AN INVESTIGATION INTO THE APPLICATION OF DEEP CONVOLUTIONAL NEURAL NETWORKS FOR MALWARE DETECTION

Authors

  • Mamoona Rafique Khan Department of Computer Science , Air university Multan Campus. Author
  • Rana Muhammad Nadeem Department of Computer Science, Govt. Graduate College Burewala, Pakistan. Author
  • Sadia Latif Department of Computer Science , Bahauddin Zakaria University Multan. Author
  • Rabia Tariq Institute of Computing, Muhammad Nawaz Shareef University of Agriculture,Multan, Pakistan Author

DOI:

https://doi.org/10.71146/kjmr409

Keywords:

Malware Detection, Deep neural networks, Malware Detection, Deep neural networks, CNN, Cyber Security, Cyber Security

Abstract

Cyber security is facing a huge threat from malwares motivator and their mass production due to its mutation factors, which results in enormous production of these binaries in short time. Moreover, the domain of malicious intents is also progressing with the increase of compute intensive resources. To detect and highlight these malicious binaries, classification plays a vital rule in listing these malwares as malware by nominating interesting features and trends among them. In this situation, we investigated the application of transfer learning using the EfficientNetV2 architecture for automated malware family classification on the Malimg dataset. Our experiments use a stratified 70/15/15 split for training, validation, and testing. The final model achieves 98.4 % test accuracy, with a macro‑averaged F1‑score of 0.983, precision of 0.985, and recall of 0.982. Using the concept of visualization of malware byte-code, proved more convenient to classify them by object recognition techniques in deep convolutional neural networks. The approach can be readily extended to other cybersecurity datasets and deployed in real‑time detection scenarios, suggesting a promising direction for future research in automated threat analysis

Downloads

Download data is not yet available.
image

Downloads

Published

2025-04-30

Issue

Section

Engineering and Technology

How to Cite

AN INVESTIGATION INTO THE APPLICATION OF DEEP CONVOLUTIONAL NEURAL NETWORKS FOR MALWARE DETECTION. (2025). Kashf Journal of Multidisciplinary Research, 2(04), 216-234. https://doi.org/10.71146/kjmr409

Most read articles by the same author(s)

Similar Articles

21-30 of 130

You may also start an advanced similarity search for this article.