Evaluating and Comparing the Efficiency of Malware Identification for Cyber Security Using Machine Learning Algorithms

Authors

  • Purna Chandra Rao Chinta Microsoft, Support Escalation Engineer, USA Author
  • Chethan Sriharsha Moore Microsoft, Support Escalation Engineer, USA Author
  • Manikanth Sakuru JP Morgan Chase, Lead Software Engineer, USA Author
  • KishanKumar Routhu ADP Senior Solution Architect, USA Author
  • Varun Bodepudi Deloitte Consulting LLP, Senior Solution Specialist, USA Author
  • Gagan Kumar Patra Deloitte Consulting LLP, Senior Solution Specialist, USA Author

DOI:

https://doi.org/10.47363/JAICC/2024(3)450

Keywords:

Cybersecurity, Cyber Threats, Malware, Malware Detection, Classification

Abstract

Malware detection is a critical task in information security, and it should be able to detect the occurrence of potential malicious code in memory. Detection methods typical of the past could sometimes not detect the new malware variants because it is highly inaccurate. In this study, it presents a robust malware detection model employing Long Short-Term Memory (LSTM) networks to deal with class imbalance and feature redundancy. Within a well-structured preprocessing pipeline, it uses feature selection through correlation analysis and class balancing with SMOTE. Experimental results demonstrate that the model performs quite accurately, has an F1 score of 97.97%, accuracy of 99.17%, precision of 98.80%, and recall of 99.17%, proving its reliability and robustness when classifying both benign and Malware instances. Comparative analysis with traditional models, such as Decision Tree and the suggested LSTM model, beats these techniques with the maximum accuracy of 99.09%, according to K-Nearest Neighbors (KNN). The results indicate that the model outperforms malware detection, has good generalization ability and low overfitting, and therefore is a very good solution for real-world cybersecurity applications.

Author Biographies

  • Purna Chandra Rao Chinta, Microsoft, Support Escalation Engineer, USA

    Purna Chandra Rao Chinta, Microsoft, Support Escalation Engineer, USA.

  • Chethan Sriharsha Moore, Microsoft, Support Escalation Engineer, USA

    Microsoft, Support Escalation Engineer, USA

  • Manikanth Sakuru, JP Morgan Chase, Lead Software Engineer, USA

    JP Morgan Chase, Lead Software Engineer, USA

  • KishanKumar Routhu ADP, Senior Solution Architect, USA


    Senior Solution Architect, USA

  • Varun Bodepudi, Deloitte Consulting LLP, Senior Solution Specialist, USA

    Deloitte Consulting LLP, Senior Solution Specialist, USA

  • Gagan Kumar Patra, Deloitte Consulting LLP, Senior Solution Specialist, USA


    Deloitte Consulting LLP, Senior Solution Specialist, USA

Downloads

Published

2024-12-28

How to Cite

Evaluating and Comparing the Efficiency of Malware Identification for Cyber Security Using Machine Learning Algorithms. (2024). Journal of Artificial Intelligence & Cloud Computing, 3(6), 1-7. https://doi.org/10.47363/JAICC/2024(3)450

Most read articles by the same author(s)

Similar Articles

41-50 of 139

You may also start an advanced similarity search for this article.