Machine Learning for Analysing Malware and Ransomware

Authors

  • A Mani, S Bavanitha, C S Anitha, K Aishwarya and H Vidhya Varsha Muthayammal Engineering College, Rasipuram, Namakkal, India Author

DOI:

https://doi.org/10.15662/IJEETR.2026.0802174

Keywords:

Machine Learning, Malware Detection, Ransomware Analysis, Supervised Learning, Adaptive Learning, Dynamic Analysis, Feature Extraction, Static Analysis, Zero-Day Attacks

Abstract

Malware and ransomware are rapidly evolving, making detection difficult for traditional signature-based security systems that rely on known attack patterns. These systems often fail to identify new or zero-day threats. This research proposes an intelligent machine learning–based detection system that uses supervised models and deep learning techniques to identify malware in real time with high accuracy and low false positives. The system combines static and dynamic feature extraction to analyse file structure and runtime behaviour. It  also includes ransomware-specific behavioural analysis. A hybrid adaptive learning technique with feature fusion and incremental model updating helps the system adapt to changing malware patterns, improving detection performance and system security

References

1. Practical Malware Analysis–Michael Sikorski and Andrew Honig

2. Machine Learning and Security: Protecting Systems with Data and Algorithms – Clarence Chio and David Freeman.

3. Malware Data Science: Attack Detection and Attribution – Joshua Saxe and Hillary Sanders.

4. Deep Learning – Ian Goodfellow, Yoshua Bengio, and Aaron Courville.

5. The Art of Malware Analysis – Mark Stamp.

6. Learning Malware Analysis – Monnappa K A.

7. Introduction to Machine Learning – Ethem Alpaydin.

8. Pattern Recognition and Machine Learning – Christopher M. Bishop.

9. Security Engineering: A Guide to Building Dependable Distributed Systems – Ross J. Anderson.

10. Artificial Intelligence: A Modern Approach – Stuart Russell and Peter Norvig.

11. M. Sikorski ad A. Honig, Practical Malware Analysis, No Starch Press, 2012.

12. E. S koud is and L. Zeltser, Malware: Fighting Malicious Code, Prentice Hall, 2003.

13. I. Goodfellow, Y. Bengio, and A. Courville, Deep Learning, MIT Press, 2016.

14. K. Scarfone and P. Mell, Guide to Intrusion Detection and Prevention Systems, NIST, 2007.

15. A. Géron, Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow, O’Reilly, 2019.

16. T. Mitchell, Machine Learning, McGraw-Hill, 1997.

17. S. Raschka and V. Mirjalili, Python Machine Learning, Packt Publishing, 2019.

18. J. Andress and S. Winterfeld, Cyber Warfare: Techniques, Tactics and Tools, Syngress, 2011.

19. W. Stallings, Network Security Essentials, Pearson, 2017.

20. C. Bishop, Pattern Recognition and Machine Learning, Springer, 2006.

21. L. Alzubaidi, J. Zhang, A. J. Humaidi, A. Al-Dujaili, Y. Duan, O. AlShamma, J. Santamar´ıa, M. A. Fadhel, M. Al-Amidie, and L. Farhan, “Review of deep learning: Concepts, cnn architectures, challenges, applications, future directions,” Journal of big Data, vol. 8, pp. 1–74, 2021.

22. P. Maniriho, A. N. Mahmood, and M. J. M. Chowdhury, “A survey of recent advances in deep learning models for detecting malware in desktop and mobile platforms,” arXiv preprint arXiv:2209.03622, 2022.

23. Q. Wang, W. Guo, K. Zhang, A. G. Ororbia, X. Xing, X. Liu, and C. L. Giles, “Adversary resistant deep neural networks with an application to malware detection,” in Proceedings of the 23rd ACM sigkdd international conference on knowledge discovery and data mining, 2017, pp. 1145–1153.

24. Tahir, R. A Study on Malware and Malware Detection Techniques. IJEME 2018, 8, 20–30.

25. Wu, Y.; Chang, Y. Ransomware Detection on Linux Using Machine Learning with Random Forest Algorithm. TechRxiv 2024.

26. Ferdous, J.; Islam, R.; Mahboubi, A.; Islam, M.Z. AI-Based Ransomware Detection: A Comprehensive Review. IEEE Access 2024, 12, 136666–136695.

27. Alhogail, A.; Alharbi, R.A. Effective ML-Based Android Malware Detection and Categorization. Electronics 2025, 14, 1486.

28. Hadiprakoso, R.B.; Aditya, W.R.; Pramitha, F.N. Static Analysis of Android Malware Detection Using Supervised Machine Learning Algorithm. Cyber Secur. Forensik Digit. 2022, 5, 1–5. (In Indonesian)

29. Syeda, D.Z.; Asghar, M.N. Dynamic Malware Classification and API Categorisation of Windows Portable Executable Files Using Machine Learning. Appl. Sci. 2024, 14, 1015.

30. M. Brown et al., “Limitations of signature-based malware detection systems,” IEEE Security & Privacy, vol. 21, no. 2, pp. 34–42, 2023.

31. S. Ahmed and R. Khan, “Ransomware detection using supervised machine learning techniques: A review,” Computers & Security, vol. 120, 2024.

32. Y. Song et al., “Deep learning for malware detection: A survey,” Journal of Big Data, vol. 12, no. 1, 2025.

33. R. Verma and S. Das, “Hybrid malware detection using machine learning,” IEEE Access, vol. 10, pp. 99876–99888, 2022.

34. A. Alraizza and A. Algarni, “Behavior-based ransomware detection using machine learning,” Sensors, vol. 23, no. 4, 2023.

35. S. Gupta and N. Sharma, “Challenges and future directions in ML-based malware detection,” IEEE Access, vol. 11, pp. 123456–123470, 2024.

36. Mathew, A., Jackson, E., & Tobesman, A. (2025). Evaluating the Efficacy of WPA3 against Advanced Attacks: A Comparative Analysis with WPA2 in Real-World. J Inform Techn Int, 3(1), 105.

37. Nandhini, T., Surendar, R., Meenakshidevi, P., Sureshkrishna, M., Dharshanadevi, R., & Rajasekar, M. (2024, April). Multi-Source and Multi-Powered Smart Grid Prediction Using Deep Learning. In 2024 International Conference on Science Technology Engineering and Management (ICSTEM) (pp. 1-5). IEEE.

38. Sugumar, R. (2025). Federated AI in Offline-First Mobile Health Architectures for Privacy-Preserving Clinical Intelligence. International Journal of Science, Research and Technology, 8(4), 14589-14600.

Downloads

Published

2026-03-28

How to Cite

Machine Learning for Analysing Malware and Ransomware. (2026). International Journal of Engineering & Extended Technologies Research (IJEETR), 8(2), 2035-2046. https://doi.org/10.15662/IJEETR.2026.0802174