Indian Journal of Science and Technology
DOI: 10.17485/ijst/2019/v12i17/143328
Year: 2019, Volume: 12, Issue: 17, Pages: 1-6
Original Article
Devine Grace Doble Funcion*
IT Faculty, Leyte Normal University, B.Sc. Computer Science/MSc in Information Technology, Philippines; [email protected]
*Author for correspondencd
Devine Grace Doble Funcion
IT Faculty, Leyte Normal University, B.Sc. Computer Science/MSc in Information Technology, Philippines.
Email: [email protected]
Objective: The study aims to identify the characteristics, sources of computer malware. Methods: Data mining technique was explicitly utilized the Apriori algorithm to determine the characteristics, types,and sources of malware once it infiltrates the computer system. The processof gathering the data was through a survey questionnaire using Google form where there are two hundred five (205) IT students answered the survey form. The analysis shows that Apriori algorithm 98% accurately generates association rules on Findings:computer malware. Hence, computer malware can quickly spread through the use of flash drives and common malware that infects computer laboratory is a Virus. Application/Improvements: In the formulation of the computer laboratory policy, there must be clear policy on the use of flash drive inside the laboratory to avoid spreading computer malware that can damage the computer hardware/software. Additionally, a comprehensive study on the use of Apriori Algorithm is recommended.
Keywords: Apriori Algorithm, Computer Malware, Data Mining, Flash Drive, Knowledge Discovery in Database Process
Subscribe now for latest articles and news.