ABSTRACT

We have presented various supporting technologies for data mining for malware detection. ese include data mining technologies, malware technologies, as well as data mining applications. First, we provided an overview of data mining techniques. Next, we discussed various types of malware. is was followed by a discussion of data mining for security applications. Finally we provided a summary of the data mining tools we discussed in our previous book, Design and Implementation of Data Mining Tools.