ENHANCING CYBERSECURITY THROUGH MALWARE DETECTION BASED ON MACHINE LEARNING TECHNIQUE

Authors

  • omar Alsaif Technical Engineering College For Computer and AI/ Northern Technical University, Mosul-Iraq https://orcid.org/0000-0003-2832-7868
  • Amer Mohamed Shhatha Engineering Technical College/ Mosul, Northern Technical University, Mosul-Iraq

DOI:

https://doi.org/10.30572/2018/KJE/160306

Keywords:

Cybersecurity, Malware Detection, Machine Learning, Ensemble Methods, Classification, Cyber Threats

Abstract

The world is now more connected through technology and this has given rise to cyber threats, and malware is one of the threats that a system and data need to guard against. In this paper, we propose a detailed framework wherein state of the art ML methodologies can be employed for malware categorization and identification. In the evaluation of the performances of various ML algorithms, we analyze Random Forest, CatBoost, XGBoost, K-Nearest Neighbors (KNN), Histogram-based Gradient Boosting (Hist GB), and AdaBoost. The algorithms are assessed in this study using an assembly command dataset and a static and dynamic analysis approach to improve the detection rate and stability. Out of all algorithms discussed, Random Forest, CatBoost, XGBoost, Hist GB are ranked highest with 99% accuracy. As for the accuracy, KNN yielded an accuracy of 97%. Performance analysis based on metrics shows that Random Forest, CatBoost, and Hist GB not only have high accuracy but also precision, recall, and F1-score. Particularly, the accuracy of Random Forest was 99% for both the precision, recall, and F1-score. These results confirm the use of ML-based solutions in the analysis and counteraction of modern malware threats and their advantages over traditional detection methods as well as strengthening cybersecurity

Downloads

Download data is not yet available.

References

Ahmed, A.I., Khidhir, A.M., Baker, S.A., Alsaif, O.I., Saleh, I.A. 2024 “Enhancing Cybersecurity by relying on a Botnet Attack Tracking Model using Harris Hawks Optimization”, International Journal of Computers and their Applications, , 31(2), pp. 103–110

Akhtar, M. and Feng, T., 2022. IOTA based anomaly detection machine learning in mobile sensing. EAI Endorsed Transactions on Creative Technologies, 9(30), p.172814. doi: 10.4108/eai.11-1-2022.172814.

Akhtar, M.S. and Feng, T., 2022. Detection of sleep paralysis by using IoT based device and its relationship between sleep paralysis and sleep quality. EAI Endorsed Transactions on Internet of Things, 8(30), p.e4. doi: 10.4108/eetiot.v8i30.2688.

Akhtar, M.S. and Feng, T., 2022. Malware analysis and detection using machine learning algorithms. Symmetry, 14(11). doi: 10.3390/sym14112304.

Downloads

Published

2025-07-31

How to Cite

Alsaif, omar, and Amer Mohamed Shhatha. “ENHANCING CYBERSECURITY THROUGH MALWARE DETECTION BASED ON MACHINE LEARNING TECHNIQUE”. Kufa Journal of Engineering, vol. 16, no. 3, July 2025, pp. 82-100, https://doi.org/10.30572/2018/KJE/160306.

Share