CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Detection of Malware by using Sequence Alignment Strategy and Data Mining Techniques

by Vivek Kumar, Sadhna K. Mishra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 61 - Number 22
Year of Publication: 2013
Authors: Vivek Kumar, Sadhna K. Mishra
10.5120/10227-4609

Vivek Kumar, Sadhna K. Mishra . Detection of Malware by using Sequence Alignment Strategy and Data Mining Techniques. International Journal of Computer Applications. 61, 22 ( January 2013), 16-19. DOI=10.5120/10227-4609

@article{ 10.5120/10227-4609,
author = { Vivek Kumar, Sadhna K. Mishra },
title = { Detection of Malware by using Sequence Alignment Strategy and Data Mining Techniques },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 61 },
number = { 22 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 16-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume61/number22/10227-4609/ },
doi = { 10.5120/10227-4609 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:10:17.876580+05:30
%A Vivek Kumar
%A Sadhna K. Mishra
%T Detection of Malware by using Sequence Alignment Strategy and Data Mining Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 61
%N 22
%P 16-19
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Malware is basically malicious software or programs which are a major challenge or major threats. for the computer and different computer applications in the field of IT and cyber security. Traditional anti-viral packages and their upgrades are typically released only after the malware's key characteristics have been identified through infection. But by this time it may be too late to protect systems. Multiple sequence analysis is widely used in bioinformatics for helpful the genetic multiplicity of organisms and annotating gene functions through the identification of common genetic regions. This paper adopts a new approach to the problem of malware recognition, which is to use multiple sequence alignment techniques from bioinformatics to align variable length computer viral and worm code so that core, invariant regions of the code occupy fixed positions in the alignment patterns. Data mining (ANNs, symbolic rule extraction) can then be used to learn the critical features that help to determine into which class the aligned patterns fall. Experimental results demonstrate the feasibility of our novel approach for identifying malware code through multiple sequence alignment followed by analysis by ANNs and symbolic rule extraction methods.

References
  1. Vivek kumar, Dr. Sadhna K Mishra, Prof. Vineet Ricchariya "Detection of malicious software by Using Data Mining Tools and Other Techniques- a Survey", IJCSMR volume (1) issue 4, 2012, pp-746-750.
  2. Belleville, Callicut et, al. "Active CMOS biochips: an electro-addressed DNA probe" IEEE conference 1998 pp-272-273.
  3. Cuff, J, Barton, G. , (1999) "Evaluation and Improvement of Multiple Sequence Methods for Protein Secondary Structure Prediction", Proteins: Struct. Funct. Genet. 34, 508-519.
  4. Fooks, H. M. , Martin, A. , woolfson, D. , Sessions, R. , Hutchinson, E. (2006) Amino Acid Pairing Preferences in Parallel ?-Sheets in Proteins, J. Mol. Biol. , 356, 32-44.
  5. S. B. Needleman and C. D. Wunsch, "A general method applicable to the search for similarities in the amino acid sequence of two proteins", Journal of Molecular Biology 48 (3), 1970, pp. 443–53.
  6. T. F. Smith and M. S. Waterman, "Identification of Common Molecular Subsequences", Journal of Molecular Biology 147, 1981, pp. 195–197.
  7. L. Wang and T. Jiang T. "On the complexity of multiple sequence alignment", J Comput Biol, 1 (4), 1994, pp 337–48.
  8. I. Elias, "Settling the intractability of multiple alignment", J Comput Biol 13 (7), 1996, pp. 1323–1339.
  9. Data Mining for Malicious Code Detection and Security Applications
  10. Data Mining: "Concepts and Techniques Jiawei Han and Micheline Kamber", Morgan Kaufmann, 2001.
  11. S. McGhee, "Pairwise Alignment of Metamorphic Computer Viruses". Masters Project Paper 37 2007. Faculty of the Department of Computer Science San Jose State University. http://scholarworks. sjsu. edu/etd_projects/37
  12. Symantec Internet Security Threat Report: Trends for 2010. http://www. symantec. com/business/threatreport/index. jsp
  13. Marshall D. Abrams and Harold J. Podell "Malicious Software. pdf" pp 116-120.
  14. Thomas M. Chen and Gregg W. Tally" Malicious Software. pdf".
  15. Lin Chen and Bo Liu "A layered malware detection model using VMM" IEEE Journal 2011,pp-232-236.
  16. Fahad Bin Muhaya, Muhammad Khurram Khan and Yang Xiang" Polymorphic Malware Detection Using Hierarchical Hidden Markov Model" IEEE, 2011,pp-151-155.
Index Terms

Computer Science
Information Sciences

Keywords

Malware sequence alignment viral signatures HEX editor ASCII code ARFF Dev C++ Java eclipse