Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Vishwanath Chiniwar, Prerana Joshi, Mr. Pavan Mitragotri
DOI Link: https://doi.org/10.22214/ijraset.2025.73342
Certificate: View Certificate
The exponential growth in malware attacks,especiallyransomware,isacriticalchallengeto digital infrastructure and global cybersecurity. Conventional signature-based detection techniques are less effective against sophisticated polymorphic and metamorphic malware. This paper offers a comprehensive survey of malware detection methods, with emphasis on Behavioral signature-baseddetection. It examines state-of-the-art technologies, such as dynamicanalysis,machinelearning,deeplearning,and generative adversarial networks (GANs), and compares them in terms of their efficacy in detecting malware based on behavior patterns instead of static code. It draws from 46 peer-reviewed papers and emphasizeskey findings, detection architectures, and innovations like RansomNet, DeepCodeLock, and PlausMal-GAN. The review ends by summarizing current limitations, issues such as Behavioral drift, and directions for the future in hybrid and intelligent malware detection systems.
Malware threats are increasingly frequent and sophisticated, evolving from simple viruses to complex forms like ransomware and polymorphic malware. Traditional signature-based antivirus tools struggle against zero-day threats and advanced evasion tactics. Consequently, cybersecurity has shifted towards behavior-based malware detection using AI, machine learning (ML), deep learning (DL), and generative adversarial networks (GANs).
This survey reviews malware detection approaches from 2011 to 2024, focusing on behavioral signatures. It contrasts static signature-based methods with dynamic behavior-based detection, highlighting tools such as RansomNet and DeepCodeLock that improve ransomware detection via deep learning. Challenges include behavioral drift, adversarial evasion, high false positives, dataset scarcity, and explainability issues.
Detection techniques covered include static analysis, dynamic behavioral monitoring (system calls, API hooking, file/registry tracking), ML and DL models (SVMs, CNNs, LSTMs, transformers), GAN-based adversarial training, hardware-assisted monitoring, and honeypot/sandbox environments. Each method has unique strengths and weaknesses in accuracy, robustness, and resource demands.
Behavioral malware detection has diverse practical applications in finance, government, healthcare, mobile security, cloud/edge computing, enterprise networks, and industrial control systems. It offers more adaptive, context-aware protection than traditional signature-based systems, essential for combating modern cyber threats.
Malware continues to be one of the most pervasive and damaging cybersecurity threats in the digital era, with attackers constantly evolving their strategies to bypass traditional detection mechanisms. This paper presentedan extensive survey on malware detection techniqueswith a focus on behavioral signature-basedapproaches. The shift from static, signature-dependent detection to dynamic, behavior-driven models marks a critical evolution in cybersecurity practices. Our analysis reveals that behavioral detection offers significant advantages in identifying novel, polymorphic, and zero-day malware by monitoring runtime activities such as file access, systemcalls, and networkbehavior. It also supports the development of proactive, rather than reactive, security systems. Furthermore, the integration of machine learning, deep learning,andgenerativeadversarialnetworks(GANs) has opened new frontiers in malware classification and Behavioral pattern recognition. However, these models still face challenges, including adversarial attacks, explainability, high false positives, and the need forlarge, diverse datasets. This survey also highlighted innovative tools like MalHunter, DeepCodeLock, and PlausMal-GAN, which exemplify the state of the art in behavior-based malware detection. The comparison between various approaches emphasized the trade-offs between accuracy, speed, scalability, and complexity. In conclusion, behavior-based malware detection is no longer an experimental paradigm but a necessary evolution in modern threat intelligence. Continued research into adaptive models, explainable AI, edge computing, and collaborative threat sharing will be essential for building resilient, future-proof cybersecurity systems.
