MACHINE LEARNING TECHNIQUES FOR REAL-TIME MALWARE DETECTION AND PREVENTION

Authors

  • Muhammad Ali Saeed Department of Computer Science, NFC Institute of Engineering and Technology, Multan, Pakistan. Author
  • Muhammad Abdur Raphay Zia i2c Inc Lahore, Pakistan. Author
  • Naeem Aslam Department of Computer Science, NFC Institute of Engineering and Technology, Multan, Pakistan. Author
  • Muhammad Fuzail Department of Computer Science, NFC Institute of Engineering and Technology, Multan, Pakistan. Author
  • Muhammad Tanveer Meeran Faculty of computer science and mathematics, Universiti Malaysia Terengganu, Malaysia. Author

DOI:

https://doi.org/10.71146/kjmr517

Keywords:

Machine learning, Malware detection, Cybersecurity, Random Forest, Gradient Boosting, Support Vector Machine, Anomaly detection

Abstract

Viruses are dangerous and can weaken security besides costing a lot of money to any computer system in use today. The traditional techniques of malware detection including signature-based detection suffer from problems such as manual update, reactive approach toward threats, and scalability. This paper aims at analyzing the potential of applying machine learning in the detection of malware. Machine learning helps to detect new unknown types of malware because the program uses the data obtained and adapts to new threats. Based on three metrics features, this paper analyses the characteristics of Random Forest, Gradient Boosting, Support Vector Machine algorithms in malware detection. The results presented herein show that these models can enhance the detection rate, and offer Malware detection solutions that are both sustainable and flexible. This piece of research helps to enhance the methods for designing proper and effective cybersecurity.

Downloads

Download data is not yet available.
image

Downloads

Published

2025-07-03

Issue

Section

Engineering and Technology

How to Cite

MACHINE LEARNING TECHNIQUES FOR REAL-TIME MALWARE DETECTION AND PREVENTION. (2025). Kashf Journal of Multidisciplinary Research, 2(07), 1-13. https://doi.org/10.71146/kjmr517

Most read articles by the same author(s)

1 2 3 4 > >> 

Similar Articles

21-30 of 173

You may also start an advanced similarity search for this article.