Use of Enhanced Data Mining Technique for Malware Detection

Authors

  • Bakul Panchal  Assistant Professor, Department of Computer Engineering L. D. College of Engineering, Ahmedabad, Gujarat, India

Keywords:

Data Mining, Malware Detection, Summarization

Abstract

Data mining is the process of extracting information from an implicit, unknown information source through classification and learning [1]. Using computer programmes, the similarities and dissimilarities and their patterns are classified and organised automatically to form a data set. This useful information helps in research to obtain better results, which are applicable in many fields such as big data, medical data processing, and other applications. Most of the data classification process depends on the learning process to obtain the data automatically. Using general concept learning, the concept learning task is obtained in the machine learning process. It categorises the instances into positive and negative classes by training the instances and then grouping the information. Using the Boolean valued function, these two classes are obtained [2]. The general format of concept learning deals with more than two classes of instances to obtain information from the training instances. Based on the classified results, the models are selected. Precisely based on the positive and negative instances, the new unknown is compared to those identified and grouped into that respective instance. This kind of learning process is known as supervised learning because the class membership of the instances is known. In unsupervised learning, the training instances don’t know the classes, so the instances are grouped through data analysis [3]. Unsupervised learning is derived from supervised learning to make use of information, and a two-step strategy is followed to obtain the class information [4]. Data mining has also proven a useful tool in cyber security solutions for discovering vulnerabilities and gathering indicators for baselining. In this paper, we discussed the role of data mining in information security, the malware detection process, and an overview of the Minnesota Intrusion Detection System (MINDS), which uses a suite of data mining-based algorithms to address different aspects of cyber security.

References

  1. Rakesh Tomasz and Arun Swami. Mining association rules between sets of items in large databases. In Proceedings of the 1993 ACM SIGMOD international conference on Management of data, pages 207–216. ACM Press, 1993.
  2. Daniel Barbara and Sushil Jajodia, editors. Applications of Data Mining in Computer Security. Kluwer Academic Publishers, Norwell, MA, USA, 2002.
  3. Markus M. Breunig, Hans-Peter Kriegel, Raymond T. Ng, and J Sander. Lof: identifying density-based local outliers. In Proceedings of the 2000 ACM SIGMOD international conference on Management of data, pages 93–104. ACM Press, 2000.
  4. Varun Chandola and Vipin Kumar Summarization – compressing data into an informative representation. In Fifth IEEE International Conference on Data Mining, pages 98–105, Houston, TX, November 2005. [5]William W. Cohen. Fast effective rule induction. In International Conference on Machine Learning (ICML), 1995.
  5. Dorothy E. Denning. An intrusiondetection model. IEEE Trans. Softw. Eng., 13(2):222–232, 1987.
  6. Eric Eilertson, Levent Ertoz, Vipin Kumar, and Kerry Long. Minds – a new approach to the information security process. In 24th Army Science Conference. US Army, 2004.
  7. Levent Ertoz, Eric Eilertson, Aleksander Lazarevic, Pang-Ning Tan, Vipin Kumar, Jaideep Srivastava, and Paul Dokas. MINDS - Minnesota Intrusion Detection System. In Data Mining - Next Generation Challenges and Future Directions. MIT Press, 2004.
  8. Levent Ertoz, Michael Steinbach, and Vipin Kumar. Finding clusters of different sizes, shapes, and densities in noisy, high dimensional data

Downloads

Published

2018-06-30

Issue

Section

Research Articles

How to Cite

[1]
Bakul Panchal, " Use of Enhanced Data Mining Technique for Malware Detection, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 5, pp.1195-1199, May-June-2018.