ijact-book-coverT

Machine Learning-Based Detection of Malware Threats: A Proactive Approach to Cybersecurity

© 2025 by IJACT

Volume 3 Issue 1

Year of Publication : 2025

Author : Nishchai jayanna Manjula, Srikanth Daggumalli

:10.56472/25838628/IJACT-V3I1P115

Citation :

Nishchai jayanna Manjula, Srikanth Daggumalli, 2025. "Machine Learning-Based Detection of Malware Threats: A Proactive Approach to Cybersecurity" ESP International Journal of Advancements in Computational Technology (ESP-IJACT)  Volume 3, Issue 1: 140-148.

Abstract :

With the increasing speed and complexity of cyber attacks malware remains one of the most significant cybersecurity threats faced by organizations, individuals and governments. Traditional signature detection systems struggle to keep pace with evolving zero-day threats, making Machine Learning (ML) a crucial component of modern cybersecurity. With applications in intrusion detection malware analysis fraud prevention and real-time security response systems ML plays a key role in the detection of threats, prevention and incident response. However integrating ML into cybersecurity presents several challenges. The dynamic nature of cyber threats demands regular model updates. At the same time high-quality data, frequent false alarms, vulnerability to attacks and limited resources make its use more difficult. Additionally privacy and ethical concerns related to data collection and monitoring pose significant hurdles. Despite these challenges, ML techniques continue to evolve with advancements in data sharing and privacy regulations driving its responsible use. If these obstacles are effectively addressed ML can provide more adaptive, scalable and efficient cyber security solutions strengthening defense mechanisms against advanced cyber threats.

References :

[1] Akashdeep Bhardwaj et al., “Secure Framework against Cyber-attacks on Cyber-Physical Robotic Systems,” Journal of Electronic Imaging, vol. 31, no. 6, 2022.
[2] Premkumar Chithaluru et al., “Computational-Intelligence-Inspired Adaptive Opportunistic Clustering Approach for Industrial IoT Networks,” IEEE Internet of Things Journal, vol. 10, no. 9, pp. 7884-7892, 2023.
[3] Iqbal H Sarker et al., “IntruDTree: A Machine Learning Based Cyber Security Intrusion Detection Model,” Symmetry, vol. 12, no. 5, pp. 1-15, 2020.
[4] Barrett, Technical Report, National Institute of Standards and Technology, Gaithersburg, MD, USA, 2018.
[5] Iqbal H. Sarker, “Machine Learning: Algorithms, Real-World Applications and Research Directions,” SN Computer Science, vol. 2, pp. 1-21, 2021.
[6] Iqbal H. Sarker, “CyberLearning: Effectiveness Analysis of Machine Learning Security Modeling to Detect Cyber-Anomalies and Multi-Attacks,” Internet of Things, vol. 14, 2021.
[7] Iqbal H. Sarker, “Machine Learning for Intelligent Data Analysis and Automation in Cybersecurity: Current and Future Prospects,” Annals of Data Science, vol. 10, pp. 1473-1498, 2023.
[8] Hojjat Aghakhani et al., “When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features,” Network and Distributed System Security Symposium, San Diego, United States, pp. 1-21, 2020.
[9] Tim Bai et al., “RDP-Based Lateral Movement Detection using Machine Learning,” Computer Communications, vol. 165, pp. 9-19, 2021.
[10] Iqbal H. Sarker et al., “Cybersecurity Data Science: An Overview from Machine Learning Perspective,” Journal of Big Data, vol. 7, pp. 1-29, 2020.
[11] Robin Sommer, and Vern Paxson, “Outside the Closed World: On Using Machine Learning for Network Intrusion Detection,” IEEE Symposium on Security and Privacy, Oakland, CA, USA, pp. 305-316, 2010.
[12] Anna L. Buczak, and Erhan Guven, “A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection,” IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1153-1176, 2016.
[13] Iftikhar Ahmad et al., “Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection,” IEEE Access, vol. 6, pp. 33789-33795, 2018.
[14] “IEEE Transactions on Information Forensics and Security Publication Information,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. C2-C2, 2011.
[15] Frederick Barr-Smith et al., “Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land,” IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, pp. 1557-1574, 2021.
[16] Muhammad Shoaib Akhtar, and Tao Feng, “Malware Analysis and Detection Using Machine Learning Algorithms,” Symmetry, vol. 14, no. 11, pp. 1-11, 2022.
[17] Anand Handa, Ashu Sharma, and Sandeep K. Shukla, “Machine Learning in Cybersecurity: A Review,” Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, vol. 9, no. 4, 2019.
[18] Mujeeb Ur Rehman Shaikh et al., “Fortifying Against Ransomware: Navigating Cybersecurity Risk Management with a Focus on Ransomware Insurance Strategies,” International Journal of Academic Research in Business and Social Sciences, vol. 14, no. 1, pp. 1415-1430, 2024.
[19] Iqra Naseer, “System Malware Detection Using Machine Learning for Cybersecurity Risk and Management,” Journal of Science & Technology, vol. 3, no. 2, pp. 182-188, 2022.
[20] Sudhir Kumar Pandey, and B.M. Mehtre, “A Lifecycle Based Approach for Malware Analysis,” Fourth International Conference on Communication Systems and Network Technologies, Bhopal, India, pp. 767-771, 2014.

Keywords :

Machine Learning, Cybersecurity, Malware, Response, Detection.