ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

MALWARE DETECTION AND SEARCH RANK FRAUD IN NETWORK USING DATAMINING TECHNIQUES

Journal: International Journal of Computer Science and Mobile Applications IJCSMA (Vol.6, No. 11)

Publication Date:

Authors : ; ; ;

Page : 6-11

Keywords : Network security; Malware detection; Machine learning; Honeypots;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Security has become present in each domain these days as fresh rising malware create Associate in Nursing ever increasing parlous threat to systems. It is able to entice attacks, record intrusion info regarding tools and activities of the hacking method, and prevents attacks outward the compromised system. Honey pots may be thought of to be traps for hackers and intruders and square measure typically deployed complimentary to Intrusion Detection Systems (IDS) and Intrusion hindrance Systems (IPS) in a very network. However, honey pots would serve a rather completely different purpose in our projected system. We intend to use honey pots for searching rank fraud and malwares in networks using honey pots. The advantage of implementing this technology is that an effective initial control can be exercised in fraud rank and malware detection in networks. Keywords: Network security, Malware detection, Machine learning, and Honey pots initial control can be exercised in fraud rank and malware detection in networks.

Last modified: 2018-11-17 23:45:24