Downloads: 123 | Views: 254
Research Paper | Computer Science & Engineering | Iraq | Volume 6 Issue 6, June 2017 | Popularity: 6.8 / 10
A Proposal for Worm Malware Detection by Using Association Rules
Karim Hashim Al-Saedi, Osama Mohammed Qasim
Abstract: Many attacks of malware occur in these days especially worms. Worms can replicate itself inside the network and spread through each device connected to the network. To prevent these attacks we need a strong Intrusion Detection System to defy this kind of threats. In this proposal, we proposed a method to detect the worms, to be able to prevent the attacks and ensure our network safety. The function of the method is to aggregate the data packets that comes from the outside, and then analyze it. The method will extract the exact feature from a data set and check it if the packet weather it was a threat or a benign depending on rules stored in the database by using one of the data mining technique namely Association Rules. When detect occur a warning will be sounded and it will be stored as a threat, the control unit will arrange the alerts of the malware. We used the Association Rules technique because this technique can extract the wanted features for the malware and classify it as tables and give us the last result of detection. This technique help to reduce the amount of worm malware threats and make the system more accurate in detection.
Keywords: Worm, Malware Detection, Association Rules
Edition: Volume 6 Issue 6, June 2017
Pages: 1526 - 1529
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 4 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024
Pages: 723 - 730A Study: Use of Machine Learning for Cyber Security
Nidhi Kataria Chawla, Monika Gaur
Downloads: 98
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2507 - 2509A Survey on Extended MI technique for Edit Recommendation using Hybrid History Mining and Relevance Feedback
Shradha P. Patil, B. Padmavathi
Downloads: 102
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2203 - 2208Review on MANETs Characteristics, Challenges, Application and Security Attacks
Anuj Rana, Sandeep Gupta
Downloads: 105
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1572 - 1577Analysis of Various Malicious Node Detection Techniques: A Review
Priyanka, Mukesh Dalal
Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 2334 - 2339A Novel Way for Mining Frequent and Interesting Patterns using Genetic Algorithm
Reshu Tyagi, Muskaan Batra