Formulating Generalize Malware Attack Pattern Using Features Selection

Malicious software or malware activity is increasingly threatened the network security as the malicious codes can be easily obtained and can be used as a weapon to gain illegal objectives. Hence, network traffic gathered from a control experiment are explored and features selection method is used t...

Full description

Saved in:
Bibliographic Details
Main Authors: Robiah, Yusof, Mohd Zaki, Mas'ud, Siti Rahayu, Selamat, Mohd Faizal, Abdollah, Shahrin, Sahib, Rudy Fadhlee, Mohd Dollah
Format: Article
Language:English
Published: Asian Research Publishing Network (ARPN) 2016
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/16990/2/robiah.pdf
http://eprints.utem.edu.my/id/eprint/16990/
http://www.arpnjournals.org/jeas/research_papers/rp_2016/jeas_0316_3819.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!