[1] M.Rouse,\"Networksecurity,\"TechTarget,2023.[Online].Available:https://www.techtarget.com/searchsecurity/definition/ne twork-security [2] J. Karako and J. Elwell, \"Understanding malware and its impact on cybersecurity,\" Carnegie Endowment for International Peace, 2020. doi: 10.2307/resrep26948 [3] T.HoltandB.Schell,Malware:FightingMalicious Code.Jones&BartlettLearning,2011. [4] M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, \"Network anomaly detection: Methods, systems and tools,\" IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 303–336, 2014. doi:10.1109/SURV.2013.052213.0004 [5] L.Bilge,S.Sen,D.Balzarotti,E.Kirda,andC.Kruegel, \"Exposure:ApassiveDNSanalysisservice todetectand report malicious domains,\" ACM Transactions on Information and System Security (TISSEC), vol. 16, no. 4, pp. 1–28, 2014. doi:10.1145/2542049 [6] M. A. Qureshi, M. R. Asghar, A. Shahzad, and M. A. S. Kamal, \"Malware and anti-malware detection and prevention: An overview,\" Journal of Information SecurityandApplications, vol. 62,p.103068, 2021. doi: 10.1016/j.jisa.2021.103068 [7] C. Sharma and S. Ahuja, \"Comparative analysis of malware detection techniques: a review,\" in Proc. 3rd International Conference on Intelligent Sustainable Systems (ICISS), IEEE, 2020, pp. 229–234. doi: 10.1109/ICISS49785.2020.9315930 [8] J. J. Hu, \"Hardware-assisted malware detection using performance counters,\" IEEE Security & Privacy, vol. 18, no. 5, pp. 20–29, 2020. doi:10.1109/MSEC.2020.2999623 [9] J. Zhang, J. Wang, M. Zhang, and X. Wang, \"Malwarebehaviordetectionusingdeeplearning,\" SecurityandCommunicationNetworks,vol.2020,ArticleID8895742,2020.doi:10.1155/2020/8895742[10] [10] M.A.Ferrag,M.Derdour,M.Mukherjee,A.Derhab,andL. Maglaras, \"Blockchain technologies for the internet of things: Research issues and challenges,\" IEEE Internet of Things Journal, vol. 6, no. 2, pp.2188–2204, 2019.doi: 10.1109/JIOT.2018.2882794 [11] A.Souri and R. Hosseini, \"A state-of-the-art survey ofmalware detection approaches using data mining techniques,\" Human-centric Computing andInformationSciences,vol.8,no.1,pp.1–22,2018.doi: 10.1186/s13673-018-0133-2 [12] K.Wüchner,F.Cheng,andC.Meinel,\"Behaviorbasedmalwaredetectionusingmachinelearning,\"inProc. 13th International Conference on Availability, Reliability and Security (ARES), ACM, 2018, pp. 1–10. doi:10.1145/3230833.3232817 [13] S.MohurleandM.Patil,\"Abriefstudyofwannacrythreat:Ransomware attack 2017,\" International Journal of Advanced Research in Computer Science, vol. 8, no. 5, 2017. doi: 10.26483/ijarcs.v8i5.4258 [14] C. Tankard, \"Advanced persistent threats and how to monitor and deter them,\" Network Security, vol.2011,no.8,pp.16–19,2011.doi:10.1016/S1353-4858(11)70086-1 [15] P. Vinayakumar, K. P. Soman, and S. Poornachandran, \"Evaluating deep learning approaches to characterize and classify malware,\" Machine Learning with Applications, vol. 2, p. 100007, 2020. doi: 10.1016/j.mlwa.2020.100007 [16] R. Alzubaidi and J. Kalita, \"Deep learning models for classification: A comparative study,\" Information, vol. 12, no. 2, p. 99, 2021. doi: 10.3390/info12020099 [17] M.A. Alzain, E. Pardede, and B. Soh, \"A new classification model for detecting DDoS attacks using hybrid machine learning technique,\" in Proc. 9th International Conference on Security of Information and Networks (SIN), 2016, pp. 48–53. doi: 10.1145/2947626.2951965 [18] J.He,Z.Liu,J.Ye,andB.Xu,\"Ransomwaredetection based on hardware performance counters,\" in Proc. 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2018, pp. 1–6. doi: 10.1109/DSN.2018.00040 [19] P. A. Porras, H. Saidi, and V. Yegneswaran, \"ConfickerCanalysis,\"SRIInternationalTechnicalReport,2009.doi:10.21236/ADA536226 [20] X.Liu,T. Li,Y. Li, and X. Liu, \"DeepCodeLock: An adversarial deep learning approach for ransomware detection,\" IEEE Transactions on Dependable and Secure Computing, vol.18,no.6,pp.2432–2446,2021.doi:10.1109/TDSC.2021.3050524 [21] R.Hou,Y.Chen,andH Jin, \"MalScan: Fast market-wide malware detection for Android,\" in Proc.23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2017, pp.1325–1334.doi:10.1145/3097983.3098023 [22] S.Gupta and B. V. R. Reddy, \"An approach to malware detection using artificial neural network,\" International Journal of Computer Applications, vol.99,no.15,pp.1–4,2014.doi:10.5120/17495-8265 [23] Y.Ye, D. Wang, T. Li, D. Ye, and Q. Jiang, \"An intelligentPE-malware detectionsystembased onassociationmining,\" Journal in Computer Virology, vol.4,no.4,pp.323–334,2008.doi:10.1007/s11416-008-0092-0 [24] R. Vinayakumar, K. P. Soman, P. Poornachandran, and S. Sachin Kumar, \"Ransomware detection and classification using machine learning algorithms,\" in Proc. 