Abiola A.M.Marhusin M.F.2024-05-282024-05-2820182227524X10.14419/ijet.v7i4.15.214322-s2.0-85054691476https://www.scopus.com/inward/record.uri?eid=2-s2.0-85054691476&doi=10.14419%2fijet.v7i4.15.21432&partnerID=40&md5=c53529e218f5e8e9ffa6ffde11c13f3ehttps://oarep.usim.edu.my/handle/123456789/9141The focus of our study is on one set of malware family known as Brontok worms. These worms have long been a huge burden to most Windows-based user platforms. A prototype of the antivirus was able to scan files and accurately detect any traces of the Brontok malware signatures in the scanned files. In this study, we developed a detection model by extracting the signatures of the Brontok worms and used an n-gram technique to break down the signatures. This process makes the task to remove redundancies between the signatures of the different types of Brontok malware easier. Hence, it was used in this study to accurately differentiate between the signatures of both malicious and normal files. During the experiment, we have successfully detected the presence of Brontok worms while correctly identifying the benign ones. The techniques employed in the experiment provided some insight on creating a good signature-based detector, which could be used to create a more credible solution that eliminates any threats of old malware that may resurface in the future.en-USK-gramsN-gramsSignature-based detectionSignature-based malware detection using sequences of N-gramsInt. J. Eng. Technol.Article12012574