ABSTRACT
We have presented various supporting technologies for data mining for malware detection. ese include data mining technologies, malware technologies, as well as data mining applications. First, we provided an overview of data mining techniques. Next, we discussed various types of malware. is was followed by a discussion of data mining for security applications. Finally we provided a summary of the data mining tools we discussed in our previous book, Design and Implementation of Data Mining Tools.