Skip to main content
Log in

An Optimized Intelligent Malware Detection Framework for Securing Digital Data

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Digital data security has grown rapidly based on the advances of smart applications. Hence, the data is secured in several ways, like malicious prediction, avoidance, etc. However, classifying and preventing malicious actions is difficult because some malicious actions behave like normal users. When the data is entered, it captures it and does malicious activities. So, the current article was planned to build a novel chimp (You-Only-Look-Once) YOLO Malicious Avoidance Framework (CbYMAF) as the attack recognition and prevention mechanism. Here, the data was initialized in the primary stage, and then the noise constraints were neglected through the pre-processing function. Henceforth, the features are extracted, and the malicious actions are recognized. Finally, the malicious types were categorized, and the prevention module's features were updated to prevent malicious events. Besides, the unknown attack was launched to value the designed approach's confidentiality ratio. Finally, the Python framework validates the novel CbYMAF, and the comparative analysis is conducted with past works.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Algorithm 1
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Data Availability

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. Bhardwaj, S., & Dave, M. (2022). Crypto-preserving investigation framework for deep learning based malware attack detection for network forensics. Wireless Personal Communications, 122, 2701–2722. https://doi.org/10.1007/s11277-021-09026-6

    Article  Google Scholar 

  2. Mahesh, P. C. S., & Hemalatha, S. (2022). An efficient android malware detection using adaptive red fox optimization based CNN. Wireless Personal Communications, 126, 679–700. https://doi.org/10.1007/s11277-022-09765-0

    Article  Google Scholar 

  3. Ojha, R. P., Srivastava, P. K., Sanyal, G., & Gupta, N. (2021). Improved model for the stability analysis of wireless sensor network against malware attacks. Wireless Personal Communications, 116, 2525–2548. https://doi.org/10.1007/s11277-020-07809-x

    Article  Google Scholar 

  4. Balta, E. C., Pease, M., Moyne, J., Barton, K., & Tilbury, D. M. (2023). Digital twin-based cyber-attack detection framework for cyber-physical manufacturing systems. IEEE Transactions on Automation Science and Engineering. https://doi.org/10.1109/TASE.2023.3243147

    Article  Google Scholar 

  5. Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), 1333. https://doi.org/10.3390/electronics12061333

    Article  Google Scholar 

  6. Gebrye, H., Wang, Y., & Li, F. (2023). Traffic data extraction and labeling for machine learning based attack detection in IoT networks. International Journal of Machine Learning and Cybernetics, 14(7), 2317–2332. https://doi.org/10.1007/s13042-022-01765-7

    Article  Google Scholar 

  7. Lyu, M., Gharakheili, H. H., Russell, C., & Sivaraman, V. (2021). Hierarchical anomaly-based detection of distributed DNS attacks on enterprise networks. IEEE Transactions on Network and Service Management, 18(1), 1031–1048. https://doi.org/10.1109/TNSM.2021.3050091

    Article  Google Scholar 

  8. Butt, U. A., Amin, R., Aldabbas, H., Mohan, S., Alouffi, B., & Ahmadian, A. (2023). Cloud-based email phishing attack using machine and deep learning algorithm. Complex & Intelligent Systems, 9(3), 3043–3070. https://doi.org/10.1007/s40747-022-00760-3

    Article  Google Scholar 

  9. Yi, T., Chen, X., Zhu, Y., Ge, W., & Han, Z. (2023). Review on the application of deep learning in network attack detection. Journal of Network and Computer Applications, 212, 103580. https://doi.org/10.1016/j.jnca.2022.103580

    Article  Google Scholar 

  10. Zhang, H., Li, J. L., Liu, X. M., & Dong, C. (2021). Multi-dimensional feature fusion and stacking ensemble mechanism for network intrusion detection. Future Generation Computer Systems, 122, 130–143. https://doi.org/10.1016/j.future.2021.03.024

    Article  Google Scholar 

  11. Habib, A. K. M. A., Hasan, M. K., Alkhayyat, A., Islam, S., Sharma, R., & Alkwai, L. M. (2023). False data injection attack in smart grid cyber physical system: Issues, challenges, and future direction. Computers and Electrical Engineering, 107, 108638. https://doi.org/10.1016/j.compeleceng.2023.108638

    Article  Google Scholar 

  12. Crespo-Martínez, I. S., Campazas-Vega, A., Guerrero-Higueras, A. M., Riego-DelCastillo, V., Álvarez-Aparicio, C., & Fernández-Llamas, C. (2023). SQL injection attack detection in network flow data. Computers & Security, 127, 103093. https://doi.org/10.1016/j.cose.2023.103093

    Article  Google Scholar 

  13. Tama, B. A., & Lim, S. (2021). Ensemble learning for intrusion detection systems: A systematic mapping study and cross-benchmark evaluation. Computer Science Review, 39, 100357. https://doi.org/10.1016/j.cosrev.2020.100357

    Article  MathSciNet  Google Scholar 

  14. Dhooge, L., Wauters, T., Volckaert, B., & Turck, F. D. (2020). Inter-dataset generalization strength of supervised machine learning methods for intrusion detection. Journal of Information Security and Applications, 54, 102564. https://doi.org/10.1016/j.jisa.2020.102564

