MALWARE DETECTION USING
DATA MININGAbhishek Jindal101303006
Supervisor:Mr.Sajjad HussianTexplore LaboratoriesChandigarh
COMPANY PROFILETexplore Laboratories Chandigarh, is a venture of Researchers of CSIR aimed to provide research solutions for industries along with professional training to students.RESEARCH
Following on the footsteps of our Prime Minister’s “MAKE IN INDIA” concept, Texplore Laboratories has become a growing research organization in the recent few years for industries in various fields.
LIVE PROJECTSAttitude and Heading Reference SystemGesture Based Home Automation SystemAutonomous Vehicle using Vision Based TechniqueReal Time Threat Detection
INTRODUCTIONBACKGROUND◇ During the early
stages of virus creation, virus programmers tried to infect a large number of victims throughout the world
◇ I adopted the strategy of instructions to detect virus instead of signature based technique
SCOPE◇ This Malware
Detector can be used by any type of user for the security process to protect from malwares
◇ It can be used in any type of institution or organization in which data security is the most essential requirement
UTILITY◇ Protection from
the various types of Virus.
◇ It provides the users with the choice to scan a particular file as well scanning the whole computer.
Tools & Techniques
◇ Python IDLE 2.7(for Python Programming)◇ Tkinter for GUI interface in Python◇ Pydasm Tool for disassemblying the executable
files
DATA MINING
Data Mining is an analytic
process designed to
explore data(large data)
known as BIG DATA
PATTERN MATCHING
Classification algorithms are used to detect the virus using
pattern machine
techniques
Technical Learning◇ PYTHON
PROGRAMMING
Learned all the basics concepts of language such classes and lists Explore various packages such Tkinter, matplotlib and numpy
◇ DATA MINING ALGORITHMS
KNN CLASSIFICATION: This is a classification algorithm based on the concept of analysing data and classifying it into set of classes which is earlier defined PARTICLE SWARM OPTIMIZATION: This is a computational type of optimization in which one particle changes its variable after interacting with other particles
FLOW CHART OF THE PROJECT
GUI INTERFACE
ALGORITHM BACK END
◇ PYDASM DISASSEMBLER
◇ MAIN CODE I implemented the code by applying the technique of Pattern Matching after appending the comparison links with the help of training files. INSTRUCTION REORDERING TECHNIQUE
CONCLUSION◇ At the last I can conclude that Data is very crucial component in any
device so our main aim should be to protect that Data from set of virus and malwares. This project is able to detect virus from the set of executable files and will be helpful in various devices.
◇ Future Scope: But this project has many limitations as the GUI interface in Python is quite difficult as compared to other languages such as Java and I want to extend my project in the field of security by exploring more and more areas of research and will implement those to gain more knowledge in this field of security