ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Techniques in Detection and Analyzing Malware Executables: A Review?

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 5)

Publication Date:

Authors : ; ;

Page : 930-935

Keywords : Malicious Code Detection; Data Mining; Security; Malware; prediction;

Source : Downloadexternal Find it from : Google Scholarexternal


Today computer field has gained a lot of importance in our day to day life to deal with many aspects like education, entertainment purpose etc. System security is warned by weapons named as malicious software to fulfill malicious intention of its authors. Malicious software known as malware is one of the common problem faced by the internet today. The key to detect these threats are also available like AV Scanners, Intrusion Detection System, and Firewalls etc. In this paper we discussed various data mining techniques, several anti-virus systems are there for detecting the malware i.e. malicious code written manually but these approaches are very expensive and oftentimes ineffective. Therefore, there is a requirement to present a data-mining framework that can detect new, malicious executables precisely and systematically. This survey paper highlights the techniques used in analyzing and detecting malware data.

Last modified: 2014-05-29 23:54:57