International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 123

Research Paper | Computer Science & Engineering | Iraq | Volume 6 Issue 6, June 2017


A Proposal for Worm Malware Detection by Using Association Rules

Karim Hashim Al-Saedi [2] | Osama Mohammed Qasim


Abstract: Many attacks of malware occur in these days especially worms. Worms can replicate itself inside the network and spread through each device connected to the network. To prevent these attacks we need a strong Intrusion Detection System to defy this kind of threats. In this proposal, we proposed a method to detect the worms, to be able to prevent the attacks and ensure our network safety. The function of the method is to aggregate the data packets that comes from the outside, and then analyze it. The method will extract the exact feature from a data set and check it if the packet weather it was a threat or a benign depending on rules stored in the database by using one of the data mining technique namely Association Rules. When detect occur a warning will be sounded and it will be stored as a threat, the control unit will arrange the alerts of the malware. We used the Association Rules technique because this technique can extract the wanted features for the malware and classify it as tables and give us the last result of detection. This technique help to reduce the amount of worm malware threats and make the system more accurate in detection.


Keywords: Worm, Malware Detection, Association Rules


Edition: Volume 6 Issue 6, June 2017,


Pages: 1526 - 1529

A Proposal for Worm Malware Detection by Using Association Rules


How to Cite this Article?

Karim Hashim Al-Saedi, Osama Mohammed Qasim, "A Proposal for Worm Malware Detection by Using Association Rules", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=ART20174422, Volume 6 Issue 6, June 2017, 1526 - 1529, #ijsrnet

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'Worm'

Downloads: 102

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2203 - 2208

Review on MANETs Characteristics, Challenges, Application and Security Attacks

Anuj Rana | Sandeep Gupta

Share this Article

Downloads: 105

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka [244] | Mukesh Dalal

Share this Article


Top