Identification of common parameters for classifying malwares with decision tree
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: Malware analysis is a very tedious and time consuming process. It is the process of determining the behavior and purpose of a given malware sample created by the hacker. Every day new malware sample is being created and released on a large scale by malware authors. Anti-virus companies also requires its database to be updated to protect the victims and organizations. So, this clearly states each one of us to have the tools to analyse the malware. The purpose of this paper is to help Information security professionals, students and peoples, forensic investigator to understand the nature of malwares, and classify them according to the parameters developed by our model with the help of Matlab.
Authors and Affiliations
Aparna Verma , Dr. M. S. Rao , Dr. A. K. Gupta
Simple Load Rebalancing For Distributed Hash Tables In Cloud
Distributed file systems are key building blocks for cloud computing applications based on the Map Reduce programming paradigm. In such file systems, nodes simultaneously serve computing and storage functi...
Edge Adaptive Image Steganography Based on Adaptive Pixel Pair Matching
This paper proposes a new improved steganographic technique based on pixel pair matching which is driven by edge adaptive technique. The cover image is scanned first to explore the edges of the image and is used...
Water–Demand Management in the Kingdom of Saudi Arabia for Enhancement Environment
The purpose and the goal of the paper is growing substantially demand for water and waste-water infrastructure and that is being met through the available scarce and dwindling water resources. The kingdom of Sa...
A Comprehensive Study of Data Warehousing Analysis
Abstract: Data Warehouses are accommodated stockpiling, usefulness and responsiveness to questions past the capacities exchange arranged databases. The utilization of Data Warehousing is to make front-end examination tha...
Evolution of Sha-176 Algorithm
To maintain data integrity hash functions are generally used. Hash function is one type of cryptographic primitives, which provide an assurance for data integrity. NAS has designed SHA hash functions which are th...