Submitted:
07 May 2025
Posted:
08 May 2025
You are already at the latest version
Abstract
Keywords:
I. Introduction
- It presents a full overview of the ML sorts.
- Comprehensive inspection and debate of ML techniques in anomaly detection techniques are introduced.
- Several network conditions utilizing ML for malware detection are examined.
- The features and advantages of each ML model in malware detection are outlined.
II. Literature Review
III. Proposed Methodology
A. Malware Dataset
B. Pre-Processing Layer
C. Prediction Layer
D. Performance Evaluation Layer
E. Experiemntal Analyzis
IV. Result and Discussion
V. Conclusion and Future Work
References
- Abdelrahman and P. Keikhosrokiani, “Assembly Line Anomaly Detection and Root Cause Analysis Using Machine Learning,” IEEE Access, vol. 8, pp. 189661–189672, 2020. [CrossRef]
- Malhotra, S. (2025). HistogramTools for Efficient Data Analysis and Distribution Representation in Large Data Sets. arXiv preprint arXiv:2504.00001. arXiv:2504.00001.
- F. A. Almarshad, M. F. A. Almarshad, M. Zakariah, G. A. Gashgari, E. A. Aldakheel, and A. I. A. Alzahrani, “Detection of Android Malware Using Machine Learning and Siamese Shot Learning Technique for Security,” IEEE Access, vol. 11, pp. 127697–127714, 2023. [CrossRef]
- Aslan and A., A. Yilmaz, “A New Malware Classification Framework Based on Deep Learning Algorithms,” IEEE Access, vol. 9, pp. 87936–87951, 2021. [CrossRef]
- S. Bulusu, B. S. Bulusu, B. Kailkhura, B. Li, P. K. Varshney, and D. Song, “Anomalous example detection in Deep Learning: A survey,” IEEE Access, vol. 8, pp. 132330–132347, 2020. [CrossRef]
- K. Choi, J. K. Choi, J. Yi, C. Park, and S. Yoon, “Deep Learning for Anomaly Detection in Time-Series Data: Review, Analysis, and Guidelines,” IEEE Access, vol. 9, pp. 120043–120065, 2021. [CrossRef]
- Z. Cui et al., “Detection of Malicious Code Variants Based on Deep Learning,” IEEE Transactions on Industrial Informatics, vol. 14, no. 7, pp. 3187–3196, 2018. [CrossRef]
- J. Du, H. J. Du, H. Chen, W. Zhon, Z. Liu, and A. Xu, “A Dynamic and Static Combined Android Malicious Code Detection Model based on SVM,” in Proceedings of the 2018 IEEE International Conference on Systems, Man, and Cybernetics (ICSai), 2018, pp. 801–675. [CrossRef]
- A. Hussain, M. A. Hussain, M. Asif, M. B. Ahmad, T. Mahmood, and M. A. Raza, “Malware Detection Using Machine Learning Algorithms for Windows Platform,” in Lecture Notes in Networks and Systems, 2022, pp. 619–632. [CrossRef]
- X. Ma et al., “How to Make Attention Mechanisms More Practical in Malware Classification,” IEEE Access, vol. 7, pp. 155270–155280, 2019. [CrossRef]
- T. C. Miranda et al., “Debiasing Android Malware Datasets: How Can I Trust Your Results If Your Dataset Is Biased?” IEEE Transactions on Information Forensics and Security, vol. 17, pp. 2182–2197, 2022. [CrossRef]
- M. Munir, S. A. M. Munir, S. A. Siddiqui, A. Dengel, and S. Ahmed, “DeepAnT: A Deep Learning Approach for Unsupervised Anomaly Detection in Time Series,” IEEE Access, vol. 7, pp. 1991–2005, 2018. [CrossRef]
- A. Pastor et al., “Detection of Encrypted Cryptomining Malware Connections With Machine and Deep Learning,” IEEE Access, vol. 8, pp. 158036–158055, 2020. [CrossRef]
- Sharma and S., K. Sahay, “An effective approach for classification of advanced malware with high accuracy,” arXiv, 2016. [CrossRef]
- Urooj, M. A. Shah, C. Maple, M. K. Abbasi, and S. Riasat, “Malware Detection: A Framework for Reverse Engineered Android Applications Through Machine Learning Algorithms,” IEEE Access, vol. 10, pp. 89031–89050, 2022. [CrossRef]
- Velasquez, *!!! REPLACE !!!*; et al. , “A Hybrid Machine-Learning Ensemble for Anomaly Detection in Real-Time Industry 4.0 Systems,” IEEE Access, vol. 10, pp. 72024–72036, 2022. [CrossRef]
- S. Wang et al., “Machine Learning in Network Anomaly Detection: A Survey,” IEEE Access, vol. 9, pp. 152379–152396, 2021. [CrossRef]
- X. Xu et al., “DeepMAD: Deep Learning for Magnetic Anomaly Detection and Denoising,” IEEE Access, vol. 8, pp. 121257–121266, 2020. [CrossRef]
- Y. Xu et al., “Hyperspectral Anomaly Detection Based on Machine Learning: An Overview,” IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, vol. 15, pp. 3351–3364, 2022. [CrossRef]
- M. F. Zolkipli and A. Jantan, “A Framework for Malware Detection Using Combination Technique and Signature Generation,” in Proceedings of the 2010 2nd International Conference on Computer Research and Development (ICCRD), 2010, pp. 196–199. [CrossRef]
- M. Akhtar and T. Feng, “IOTA Based Anomaly Detection Machine Learning in Mobile Sensing,” EAI Endorsed Transactions on Creative Technologies, vol. 9, no. 30, p. 172814, 2022. [CrossRef]











| GB and J48 Hybrid Model | ||||
|---|---|---|---|---|
| Precision | Recall | F1-score | Support | |
| Legitimate | 0.99 | 1.00 | 0.99 | 19250 |
| Fraudulent | 0.99 | 0.98 | 0.99 | 8360 |
| Accuracy | - | - | 0.99 | 27610 |
| Macro avg | 0.99 | 0.99 | 0.99 | 27610 |
| Weighted avg | 0.99 | 0.99 | 0.99 | 27610 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).