Intensive Malware Detection Approach based on Data Mining

Malicious software, sometimes known as malware, is software designed to harm a computer, network, or any of the connected resources. Without the user's knowledge, malware can spread throughout their computer system. Malware is typically disseminated via online connections and mobile devices. W...

Full description

Bibliographic Details
Main Authors: Israa Ezzat Salem, Karim Hashim Al-Saedi
Format: Article
Language:English
Published: Yayasan Pendidikan Riset dan Pengembangan Intelektual (YRPI) 2023-12-01
Series:Journal of Applied Engineering and Technological Science
Subjects:
Online Access:https://www.yrpipku.com/journal/index.php/jaets/article/view/2865
_version_ 1797208944917086208
author Israa Ezzat Salem
Karim Hashim Al-Saedi
author_facet Israa Ezzat Salem
Karim Hashim Al-Saedi
author_sort Israa Ezzat Salem
collection DOAJ
description Malicious software, sometimes known as malware, is software designed to harm a computer, network, or any of the connected resources. Without the user's knowledge, malware can spread throughout their computer system. Malware is typically disseminated via online connections and mobile devices. While malware has always been a problem in the digital age, its effects have gotten increasingly serious. Traditional malware detection methods seek to locate specific malware samples and families to recognize harmful codes and can be located using traditional signature- and rule-based detection methods. The research focuses on developing malware detectors using data mining techniques. The proposed method outlined below sets itself apart by emphasizing the processing of malware behaviors significantly dependent on aspects. Finding more dependable intelligent detecting techniques is a crucial component of this paper. In order to identify the cluster of the most essential malware features and use decision tree classifiers for malware detection, the study, a common methodology for creating malware detectors based on data mining, is implemented and investigated. Our approach can identify the most significant features of malware that can significantly determine and detect a malware code.
first_indexed 2024-03-07T14:16:45Z
format Article
id doaj.art-ae6743584a124f3b80b710ae42f7b351
institution Directory Open Access Journal
issn 2715-6087
2715-6079
language English
last_indexed 2024-04-24T09:46:51Z
publishDate 2023-12-01
publisher Yayasan Pendidikan Riset dan Pengembangan Intelektual (YRPI)
record_format Article
series Journal of Applied Engineering and Technological Science
spelling doaj.art-ae6743584a124f3b80b710ae42f7b3512024-04-14T12:07:59ZengYayasan Pendidikan Riset dan Pengembangan Intelektual (YRPI)Journal of Applied Engineering and Technological Science2715-60872715-60792023-12-015110.37385/jaets.v5i1.2865Intensive Malware Detection Approach based on Data MiningIsraa Ezzat Salem0Karim Hashim Al-Saedi1Computer Science Department, College of Science, Mustansiriyah University, Baghdad, IraqComputer Science Department, College of Science, Mustansiriyah University, Baghdad, Iraq Malicious software, sometimes known as malware, is software designed to harm a computer, network, or any of the connected resources. Without the user's knowledge, malware can spread throughout their computer system. Malware is typically disseminated via online connections and mobile devices. While malware has always been a problem in the digital age, its effects have gotten increasingly serious. Traditional malware detection methods seek to locate specific malware samples and families to recognize harmful codes and can be located using traditional signature- and rule-based detection methods. The research focuses on developing malware detectors using data mining techniques. The proposed method outlined below sets itself apart by emphasizing the processing of malware behaviors significantly dependent on aspects. Finding more dependable intelligent detecting techniques is a crucial component of this paper. In order to identify the cluster of the most essential malware features and use decision tree classifiers for malware detection, the study, a common methodology for creating malware detectors based on data mining, is implemented and investigated. Our approach can identify the most significant features of malware that can significantly determine and detect a malware code. https://www.yrpipku.com/journal/index.php/jaets/article/view/2865Malware detectionDecision treeMachine learningIdentify malware attack
spellingShingle Israa Ezzat Salem
Karim Hashim Al-Saedi
Intensive Malware Detection Approach based on Data Mining
Journal of Applied Engineering and Technological Science
Malware detection
Decision tree
Machine learning
Identify malware attack
title Intensive Malware Detection Approach based on Data Mining
title_full Intensive Malware Detection Approach based on Data Mining
title_fullStr Intensive Malware Detection Approach based on Data Mining
title_full_unstemmed Intensive Malware Detection Approach based on Data Mining
title_short Intensive Malware Detection Approach based on Data Mining
title_sort intensive malware detection approach based on data mining
topic Malware detection
Decision tree
Machine learning
Identify malware attack
url https://www.yrpipku.com/journal/index.php/jaets/article/view/2865
work_keys_str_mv AT israaezzatsalem intensivemalwaredetectionapproachbasedondatamining
AT karimhashimalsaedi intensivemalwaredetectionapproachbasedondatamining