Malware Detector is a software which detects the malwares from the set of executable files. It works on the Data Mining and Machine Learning Techniques.
2. COMPANY PROFILE
Texplore Laboratories Chandigarh, is a venture of Researchers of CSIR
aimed to provide research solutions for industries along with professional
training to students.
RESEARCH
Following on the footsteps of our
Prime Minister’s “MAKE IN
INDIA” concept, Texplore
Laboratories has become a
growing research organization in
the recent few years for
industries in various fields.
LIVE PROJECTS
Attitude and Heading
Reference System
Gesture Based Home
Automation System
Autonomous Vehicle using
Vision Based Technique
Real Time Threat Detection
3. INTRODUCTION
BACKGROUND
◇During the early
stages of virus creation,
virus programmers tried
to infect a large number
of victims throughout the
world
◇I adopted the strategy
of instructions to detect
virus instead of signature
based technique
SCOPE
◇This Malware Detector
can be used by any type
of user for the security
process to protect from
malwares
◇ It can be used in any
type of institution or
organization in which
data security is the most
essential requirement
UTILITY
◇Protection from the
various types of Virus.
◇It provides the users
with the choice to scan a
particular file as well
scanning the whole
computer.
4. Tools & Techniques
◇ Python IDLE 2.7(for Python Programming)
◇ Tkinter for GUI interface in Python
◇ Pydasm Tool for disassemblying the executable files
DATA MINING
Data Mining is an
analytic process
designed to
explore data(large
data) known as
BIG DATA
PATTERN
MATCHING
Classification
algorithms are
used to detect
the virus using
pattern machine
techniques
5. Technical Learning
◇PYTHON
PROGRAMMI
NG
Learned all the
basics concepts of
language such classes
and lists
Explore various
packages such
Tkinter, matplotlib
and numpy
◇DATA MINING
ALGORITHMS
KNN CLASSIFICATION:
This is a classification algorithm based
on the concept of analysing data and
classifying it into set of classes which
is earlier defined
PARTICLE SWARM
OPTIMIZATION:
This is a computational type of
8. ALGORITHM BACK
END
◇PYDASM
DISASSEMBLER
◇MAIN CODE
I implemented the
code by applying the
technique of Pattern
Matching after
appending the
comparison links with
the help of training
files.
INSTRUCTION
REORDERING
TECHNIQUE
9. CONCLUSION
◇ At the last I can conclude that Data is very crucial component in any device so our
main aim should be to protect that Data from set of virus and malwares. This project is
able to detect virus from the set of executable files and will be helpful in various
devices.
◇Future Scope:
But this project has many limitations as the GUI interface in Python is
quite difficult as compared to other languages such as Java and I want to
extend my project in the field of security by exploring more and more areas
of research and will implement those to gain more knowledge in this field
of security
Editor's Notes
Good Afternoon Teachers
Myself Abhishek Jindal
As we Security is considered