Publication Type : Conference Paper
Publisher : IEEE
Source : 2025 International Conference on Intelligent Systems and Computational Networks (ICISCN)
Url : https://doi.org/10.1109/iciscn64258.2025.10934187
Campus : Bengaluru
School : School of Computing
Department : Computer Science and Engineering
Year : 2025
Abstract : The rapid evolution of malware necessitates advanced detection methodologies to address the limitations of traditional signature-based approaches, which often fail against zero-day malware and polymorphic attacks. This study introduces a dynamic packet analysis framework, leveraging fine-grained network features such as packet length and time-to-live (TTL) for real-time detection. A hybrid architecture, combining Gradient Boosting and Random Forest models, improves detection capabilities to 95.7% with robustness against adversarial attacks. The model’s effectiveness in analyzing control flow traces outperforms traditional methods by 26.3% in detecting obfuscated malware and maintains an 83% success rate against adversarial threats. This approach not only sets a new benchmark in adapting to evolving cybersecurity challenges but also provides scalable and resilient malware detection
Cite this Research Publication : B.U Naveen Raj, Utpal Raj K.B, V. Srujan, Shinu Rajagopal, Network-Centric Malware Detection Using Dynamic Packet Analysis and Hybrid Architectures, 2025 International Conference on Intelligent Systems and Computational Networks (ICISCN), IEEE, 2025, https://doi.org/10.1109/iciscn64258.2025.10934187