2017 IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2436–2441. doi:10.1109/ICACCI.2017.8126147 [25] L. Y. Liu, Z. Z. Yu, and Y. R. Huang, \"Static analysis and behavior mining for Android malware detection,\" Computers & Security, vol. 60, pp. 72–92, 2016.doi:10.1016/j.cose.2016.03.005 [26] D.Ucci,L.Aniello, and R. Baldoni, \"Survey of machine learning techniques for malware analysis,\"Computers&Security,vol.81,pp.123–147,2019.doi: 10.1016/j.cose.2018.11.001 [27] D.Firdausi,A.Erwin,andA.Nugroho,\"Analysisofmachinelearningtechniquesusedinbehavior-based malwaredetection,\"inProc.2010SecondInternational ConferenceonAdvancesinComputing,Control,and Telecommunication Technologies, pp. 201–203. doi: 10.1109/ACT.2010.38 [28] E.Egele,T.Scholte,E.Kirda,andC.Kruegel,\"Asurvey on automated dynamic malware-analysis techniques and tools,\" ACM Computing Surveys, vol. 44, no. 2, pp. 1– 42, 2012. doi:10.1145/2089125.2089126 [29] S. K. Sahay and A. K. Sinha, \"Survey on malware analysistechniques,\"InternationalJournalofComputer Applications, vol. 179, no. 23, pp. 32–36, 2018. doi: 10.5120/ijca2018916371 [30] A.Nataraj,P.K.Karthikeyan,G.Jacob,andB.S.Manjunath, \"Malware images: visualization and automatic classification,\" in Proc. 8th International Symposium on Visualization for Cyber Security, 2011. doi: 10.1145/2016904.2016908 [31] G. Wagener, R. State, and A. Dulaunoy, \"Malware behavior analysis,\" in Proc. 3rd International Conferenceon Malicious and Unwanted Software (MALWARE), 2008. doi:10.1109/MALWARE.2008.4690844 [32] S. Das, S. Dasgupta, and M. Naskar, \"A newhybrid approach for malware detection using machine learning techniques,\" in Proc. 2017 International Conference on Computing, Communication, andAutomation (ICCCA), pp. 564–569. doi: 10.1109/CCAA.2017.8229856 [33] A.AthiwaratkunandJ.W. Stokes, \"Malware classification with LSTM and GRU language modelsandacharacter-levelCNN,\" inProc.2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2482–2486. doi:10.1109/ICASSP.2017.7952561 [34] M. Nguyen, S. Ahn, and H. Kim, \"PlausMal-GAN: Adversarial generation of evasive malware variants,\" IEEE Access, vol. 8, pp. 140427–140438, 2020. doi: 10.1109/ACCESS.2020.3012715 [35] N.IdikaandA.P.Mathur,\"Asurveyofmalwaredetectiontechniques,\"PurdueUniversity,2007.doi:10.21236/ADA485929 [36] Y. Tao, L. Wang, and Q. Gong, \"Malwaredetection based on deep learning algorithm,\" in Proc. 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), pp. 1244– 1247. doi: 10.1109/ITNEC48623.2020.9084884 [37] S. J. Stolfo, M. B. Salem, and A. D. Keromytis, \"Fog computing: Mitigating insider data theft attacks in the cloud,\" in Proc. 2012 IEEE Symposium on Security and Privacy Workshops, pp. 125–128. doi: 10.1109/SPW.2012.28 [38] S. Hardy, M. Maier, and I. Goldberg, \"Collaborative privacy-preserving malware detection,\" in Proc. 8th ACM Workshop on Artificial Intelligence and Security, 2015, pp. 27–38. doi:10.1145/2808769.2808771 [39] J. Z. Kolter and M. A. Maloof, \"Learning to detect and classify malicious executables in the wild,\" Journal of Machine Learning Research, vol. 7, pp. 2721–2744, 2006. doi: 10.5555/1248547.1248632 [40] A. Mohaisen, O. Alrawi, and M. Mohaisen, \"AMAL: High-fidelity, behavior-based automated malware analysis and classification,\" Computers &Security, vol. 52,pp.251–266,2015.doi:10.1016/j.cose.2015.04.004 [41] A. Lanzi, D. Balzarotti, C. Kruegel, and E. Kirda, \"AccessMiner: Using system-centric models for malware detection,\" in Proc. 17th ACM Conference on Computerand Communications Security, 2010, pp.399–412.doi:10.1145/1866307.1866350 [42] M. F. Zolkipli and A. Jantan, \"Malware Behavior Analysis: Learning and Understanding Current Malware Threats,\" School of Computer Science, Universiti Sains Malaysia, Penang, Malaysia. [43] M. Arefkhani and M. Soryani, \"Malware Clustering UsingImageProcessingHashes,\" IranUniversityofScience and Technology, School of Computer Engineering, Tehran, Iran. [44] A. Katkar, S. Shukla, P. Dange, and D. Shaikh, \"Malware Intrusion Detection for System Security,\" Vidyavardhini’s College of Engineering & Technology, Mumbai, India. [45] B. Jin, J. Choi, J. B. Hong, and H. Kim, \"On the Effectiveness of Perturbations in Generating Evasive Malware Variants,\" IEEE Transactions on Information Forensics and Security. [46] D.-O. Won, Y.-N. Jang, and S.-W. Lee, \"PlausMal- GAN: Plausible Malware Training Based on Generative Adversarial Networks for Analogous Zero-Day Malware Detection,\" IEEE Access.
Copyright © 2025 Vishwanath Chiniwar, Prerana Joshi, Mr. Pavan Mitragotri. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET73342
Publish Date : 2025-07-24
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here