基于数据挖掘的恶意软件检测的未来评估

Fahad Mira
{"title":"基于数据挖掘的恶意软件检测的未来评估","authors":"Fahad Mira","doi":"10.1109/icci54321.2022.9756097","DOIUrl":null,"url":null,"abstract":"The fourth industrial revolution is the artificial intelligence and digitization of everything, which turns the world into a global hub. The vast use of technology is essential, but it accompanies malwares that destroy confidential information. To overcome these challenges, the latest data mining techniques have been used. It squeezes all invisible information and analyzes massive databases. Malware is unstructured material that can't be determined directly. Various researches have endeavored to turn unstructured data into structured data to overcome this challenge. Due to the rapidly changing and complex pattern of Malware, data mining techniques are used to detect Malware. This survey is furnished with the latest apparatus and pledge information of Malware detection by opting the techniques of data mining. Besides this, it categorizes mainly into two Approaches for-instance signature-based method and the Behaviour-based method. The Focused points of this survey are to layout these First, A a detailed description of Challenges in malware detection by using data mining - Second A complete framework of latest approaches to Machine learning mechanism - Third, a search for an efficient method to detect Malware-Fourth, canvassing of all factor to determine malware approaches in data mining. Moreover, a detailed contrast of detected approaches is also present to facilitate the researchers. Evolution method, advantages and disadvantages are discussed to describe the proficiency. This survey is fully equipped with the latest techniques. In, this report we observed KNN with 22% MLB 16% MLA 12% NB 9% and other SVM 9% KM 7% API 7% and others are less than 5% in detecting malware in data mining., So, we find KNN approach with high accuracy.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Futuristic Appraisal of Malware Detection by Employing Data Mining\",\"authors\":\"Fahad Mira\",\"doi\":\"10.1109/icci54321.2022.9756097\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The fourth industrial revolution is the artificial intelligence and digitization of everything, which turns the world into a global hub. The vast use of technology is essential, but it accompanies malwares that destroy confidential information. To overcome these challenges, the latest data mining techniques have been used. It squeezes all invisible information and analyzes massive databases. Malware is unstructured material that can't be determined directly. Various researches have endeavored to turn unstructured data into structured data to overcome this challenge. Due to the rapidly changing and complex pattern of Malware, data mining techniques are used to detect Malware. This survey is furnished with the latest apparatus and pledge information of Malware detection by opting the techniques of data mining. Besides this, it categorizes mainly into two Approaches for-instance signature-based method and the Behaviour-based method. The Focused points of this survey are to layout these First, A a detailed description of Challenges in malware detection by using data mining - Second A complete framework of latest approaches to Machine learning mechanism - Third, a search for an efficient method to detect Malware-Fourth, canvassing of all factor to determine malware approaches in data mining. Moreover, a detailed contrast of detected approaches is also present to facilitate the researchers. Evolution method, advantages and disadvantages are discussed to describe the proficiency. This survey is fully equipped with the latest techniques. In, this report we observed KNN with 22% MLB 16% MLA 12% NB 9% and other SVM 9% KM 7% API 7% and others are less than 5% in detecting malware in data mining., So, we find KNN approach with high accuracy.\",\"PeriodicalId\":122550,\"journal\":{\"name\":\"2022 5th International Conference on Computing and Informatics (ICCI)\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-03-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 5th International Conference on Computing and Informatics (ICCI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/icci54321.2022.9756097\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference on Computing and Informatics (ICCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/icci54321.2022.9756097","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

第四次工业革命是一切事物的人工智能和数字化,使世界成为全球中心。技术的广泛使用是必不可少的,但它伴随着破坏机密信息的恶意软件。为了克服这些挑战,使用了最新的数据挖掘技术。它能压缩所有看不见的信息,分析海量的数据库。恶意软件是无法直接确定的非结构化材料。为了克服这一挑战,各种研究都在努力将非结构化数据转化为结构化数据。由于恶意软件的快速变化和模式的复杂性,数据挖掘技术被用于检测恶意软件。本次调查采用数据挖掘技术,提供了最新的恶意软件检测设备和保证信息。除此之外,它主要分为两种方法,例如基于签名的方法和基于行为的方法。本调查的重点是:第一,详细描述使用数据挖掘检测恶意软件的挑战;第二,机器学习机制最新方法的完整框架;第三,寻找一种有效的检测恶意软件的方法;第四,仔细分析所有因素以确定数据挖掘中的恶意软件方法。此外,还提供了检测方法的详细对比,以方便研究人员。讨论了演化方法及其优缺点,以描述演化方法的熟练程度。这次调查配备了最先进的技术。在本报告中,我们观察到KNN在数据挖掘中检测恶意软件的比例为22% MLB 16% MLA 12% NB 9%,其他SVM 9% KM 7% API 7%,其他不到5%。因此,我们找到了具有较高准确率的KNN方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Futuristic Appraisal of Malware Detection by Employing Data Mining
The fourth industrial revolution is the artificial intelligence and digitization of everything, which turns the world into a global hub. The vast use of technology is essential, but it accompanies malwares that destroy confidential information. To overcome these challenges, the latest data mining techniques have been used. It squeezes all invisible information and analyzes massive databases. Malware is unstructured material that can't be determined directly. Various researches have endeavored to turn unstructured data into structured data to overcome this challenge. Due to the rapidly changing and complex pattern of Malware, data mining techniques are used to detect Malware. This survey is furnished with the latest apparatus and pledge information of Malware detection by opting the techniques of data mining. Besides this, it categorizes mainly into two Approaches for-instance signature-based method and the Behaviour-based method. The Focused points of this survey are to layout these First, A a detailed description of Challenges in malware detection by using data mining - Second A complete framework of latest approaches to Machine learning mechanism - Third, a search for an efficient method to detect Malware-Fourth, canvassing of all factor to determine malware approaches in data mining. Moreover, a detailed contrast of detected approaches is also present to facilitate the researchers. Evolution method, advantages and disadvantages are discussed to describe the proficiency. This survey is fully equipped with the latest techniques. In, this report we observed KNN with 22% MLB 16% MLA 12% NB 9% and other SVM 9% KM 7% API 7% and others are less than 5% in detecting malware in data mining., So, we find KNN approach with high accuracy.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信