SlideShare a Scribd company logo
MALWARE
DETECTION USING
DATA MINING
Abhishek Jindal
101303006
Supervisor:
Mr.Sajjad Hussian
Texplore Laboratories
Chandigarh
COMPANY PROFILE
Texplore Laboratories Chandigarh, is a venture of Researchers of CSIR
aimed to provide research solutions for industries along with professional
training to students.
RESEARCH
Following on the footsteps of our
Prime Minister’s “MAKE IN
INDIA” concept, Texplore
Laboratories has become a
growing research organization in
the recent few years for
industries in various fields.
LIVE PROJECTS
Attitude and Heading
Reference System
Gesture Based Home
Automation System
Autonomous Vehicle using
Vision Based Technique
Real Time Threat Detection
INTRODUCTION
BACKGROUND
◇During the early
stages of virus creation,
virus programmers tried
to infect a large number
of victims throughout the
world
◇I adopted the strategy
of instructions to detect
virus instead of signature
based technique
SCOPE
◇This Malware Detector
can be used by any type
of user for the security
process to protect from
malwares
◇ It can be used in any
type of institution or
organization in which
data security is the most
essential requirement
UTILITY
◇Protection from the
various types of Virus.
◇It provides the users
with the choice to scan a
particular file as well
scanning the whole
computer.
Tools & Techniques
◇ Python IDLE 2.7(for Python Programming)
◇ Tkinter for GUI interface in Python
◇ Pydasm Tool for disassemblying the executable files
DATA MINING
Data Mining is an
analytic process
designed to
explore data(large
data) known as
BIG DATA
PATTERN
MATCHING
Classification
algorithms are
used to detect
the virus using
pattern machine
techniques
Technical Learning
◇PYTHON
PROGRAMMI
NG
Learned all the
basics concepts of
language such classes
and lists
Explore various
packages such
Tkinter, matplotlib
and numpy
◇DATA MINING
ALGORITHMS
KNN CLASSIFICATION:
This is a classification algorithm based
on the concept of analysing data and
classifying it into set of classes which
is earlier defined
PARTICLE SWARM
OPTIMIZATION:
This is a computational type of
FLOW CHART OF THE
PROJECT
GUI INTERFACE
ALGORITHM BACK
END
◇PYDASM
DISASSEMBLER
◇MAIN CODE
I implemented the
code by applying the
technique of Pattern
Matching after
appending the
comparison links with
the help of training
files.
INSTRUCTION
REORDERING
TECHNIQUE
CONCLUSION
◇ At the last I can conclude that Data is very crucial component in any device so our
main aim should be to protect that Data from set of virus and malwares. This project is
able to detect virus from the set of executable files and will be helpful in various
devices.
◇Future Scope:
But this project has many limitations as the GUI interface in Python is
quite difficult as compared to other languages such as Java and I want to
extend my project in the field of security by exploring more and more areas
of research and will implement those to gain more knowledge in this field
of security

More Related Content

PDF
Fengwen_Chen_Resume
PPTX
PDF
ECSA Exam Centre in Adyar
PPTX
Quality Circles
PPTX
Quality circle
PPTX
GEETHAhshansbbsbsbhshnsnsn_INTERNSHIP.pptx
PPTX
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
PPTX
Fengwen_Chen_Resume
ECSA Exam Centre in Adyar
Quality Circles
Quality circle
GEETHAhshansbbsbsbhshnsnsn_INTERNSHIP.pptx
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...

Similar to Malware Detector (20)

PDF
Securezy - A Penetration Testing Toolbox
PDF
Image and text Encryption using RSA algorithm in java
PPTX
Cloud Computing and PSo
PDF
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
PPTX
Keylogger and Steganography Work in IN.pptx
PPTX
Work done upon keylogger - College Work.pptx
PDF
Network Vulnerability and Patching
PPTX
Machine learning in cybersecutiry
PDF
MalPurifier. Детокс вашего андроид устройства по одному вредоносному байту за...
PDF
V4I5201571
PPTX
Cyber security course in kerala | C|PENT | Blitz Academy
PPTX
Cyber security course in kerala | C|PENT | Blitz Academy
PDF
smpef
PPTX
Machine learning in Cyber Security
PDF
Choosing Cybersecurity Tools for Your Tech Stack
PDF
Cloud Based intrusion Detection System
PDF
How to Become a Penetration Tester in 2025 (1).pdf
PDF
2017-07-12 GovLoop: New Era of Digital Security
PDF
WithSecure Deepguard WhitePaper
PDF
HackInBo2k16 - Threat Intelligence and Malware Analysis
Securezy - A Penetration Testing Toolbox
Image and text Encryption using RSA algorithm in java
Cloud Computing and PSo
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
Keylogger and Steganography Work in IN.pptx
Work done upon keylogger - College Work.pptx
Network Vulnerability and Patching
Machine learning in cybersecutiry
MalPurifier. Детокс вашего андроид устройства по одному вредоносному байту за...
V4I5201571
Cyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz Academy
smpef
Machine learning in Cyber Security
Choosing Cybersecurity Tools for Your Tech Stack
Cloud Based intrusion Detection System
How to Become a Penetration Tester in 2025 (1).pdf
2017-07-12 GovLoop: New Era of Digital Security
WithSecure Deepguard WhitePaper
HackInBo2k16 - Threat Intelligence and Malware Analysis
Ad

