DefinePK

DefinePK hosts the largest index of Pakistani journals, research articles, news headlines, and videos. It also offers chapter-level book search.

AN INVESTIGATION INTO THE APPLICATION OF DEEP CONVOLUTIONAL NEURAL NETWORKS FOR MALWARE DETECTION


Article Information

Title: AN INVESTIGATION INTO THE APPLICATION OF DEEP CONVOLUTIONAL NEURAL NETWORKS FOR MALWARE DETECTION

Authors: Mamoona Rafique Khan , Rana Muhammad Nadeem, Sadia Latif, Rabia Tariq

Journal: Kashf Journal of Multidisciplinary Research (KJMR)

HEC Recognition History
Category From To
Y 2024-10-01 2025-12-31

Publisher: Kashf Institute of Development & Studies

Country: Pakistan

Year: 2025

Volume: 2

Issue: 4

Language: en

DOI: 10.71146/kjmr409

Keywords: Cyber SecurityDeep Neural Networksmalware detectionMalware DetectionDeep neural networksCNNCyber Security

Categories

Abstract

Cyber security is facing a huge threat from malwares motivator and their mass production due to its mutation factors, which results in enormous production of these binaries in short time. Moreover, the domain of malicious intents is also progressing with the increase of compute intensive resources. To detect and highlight these malicious binaries, classification plays a vital rule in listing these malwares as malware by nominating interesting features and trends among them. In this situation, we investigated the application of transfer learning using the EfficientNetV2 architecture for automated malware family classification on the Malimg dataset. Our experiments use a stratified 70/15/15 split for training, validation, and testing. The final model achieves 98.4 % test accuracy, with a macro‑averaged F1‑score of 0.983, precision of 0.985, and recall of 0.982. Using the concept of visualization of malware byte-code, proved more convenient to classify them by object recognition techniques in deep convolutional neural networks. The approach can be readily extended to other cybersecurity datasets and deployed in real‑time detection scenarios, suggesting a promising direction for future research in automated threat analysis


Paper summary is not available for this article yet.

Loading PDF...

Loading Statistics...