International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 123 | Views: 254

Research Paper | Computer Science & Engineering | Iraq | Volume 6 Issue 6, June 2017 | Popularity: 6.8 / 10


     

A Proposal for Worm Malware Detection by Using Association Rules

Karim Hashim Al-Saedi, Osama Mohammed Qasim


Abstract: Many attacks of malware occur in these days especially worms. Worms can replicate itself inside the network and spread through each device connected to the network. To prevent these attacks we need a strong Intrusion Detection System to defy this kind of threats. In this proposal, we proposed a method to detect the worms, to be able to prevent the attacks and ensure our network safety. The function of the method is to aggregate the data packets that comes from the outside, and then analyze it. The method will extract the exact feature from a data set and check it if the packet weather it was a threat or a benign depending on rules stored in the database by using one of the data mining technique namely Association Rules. When detect occur a warning will be sounded and it will be stored as a threat, the control unit will arrange the alerts of the malware. We used the Association Rules technique because this technique can extract the wanted features for the malware and classify it as tables and give us the last result of detection. This technique help to reduce the amount of worm malware threats and make the system more accurate in detection.


Keywords: Worm, Malware Detection, Association Rules


Edition: Volume 6 Issue 6, June 2017


Pages: 1526 - 1529



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Karim Hashim Al-Saedi, Osama Mohammed Qasim, "A Proposal for Worm Malware Detection by Using Association Rules", International Journal of Science and Research (IJSR), Volume 6 Issue 6, June 2017, pp. 1526-1529, https://www.ijsr.net/getabstract.php?paperid=ART20174422, DOI: https://www.doi.org/10.21275/ART20174422



Similar Articles

Downloads: 4 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 723 - 730

A Study: Use of Machine Learning for Cyber Security

Nidhi Kataria Chawla, Monika Gaur

Share this Article

Downloads: 98

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2507 - 2509

A Survey on Extended MI technique for Edit Recommendation using Hybrid History Mining and Relevance Feedback

Shradha P. Patil, B. Padmavathi

Share this Article

Downloads: 102

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2203 - 2208

Review on MANETs Characteristics, Challenges, Application and Security Attacks

Anuj Rana, Sandeep Gupta

Share this Article

Downloads: 105

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2334 - 2339

A Novel Way for Mining Frequent and Interesting Patterns using Genetic Algorithm

Reshu Tyagi, Muskaan Batra

Share this Article
Top