Recently uploaded (20)

PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PPTX
assetexplorer- product-overview - presentation
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
AutoCAD Professional Crack 2025 With License Key
PPTX
history of c programming in notes for students .pptx
PDF
Digital Systems & Binary Numbers (comprehensive )
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PPTX
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
PDF
iTop VPN 6.5.0 Crack + License Key 2025 (Premium Version)
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PPTX
Transform Your Business with a Software ERP System
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PPTX
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
PPTX
CHAPTER 2 - PM Management and IT Context
PPTX
Advanced SystemCare Ultimate Crack + Portable (2025)
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PPTX
Oracle Fusion HCM Cloud Demo for Beginners
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
Adobe Illustrator 28.6 Crack My Vision of Vector Design
assetexplorer- product-overview - presentation
Design an Analysis of Algorithms II-SECS-1021-03
AutoCAD Professional Crack 2025 With License Key
history of c programming in notes for students .pptx
Digital Systems & Binary Numbers (comprehensive )
wealthsignaloriginal-com-DS-text-... (1).pdf
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
iTop VPN 6.5.0 Crack + License Key 2025 (Premium Version)
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
Transform Your Business with a Software ERP System
Wondershare Filmora 15 Crack With Activation Key [2025
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
CHAPTER 2 - PM Management and IT Context
Advanced SystemCare Ultimate Crack + Portable (2025)
How to Choose the Right IT Partner for Your Business in Malaysia
Oracle Fusion HCM Cloud Demo for Beginners
Navsoft: AI-Powered Business Solutions & Custom Software Development
Ad

Malware Detector

  • 1. MALWARE DETECTION USING DATA MINING Abhishek Jindal 101303006 Supervisor: Mr.Sajjad Hussian Texplore Laboratories Chandigarh
  • 2. COMPANY PROFILE Texplore Laboratories Chandigarh, is a venture of Researchers of CSIR aimed to provide research solutions for industries along with professional training to students. RESEARCH Following on the footsteps of our Prime Minister’s “MAKE IN INDIA” concept, Texplore Laboratories has become a growing research organization in the recent few years for industries in various fields. LIVE PROJECTS Attitude and Heading Reference System Gesture Based Home Automation System Autonomous Vehicle using Vision Based Technique Real Time Threat Detection
  • 3. INTRODUCTION BACKGROUND ◇During the early stages of virus creation, virus programmers tried to infect a large number of victims throughout the world ◇I adopted the strategy of instructions to detect virus instead of signature based technique SCOPE ◇This Malware Detector can be used by any type of user for the security process to protect from malwares ◇ It can be used in any type of institution or organization in which data security is the most essential requirement UTILITY ◇Protection from the various types of Virus. ◇It provides the users with the choice to scan a particular file as well scanning the whole computer.
  • 4. Tools & Techniques ◇ Python IDLE 2.7(for Python Programming) ◇ Tkinter for GUI interface in Python ◇ Pydasm Tool for disassemblying the executable files DATA MINING Data Mining is an analytic process designed to explore data(large data) known as BIG DATA PATTERN MATCHING Classification algorithms are used to detect the virus using pattern machine techniques
  • 5. Technical Learning ◇PYTHON PROGRAMMI NG Learned all the basics concepts of language such classes and lists Explore various packages such Tkinter, matplotlib and numpy ◇DATA MINING ALGORITHMS KNN CLASSIFICATION: This is a classification algorithm based on the concept of analysing data and classifying it into set of classes which is earlier defined PARTICLE SWARM OPTIMIZATION: This is a computational type of
  • 6. FLOW CHART OF THE PROJECT
  • 8. ALGORITHM BACK END ◇PYDASM DISASSEMBLER ◇MAIN CODE I implemented the code by applying the technique of Pattern Matching after appending the comparison links with the help of training files. INSTRUCTION REORDERING TECHNIQUE
  • 9. CONCLUSION ◇ At the last I can conclude that Data is very crucial component in any device so our main aim should be to protect that Data from set of virus and malwares. This project is able to detect virus from the set of executable files and will be helpful in various devices. ◇Future Scope: But this project has many limitations as the GUI interface in Python is quite difficult as compared to other languages such as Java and I want to extend my project in the field of security by exploring more and more areas of research and will implement those to gain more knowledge in this field of security

Editor's Notes

  • #2: Good Afternoon Teachers Myself Abhishek Jindal As we Security is considered