Need a perfect paper? Place your first order and save 5% with this code:   SAVE5NOW

Paper Review: A Survey on Malware Detection Using Data Mining Techniques

Summary

The authors tackled the increasing sophistication of malware and the ineffectiveness of traditional detection techniques. For instance, conventional methods cannot effectively detect new and complex malware [1]. The problem aligns with the need to advance adaptive techniques to mitigate the malware adequately. For instance, more conventional static analysis is needed to address polymorphic malware. In addition, there is also a need for more scalability when it comes to dynamic analysis. The authors aim to bridge the gap by focusing on a hybrid solution to avoid any of the highlighted challenges. For instance, there is a need to create an adaptive system that can easily detect and address unseen threats through proactive defense. Therefore, the authors aim to address the problem by providing a long-lasting detection technique.

Based on the proposed solution, the authors suggest an innovative approach (hybrid) to malware detection, which combines dynamic and static feature analysis. In other words, they focus on the integration of data mining techniques, which will not only ensure robustness but also accuracy. Notably, the static analysis is achieved by extracting binaries from malware [1]. On the other hand, the dynamic analysis focuses on capturing the run-time behavior. Hence, according to the authors, combining the two elements will address the existing challenges experienced. In any case, the approaches are used individually. Combining the two methods will also ensure efficacy in the detection procedures. In addition, the authors suggest that continuous learning should also be considered. Continuous learning will provide consistent updates and adaptation to new and evolving threats due to the high rate of digitalization. They also suggest that the IoT measures should be integrated to ensure the challenges are addressed adequately. Therefore, the authors’ proposed solution mainly focuses on enhancing cyber security through an adaptive strategy.

Moreover, regarding methodology, the authors considered a survey on data-mining-based methods for detecting malware. They majorly emphasized dynamic and static representations. They comprehensively discussed malware development and the critical challenges faced in malware detection. Using the survey, they focused on classification and extraction steps such as ensemble methods and diverse classifiers. Also, data distributions and extraction methods were considered [1]. Firstly, they focused on static analysis and embraced dynamic analysis. They further assessed the need for balanced training samples. Hence, the methodology provided valuable insights into malware detection through data mining. The authors found that ensemble classifiers are essential in malware management and forecast the need for IoT and cloud security based on the research outcome.

Evaluation

Analytically, the hybrid solution that the authors propose is significant in addressing cyber security threats. The major strength is recognizing traditional approaches’ limitations and incorporating an adaptive strategy. By combining dynamic and static data mining techniques, the authors increase the accuracy of their malware detection. For instance, static analysis forms the basis for assessing and understanding the malware in line with conventional threats [1]. On the other hand, a proactive element is introduced through dynamic analysis that enables the system to adapt to new strengths. Hence, this solution is long-term and would address the emerging issues. In addition, with the increasing landscape of cyber threats, creating a long-lasting solution would provide adaptive defenses of zero-day and polymorphic attacks. Therefore, the authors offer a feasible solution by identifying the existing limitations.

Conversely, the proposed solution also has specific weaknesses. One of the significant areas for improvement is that the hybrid approach’s effectiveness depends on integrating dynamic and static analysis, which may be complex to implement. Also, high costs may be experienced when implementing the hybrid approach, jeopardizing the system’s scalability. Implementation of the hybrid detection system needs good scrutiny and costly friendly approaches to address any future challenges. Therefore, despite the authors’ workauthors’ work being effective in enhancing malware detection, appropriate methods should be considered for smooth implementation.

Proposal

Some improvements can be considered to ensure the proposed model is enhanced in detecting malware, especially in line with the existing limitations. Firstly, machine learning techniques can be incorporated to enhance the static analysis approach. With such augmentation of machine learning algorithms, it would be easy for the model to understand the patterns of the malware and improve its capacity to identify deviations and new variants.

The authors can also focus on threat intelligence to improve the database used in the static analysis. This approach is essential since it would lead to continuous updates and address emerging threats. It will also form a ground for the timely identification of malicious activities. It would also be fundamental to consider distributed computing or parallel processing. These two approaches are essential since they would address the critical challenges experienced by computational overhead.

Lastly, it would be essential to consider behavioral analysis. Behavioral analysis is fundamental in countering evasion techniques. Also, monitoring executable behaviors will make it easy to detect malicious or anomalous actions. Integrating active learning in the proposed model would also be essential to allow room for continuous adaptation. Therefore, whenever all the proposed elements are integrated into the hybrid model proposed by the authors, it will be easy to achieve long-term, accurate, and efficient malware detection.

Reference

[1] Ye, Y., Li, T., Adjeroh, D., & Iyengar, S. S. (2017). A survey on malware detection using data mining techniques. ACM Computing Surveys (CSUR)50(3), 1-40.

 

Don't have time to write this essay on your own?
Use our essay writing service and save your time. We guarantee high quality, on-time delivery and 100% confidentiality. All our papers are written from scratch according to your instructions and are plagiarism free.
Place an order

Cite This Work

To export a reference to this article please select a referencing style below:

APA
MLA
Harvard
Vancouver
Chicago
ASA
IEEE
AMA
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Need a plagiarism free essay written by an educator?
Order it today

Popular Essay Topics