Research Journal of Applied Sciences

Year: 2016
Volume: 11
Issue: 10
Page No. 942 - 947

Review of Data Mining Techniques for Malicious Detection

Authors : Nawfal Turki Obeis and Wesam Bhaya

References

Assad, A. and K. Deep, 2016. Applications of Harmony Search Algorithm in Data Mining: A Survey. In: Proceedings of Fifth International Conference on Soft Computing for Problem Solving, Pant, M., K. Deep, J.C. Bansal, A. Nagar and K.N. Das (Eds.). Springer, Singapore, ISBN: 978-981-10-0450-6, pp: 863-874.

Bhaya, W. and M.E. Manaa, 2014. Review clustering mechanisms of distributed denial of service attacks. J. Comput. Sci., 10: 2037-2046.
Direct Link  |  

Chahal, J.K. and A. Kaur, 2016. Use of data mining techniques in intrusion detection L-A survey. Imperial J. Interdiscip. Res., Vol.2,

Christodorescu, M., S. Jha, D. Maughan, D. Song, and C. Wang, 2007. Malware Detection. Springer Science+Business Media, LLC., Boston, MA., Pages: 312.

Desale, K.S., C.N. Kumathekar and A.P. Chavan, 2015. Efficient intrusion detection system using stream data mining classification technique. Proceedings of the 2015 International Conference on Computing Communication Control and Automation (ICCUBEA), February 26-27, 2015, IEEE, New York, USA., ISBN:978-1-4799-6892-3, pp: 469-473.

Egele, M., T. Scholte, E. Kirda and C. Kruegel, 2012. A survey on automated dynamic malware-analysis techniques and tools. ACM Comput. Surveys, Vol. 44. 10.1145/2089125.2089126

Gandotra, E., D. Bansal and S. Sofat, 2014. Malware analysis and classification: A survey. J. Inf. Sec., 2014: 1-9.
CrossRef  |  Direct Link  |  

Hu, X., T. Chiueh and K.G. Shin, 2009. Large-scale malware indexing using function-call graphs. Proceedings of the 16th ACM conference on Computer and Communications Security, November 9-13, 2009, Chicago, IL., USA., pp: 611-620.

Nancy, D., S. Silakari and U. Chourasia, 2016. A survey over the various malware detection techniques used in cloud computing. Intl. J. Eng. Res. Technol., Vol.5,

Ravi, C. and R. Manoharan, 2012. Malware detection using windows api sequence and machine learning. Intl. J. Comput. Appl., 43: 12-16.

Shah, K. and D.K. Singh, 2015. A survey on data mining approaches for dynamic analysis of malwares. Proceedings of the 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), October 8-10, 2015, IEEE, New York, USA., ISBN:978-1-4673-7910-6, pp: 495-499.

You, I. and K. Yim, 2010. Malware obfuscation techniques: A brief survey. Proceedings of the International Conference on Broadband, Wireless Computing, Communication and Applications, November 4-6, 2010, Fukuoka, pp: 297-300.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved