Analyzing malware log files for internet access investigation using Hadoop
On the Internet, malicious software (malware) is one of the most serious threats to system security. Major complex issues and problems on any software systems are frequently caused by malware. Malware can infect any computer software that has connection to Internet infrastructure. There are many typ...
Saved in:
Main Author: | Mat Deli, Mohd. Sharudin |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2017
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/78843/1/MohdSharudinMatMAIS2017.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Weka - Hadoop Data Mining Techniques and Applications
by: Nejad, Elaheh Mahraban
Published: (2012) -
A visually-verifiable malware classification framework using malware behaviour image
by: Mohd. Shaid, Syed Zainudeen
Published: (2014) -
Log Mining Using Generalized Association Rules
by: Mohd. Helmy, Abd. Wahab
Published: (2004) -
A framework for malware identification based on behavior
by: Mohamad Fadli, Zolkipli
Published: (2012) -
Analyzing DNA Sequences Using Clustering Algorithm
by: Alhersh, Taha Talib Ragheb
Published: (2009)