files/journal/2022-09-03_18-45-30-000000_586.png

Research Journal of Applied Sciences

ISSN: Online 1993-6079
ISSN: Print 1815-932x
99
Views
1
Downloads

Review of Data Mining Techniques for Malicious Detection

Nawfal Turki Obeis and Wesam Bhaya
Page: 942-947 | Received 21 Sep 2022, Published online: 21 Sep 2022

Full Text Reference XML File PDF File

Abstract

Malicious is the term used to illustrate any code in any part of a software system that is expected to bring about undesired impacts, security breaks or harm to a system. Malicious programming is outlined with a hurtful intent. Recently, malicious detectors attempt to distinguish unwanted codes by checking Application Programming Interface (API) calls using data mining techniques and/or different methods. Matching the API call utilizing data mining strategies can be utilized as a part of malicious detection systems, for example, frequent pattern, clustering, etc. In this study, a review of malicious detection system based on API calls and data mining strategies are taking into account. Each malicious sample is represented as a data of API calls to the data mining techniques. After transforming the sample that input as a simplified data based on data mining techniques, data mining matching calculations are utilized to similarity between the data tested sample and malicious API call tested samples placed in a database. In this study, a review of utilization of various data mining methods for the detection of malicious program.


How to cite this article:

Nawfal Turki Obeis and Wesam Bhaya. Review of Data Mining Techniques for Malicious Detection.
DOI: https://doi.org/10.36478/rjasci.2016.942.947
URL: https://www.makhillpublications.co/view-article/1815-932x/rjasci.2016.942.947