    Article  Google Scholar 

  15. Abd El-Latif, A. A., Abd-El-Atty, B., Mehmood, I., Muhammad, K., Venegas-Andraca, S. E., & Peng, J. (2021). Quantum-inspired blockchain-based cybersecurity: Securing smart edge utilities in IoT-based smart cities. Information Processing & Management, 58(4), 102549. https://doi.org/10.1016/j.ipm.2021.102549

    Article  Google Scholar 

  16. Abdulbaqi, A. S., Turki, N. A., Obaid, A. J., Dutta, S., & Panessai, I. Y. (2023). Spoof Attacks Detection Based on Authentication of Multimodal Biometrics Face-ECG Signals. In Artificial intelligence for smart healthcare (pp. 507–526). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-031-23602-0_30.

  17. Singh, A. K., Blanco-Justicia, A., & Domingo-Ferrer, J. (2023). Fair detection of poisoning attacks in federated learning on non-iid data. Data Mining and Knowledge Discovery. https://doi.org/10.1007/s10618-022-00912-6

    Article  Google Scholar 

  18. Bhardwaj, S., & Dave, M. (2022). Crypto-preserving investigation framework for deep learning based malware attack detection for network forensics. Wireless Personal Communications, 122(3), 2701–2722. https://doi.org/10.1007/s11277-021-09026-6

    Article  Google Scholar 

  19. Usman, N., Usman, S., Khan, F., Jan, M. A., Sajid, A., Alazab, M., & Watters, P. (2021). Intelligent dynamic malware detection using machine learning in IP reputation for forensics data analytics. Future Generation Computer Systems, 118, 124–141. https://doi.org/10.1016/j.future.2021.01.004

    Article  Google Scholar 

  20. Wang, X., & Li, C. (2021). Android malware detection through machine learning on kernel task structures. Neurocomputing, 435, 126–150. https://doi.org/10.1016/j.neucom.2020.12.088

    Article  Google Scholar 

  21. Panker, T., & Nissim, N. (2021). Leveraging malicious behavior traces from volatile memory using machine learning methods for trusted unknown malware detection in Linux cloud environments. Knowledge-Based Systems, 226, 107095. https://doi.org/10.1016/j.knosys.2021.107095

    Article  Google Scholar 

  22. Ravi, V., Alazab, M., Selvaganapathy, S., & Chaganti, R. (2022). A Multi-View attention-based deep learning framework for malware detection in smart healthcare systems. Computer Communications, 195, 73–81. https://doi.org/10.1016/j.comcom.2022.08.015

    Article  Google Scholar 

  23. Darem, A., Abawajy, J., Makkar, A., Alhashmi, A., & Alanazi, S. (2021). Visualization and deep-learning-based malware variant detection using OpCode-level features. Future Generation Computer Systems, 125, 314–323. https://doi.org/10.1016/j.future.2021.06.032

    Article  Google Scholar 

  24. Jafari, M., Kavousi-Fard, A., Chen, T., & Karimi, M. (2023). A review on digital twin technology in smart grid, transportation system and smart city: Challenges and future. IEEE Access, 11, 17471–17484. https://doi.org/10.1109/ACCESS.2023.3241588

    Article  Google Scholar 

  25. Dwivedi, S., Vardhan, M., & Tripathi, S. (2021). Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection. Cluster Computing. https://doi.org/10.1007/s10586-020-03229-5

    Article  Google Scholar 

  26. Jia, H., Sun, K., Zhang, W., & Leng, X. (2022). An enhanced chimp optimization algorithm for continuous optimization domains. Complex & Intelligent Systems, 8(1), 65–82. https://doi.org/10.1007/s40747-021-00346-5

    Article  Google Scholar 

  27. Jiang, P., Ergu, D., Liu, F., Cai, Y., & Ma, B. (2022). A review of Yolo algorithm developments. Procedia Computer Science, 199, 1066–1073. https://doi.org/10.1016/j.procs.2022.01.135

    Article  Google Scholar 

  28. Parmar, A., & Brahmbhatt, K. (2022). A novel malware detection approach using performance importance weighted random forest (PERI-WRF) learning model. Indian Journal of Computer Science and Engineering (IJCSE). https://doi.org/10.21817/indjcse/2022/v13i5/221305109

    Article  Google Scholar 

Download references

Acknowledgements

None.

Funding

This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.

Author information

Authors and Affiliations

Authors

Contributions

Authors AP and KB have contributed equally to the work.

Corresponding author

Correspondence to Amit Parmar.

Ethics declarations

Conflict of interest

The authors declare that they have no potential conflict of interest.

Ethical Approval

All applicable institutional and/or national guidelines for the care and use of animals were followed.

Informed Consent

For this type of analysis formal consent is not needed.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Parmar, A., Brahmbhatt, K. An Optimized Intelligent Malware Detection Framework for Securing Digital Data. Wireless Pers Commun 133, 351–371 (2023). https://doi.org/10.1007/s11277-023-10771-z

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-023-10771-z

Keywords

Navigation