is selected and the attribute value is low the DAG feature selector reduces the value of feature selection. After selection of feature the Gaussian kernel of support vector machine is integrated for classification.

Authors and Affiliations

Abhishek A. Nibe, Avinash B. Anap, Jaydeep T. Arote

Keywords

Related Articles

Hybrid Power Generation And Automatic Railway Gate Control

enerating electric power from the railway tracks and controlling the railway gates in automatic manner. Power consumption is increasing day by day due to modern civilization and industrialization. One of the key points...

Smart-Parking System using Internet-of-Things Technologies and RFID

This paper introduces a novel architecture which enhances the efficiency of existing cloud-based smart-parking systems and develops a network architecture based on the Internet-of-the-art technology. In this paper a sys...

Study of Volume Reduction by Reverse Osmosis and Evaporation of Waste Water

Now a days the problem of various industry effluents is disturbing river and environment. Industry effluent is one of the important biologically degradable wastewater streams, having typical characteristics. It is to be...

Frequency Domain Analysis of Control Systems

The frequency domain analysis is generally done by using a sinusoidal input signal. When a sinusoidal input signal is given to a linear time-invariant system and the output response consists of transient and ready-state...

slugBest Path Routing Algorithm for IDS

In networking there can be any type of security compromise.IDS detects such type of security threat. Information is transferred from one point to another point across the network. There may be various paths between sour...

Download PDF file
  • EP ID EP20080
  • DOI -
  • Views 258
  • Downloads 4

How To Cite

Abhishek A. Nibe, Avinash B. Anap, Jaydeep T. Arote (2015). Worm Attack Classification Using Ensemble Classifier and DAG. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(4), -. https://europub.co.uk/articles/-A-20080