A Technique for Classifying and Retrieving of Malware Detials in Signtures Based


  • Salah Albermany Department of Computer Science Faculty of Computer Science and Mathematics /Kufa University /Iraq


Type signature base malware detection, database management, Role Base Access.


Signature based is one of the common techniques that are used to detect malware attack. The problem of the signature based is about the management of large  database that has a new signature, in this paper we will create a new method to classify and  fast retrieve malware of  database, the size of database increase database is dependent on  the number of signatures that are based on malware file , to solve classify database by using the concept of room based, we use this concept “room based” to manage the database. Each room based that has content Prohibition privileges of signature based on malware files, or pattern of collections of  signature based of malware files.


[1] Ammar Ahmed E. Elhadi, Mohd Aizaini Maarof and Ahmed Hamza Osman (2012). Malware Detection Based on Hybrid Signature Behaviour Application Programming Interface Call Graph. American Journal of Applied Sciences 9 (3): 283-288, 2012
[2] Intrusion Detection System (2006) , Lecture Notes for Internet Security , Syracuse University
[3] Karin Ask (2006) Automatic Malware Signature Generation ,kth royal institute of technologey, sweeden
[4] Christopher M. Bishop (2006 ) Pattern Recognition and Machine Learning Springer Science Business Media, LLC
[5] M. Szczepanik and I. Jozwiak, “Detecting New and Unknown Malwares Using Honeynet,” WroclawUniversity of Technology, Institute of Informatics, Poland, 2010, p 173.
[6] Apel, M. ; Bockermann, C. ; Meier, M. " Measuring similarity of malware behavior ", Local Computer Networks, 2009. LCN 2009. IEEE 34th Conference on Digital Object Identifier:10.1109/LCN.2009.5355037 Publication Year: 2009 , Page(s): 891 - 898
[7] Matunda Nyanchama & Sylvia Osborn,"Access Rights Administration in Role-Based Security System ",The Department of Computer Science, University of Western Ontario, London Ontario,Canada,1994.
[8] Abraham Silberschatz,Henry F. Korth,S. Sudarshan,"Database System Concepts ",McGraw-Hill ISBN 0-07-228363-7,2001.




How to Cite

Albermany, S. (2016). A Technique for Classifying and Retrieving of Malware Detials in Signtures Based. American Scientific Research Journal for Engineering, Technology, and Sciences, 26(1), 250–260. Retrieved from https://asrjetsjournal.org/index.php/American_Scientific_Journal/article/view/2221