A Technique for Classifying and Retrieving of Malware Detials in Signtures Based
Keywords:Type signature base malware detection, database management, Role Base Access.
Signature based is one of the common techniques that are used to detect malware attack. The problem of the signature based is about the management of large database that has a new signature, in this paper we will create a new method to classify and fast retrieve malware of database, the size of database increase database is dependent on the number of signatures that are based on malware file , to solve classify database by using the concept of room based, we use this concept “room based” to manage the database. Each room based that has content Prohibition privileges of signature based on malware files, or pattern of collections of signature based of malware files.
 Intrusion Detection System (2006) , Lecture Notes for Internet Security , Syracuse University
 Karin Ask (2006) Automatic Malware Signature Generation ,kth royal institute of technologey, sweeden
 Christopher M. Bishop (2006 ) Pattern Recognition and Machine Learning Springer Science Business Media, LLC
 M. Szczepanik and I. Jozwiak, “Detecting New and Unknown Malwares Using Honeynet,” WroclawUniversity of Technology, Institute of Informatics, Poland, 2010, p 173.
 Apel, M. ; Bockermann, C. ; Meier, M. " Measuring similarity of malware behavior ", Local Computer Networks, 2009. LCN 2009. IEEE 34th Conference on Digital Object Identifier:10.1109/LCN.2009.5355037 Publication Year: 2009 , Page(s): 891 - 898
 Matunda Nyanchama & Sylvia Osborn,"Access Rights Administration in Role-Based Security System ",The Department of Computer Science, University of Western Ontario, London Ontario,Canada,1994.
 Abraham Silberschatz,Henry F. Korth,S. Sudarshan,"Database System Concepts ",McGraw-Hill ISBN 0-07-228363-7,2001.
How to Cite
Authors who submit papers with this journal agree to the following terms.