Malware Analysis and Detection Using Deep Learning via Artificial Neural Networks
Main Article Content
Abstract
This study aimed to (1) develop a deep learning model using a Fully Connected Neural Network (FCNN) for malware detection and analysis, (2) investigate the behaviors and attack patterns of various types of malware such as brute-force, phishing, ransomware, and DDoS based on data from Remote Desktop Protocol (RDP) and AnyDesk software, and (3) evaluate the performance and accuracy of the proposed model in detecting anomalous behaviors across diverse environments. The tools used in this research included AnyDesk, RDP protocol, TensorFlow, Keras, and Wireshark. Statistical metrics used to assess model performance were Accuracy, Precision, Recall, and F1-score.
The results showed that (1) the developed FCNN model effectively detected anomalous behaviors from data captured via RDP and AnyDesk, achieving a maximum accuracy of 91.49%; (2) performance evaluation on the test dataset indicated that the model achieved a Precision of 95.45%, Recall of 87.50%, and F1-score of 91.30%, demonstrating a balanced trade-off between detection accuracy and false-positive rate; and (3) the model was capable of accurately analyzing and identifying distinct malware attack behaviors such as brute-force attacks, phishing, ransomware, and DDoS thus significantly reducing cybersecurity risks in real-world environments.
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
References
A. Sharma, M. U. Reddy, A. Lathigara, and A. Verma, “Automated malware classification using deep learning neural networks,” in Proc. 2023 IEEE Int. Conf. ICT Bus. Ind. Gov. (ICTBIG), Indore, India, Dec. 2023, pp. 1–6, doi: 10.1109/ICTBIG59752.2023.10456242.
B. An, J. Yang, S. Kim, and T. Kim, “Malware detection using dual Siamese network model,” Comput. Model. Eng. Sci. (CMES), vol. 141, no. 1, pp. 563–584, 2024, doi: 10.32604/cmes.2024.052403.
Z. Guan, J. Wang, X. Wang, W. Xin, J. Cui, and X. Jing, “A comparative study of RNN-based methods for web malicious code detection,” in Proc. 2021 IEEE 6th Int. Conf. Comput. Commun. Syst. (ICCCS), Chengdu, China, Apr. 2021, pp. 769–773, doi: 10.1109/ICCCS52626.2021.9449245.
Q. Li, J. Mi, W. Li, J. Wang, and M. Cheng, “CNN-based malware variants detection method for Internet of Things,” IEEE Internet Things J., vol. 8, no. 23, pp. 16946–16962, Dec. 2021, doi: 10.1109/JIOT.2021.3075694.
N. Soni, M. Kaur, and V. Bhardwaj, “A forensic analysis of AnyDesk remote access application by using various forensic tools and techniques,” Forensic Sci. Int.: Digit. Invest., vol. 48, p. 301695, Mar. 2024, doi: 10.1016/j.fsidi.2024.301695.
I. D. Mienye and N. Jere, “Deep learning for credit card fraud detection: A review of algorithms, challenges, and solutions,” IEEE Access, vol. 12, pp. 96893–96910, 2024, doi: 10.1109/ACCESS.2024.3426955.