Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Data Mining Techniques for Malware Detection Using Signature Extraction


Affiliations
1 Prathyusha Institute of Technology and Management, Chennai – 10, India
     

   Subscribe/Renew Journal


This paper presents a survey of data mining techniques for malware detection using file features. The techniques are categorized based upon a three tier hierarchy that includes file features, analysis type and detection type. File features are the features extracted from binary programs, analysis type is either static or dynamic, and the detection type is borrowed from intrusion detection as either misuse or anomaly detection. It provides the reader with the major advancement in the malware research using data mining on file features and categorizes the surveyed work based upon the above stated hierarchy. This served as the major contribution of this paper.

Keywords

Scanning, Activity Monitoring, Integrity Checking.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 244

PDF Views: 2




  • Data Mining Techniques for Malware Detection Using Signature Extraction

Abstract Views: 244  |  PDF Views: 2

Authors

D. Jayakumar
Prathyusha Institute of Technology and Management, Chennai – 10, India

Abstract


This paper presents a survey of data mining techniques for malware detection using file features. The techniques are categorized based upon a three tier hierarchy that includes file features, analysis type and detection type. File features are the features extracted from binary programs, analysis type is either static or dynamic, and the detection type is borrowed from intrusion detection as either misuse or anomaly detection. It provides the reader with the major advancement in the malware research using data mining on file features and categorizes the surveyed work based upon the above stated hierarchy. This served as the major contribution of this paper.

Keywords


Scanning, Activity Monitoring, Integrity Checking.