Static and Dynamic Malware Analysis Using Machine Learning

Authors

  • K. Anusha Assistant professor, Dept. of CSE, Annamacharya Institute of Technology & Science, Boyanapalli, Andhrapradhesh, India Author
  • A. Charesshmaa UG Scholar, Dept. of CSE Annamacharya Institute of Technology & Science, India. Author
  • Y. Jayalakshmi UG Scholar, Dept. of CSE Annamacharya Institute of Technology & Science, India. Author
  • A. Gangadhar UG Scholar, Dept. of CSE Annamacharya Institute of Technology & Science, India. Author
  • K. Hrushikeswarreddy UG Scholar, Dept. of CSE Annamacharya Institute of Technology & Science, India. Author

DOI:

https://doi.org/10.47392/IRJAEM.2025.0205

Keywords:

Cybersecurity, Data Preprocessing, Feature Scaling, Machine Learning, Malware Analysis, Malware Detection, Random Forest and Dynamic Analysis

Abstract

The necessity for efficient, automated detection systems that can accurately identify malicious software has been brought to light by the growing sophistication of malware assaults. Despite their value, conventional static as well as dynamic evaluation tools sometimes lack the flexibility to adjust to changing infection strategies. In order to improve detection capabilities, this study employs a machine learning-based strategy that combines static and dynamic analysis of malware. To guarantee data quantity and importance for analysis, the system uses a large malware dataset and then applies data preparation techniques including feature scaling and normalization. The Extra-Trees-Classifier streamlines the classification process by identifying the most informative features through feature selection optimization. A Random Forest model, the main classifier, is used to evaluate the generated data and categorize files as either malware-free or infected. With a high precision of 99.42%, this model effectively and with little mistake distinguishes between harmful and benign files. This system offers a dependable, high-performance solution for proactive malware identification, which is crucial for contemporary cybersecurity applications, by fusing strong feature engineering with sophisticated classification approaches.

Downloads

Download data is not yet available.

Downloads

Published

2025-04-18