The following paper is a worked on detection of intrusion of malicious attacks and data mining technique which allowed detecting at zero level of execution. We also summarized our study with existing tools which are used but not on appropriate level. This is necessary to detect malicious code in network traffic.