CFP last date
20 December 2024
Reseach Article

Detection of Malicious Data using hybrid of Classification and Clustering Algorithms under Data Mining

by Milan Jain, Bikram Pal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 104 - Number 11
Year of Publication: 2014
Authors: Milan Jain, Bikram Pal
10.5120/18244-9193

Milan Jain, Bikram Pal . Detection of Malicious Data using hybrid of Classification and Clustering Algorithms under Data Mining. International Journal of Computer Applications. 104, 11 ( October 2014), 4-7. DOI=10.5120/18244-9193

@article{ 10.5120/18244-9193,
author = { Milan Jain, Bikram Pal },
title = { Detection of Malicious Data using hybrid of Classification and Clustering Algorithms under Data Mining },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 104 },
number = { 11 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 4-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume104/number11/18244-9193/ },
doi = { 10.5120/18244-9193 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:35:52.084134+05:30
%A Milan Jain
%A Bikram Pal
%T Detection of Malicious Data using hybrid of Classification and Clustering Algorithms under Data Mining
%J International Journal of Computer Applications
%@ 0975-8887
%V 104
%N 11
%P 4-7
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today era modern infrastructures and technologies are more prone to various types of accesses. A method that is commonly used for launching these types of attack is popularly known as malware i. e. viruses, Trojan horses and worms, which, when propagate can cause a great damage to commercial companies, private users and governments. The another reason that enhance malware to infect and spread very rapidly is high-speed Internet connections as it has become more popular now a days, therefore it is very important to eradicate and detect new (benign) malware in a prompt manner. Hence in this work, proposing three data mining algorithms to produce new classifiers with separate features: RIPPER, Naïve Bayes and a Multi Classifier system along with hybrid of clustering techniques and the comparison between these methods to predict which provides better results.

References
  1. Bhavani Thuraisingham, Latifur Khan, Mohammad M. Masud, Kevin W. Hamlen,"Data Mining for Security Applications ",2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp. 585-589.
  2. Boldt, M. ; Dept. of Syst. & Software Eng. , Blekinge Inst. of Technol. , Ronneby ; Jacobsson, A. ; Lavesson, N. ; Davidsson, P. , "Automated Spyware Detection Using End User License Agreements" Information Security and Assurance, 2008. ISA 2008. International Conference on 24-26 April 2008; 978-0-7695-3126-7.
  3. Dr. R. Geetha Ramani, Suresh Kumar. S , Shomona Gracia Jacob"Rootkit (Malicious Code) Prediction through Data Mining Methods and Techniques" , 978-1-4799-1597-2/13/$31. 00 ©2013 IEEE.
  4. Guillermo Suarez-Tangle, "Evolution, Detection and Analysis of Malware for Smart Devices" IEEE communications surveys & tutorials, accepted for publication, 2013, pp. 1-27.
  5. Johannes Kinder, "Detecting Malicious Code by Model Checking" In Second Int. Conf. Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2005), Springer, 2005, pp. 174–187.
  6. Kirti Mathur ,Saroj Hiranwal, "A Survey on Techniques in Detection and Analyzing Malware Executables "International Journal of Advanced Research in Computer Science and Software Engineering , Volume 3, Issue 4, April 2013, pp. 422-428.
  7. Matthew G. Schultz "Data Mining Methods for Detection of New Malicious Executables", IEEE Symposium on Security and Privacy: S amp; P 2001: proceedings: 14-16 May, 2001, pp. 38-49.
  8. Parisa Bahraminikoo "Utilization Data Mining to Detect Spyware", IOSR Journal of Computer Engineering (IOSRJCE), Volume 4, Issue 3, 2012, pp. 01-04.
  9. Robert Moskovitch "Detecting unknown malicious code by applying classification techniques on OpCode patterns" Springer-Verlag "http://link. springer. com/article/10. 1186%2F2190-8532-1-1", 2012, pp. 1-22.
  10. Yuval Elovici, Asaf Shabtai, Robert Moskovitch, Gil Tahan, and Chanan Glezer" Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic". Proceedings of the 30th annual German conference on Advances in Artificial Intelligence, KI 2007, pp. 10-13.
Index Terms

Computer Science
Information Sciences

Keywords

Malicious Code Detection Data Mining Computer Security Prediction