Malware Detection System using Machine Learning and DATA-Mining Techniques
P.Sujatha1, S.Sivasankari2, P. Sri Priya3, R. Devi4, K.Sharmila5

1Dr. P. Sujatha, Professor, School of Computing Sciences, VISTAS.
2S. Sivasankar, Research Scholar, School of Computing Sciences, VISTAS.
3Dr. P. Sri Priya, Professor, School of Computing Sciences, VISTAS.
4R. Devi, Associate Professor, School of Computing Sciences, VISTAS.
5Dr. K. Sharmila, Associate Professor, School of Computing Sciences, VISTAS.
Manuscript received on July 20, 2019. | Revised Manuscript received on August 10, 2019. | Manuscript published on August 30, 2019. | PP: 2102-2109 | Volume-8 Issue-6, August 2019. | Retrieval Number: F8480088619/2019©BEIESP | DOI: 10.35940/ijeat.F8480.088619
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Serious threat these days is malicious executables. It’s designed to wreck computing system and a few of them cover network while not the information of the owner victimisation the system. Two approaches are derived for it Signature primarily based Detection and Heuristic primarily based Detection. These approaches performed well against celebrated malicious programs however cannot catch the new malicious programs. Totally different researchers have planned ways victimisation data processing and machine learning for police investigation new malicious programs. The strategy supported data processing and machine learning has shown sensible results compared to alternative approaches. This work presents static malware detection system victimisation data processing techniques like data Gain, Principal part analysis, and 3 classifiers: SVM, J48, and Naïve mathematician. For overcoming the dearth of usual ant-virus product, this paper has a tendency to use ways of static analysis to extract valuable options of Windows letter file as well as to extract raw options of Windows executables that area unit letter header data, DLLs, and API functions within every DLL of Windows letter file. Thereafter, data Gain, job frequencies of the raw options area unit calculated to pick out valuable set options, so principal part analysis is employed for spatial property reduction of the chosen options. By adopting the ideas of machine learning and data-mining, this research work constructs a static malware detection system that features a detection rate of 99.6%.
Keywords: Malware Detection, Malicious Codes, Malware, Malware Detection, data Security, data processing