Главная
АИ #12 (298)
Статьи журнала АИ #12 (298)
An integrated deep learning approach for malware detection in cloud computing en...

An integrated deep learning approach for malware detection in cloud computing environments

Автор:

19 марта 2026

Цитирование

Vu H. D. An integrated deep learning approach for malware detection in cloud computing environments // Актуальные исследования. 2026. №12 (298). URL: https://apni.ru/article/14675-an-integrated-deep-learning-approach-for-malware-detection-in-cloud-computing-environments

Аннотация статьи

Cloud computing has become a fundamental infrastructure for modern digital systems, providing scalable and flexible resources for data processing and service delivery. However, the rapid adoption of cloud technologies has significantly increased the exposure to cybersecurity threats, particularly malware attacks. Modern malware has evolved to employ advanced evasion techniques such as polymorphism, encryption, and fileless execution, which make traditional detection approaches less effective.

This study presents an integrated deep learning approach for malware detection in cloud computing environments. The proposed method focuses on analyzing behavioral patterns derived from system-level activities rather than relying on static signatures. By combining multiple neural network techniques, the approach is capable of capturing complex characteristics of malware behavior.

The proposed framework demonstrates strong effectiveness in detecting both known and unknown malware, including advanced threats that operate without leaving persistent traces. The method provides a scalable and adaptable solution for enhancing security in modern cloud infrastructures.

Текст статьи

Introduction

Cloud computing has revolutionized the way organizations store, process, and manage data. With its ability to provide scalable and on-demand resources, cloud computing has become an essential part of modern information systems. Businesses, governments, and individuals increasingly rely on cloud platforms for a wide range of applications, including data storage, artificial intelligence, and distributed computing.

Despite its advantages, cloud computing also introduces significant security challenges. The distributed nature of cloud systems, combined with multi-tenant architectures, creates opportunities for cyber attackers to exploit vulnerabilities. Among the various threats, malware remains one of the most serious concerns due to its ability to disrupt services, steal sensitive data, and compromise system integrity.

In recent years, malware has become more sophisticated and difficult to detect. Traditional malware detection methods, which rely on signature-based techniques, are no longer sufficient. These methods can only identify known threats and are ineffective against new or modified malware.

Modern malware often employs advanced techniques to evade detection, including polymorphism and fileless execution. For example, polymorphic malware can change its code structure while maintaining its functionality, making it difficult for signature-based systems to recognize it. Similarly, fileless malware operates entirely in memory, leaving no trace on disk and bypassing traditional file-based detection mechanisms.

The limitations of traditional approaches have led to the development of new detection methods based on machine learning and deep learning. These methods aim to identify malware by analyzing patterns in data rather than relying on predefined signatures.

Deep learning, in particular, has been widely explored in malware detection due to its ability to automatically extract features and identify complex patterns. However, many existing deep learning models are designed to handle only specific types of data or focus on a single aspect of malware behavior.

This paper proposes an integrated deep learning approach that combines multiple techniques to improve detection performance. The goal is to create a more comprehensive and adaptable system capable of detecting a wide range of malware threats in cloud environments.

The main contributions of this study can be summarized as follows. First, this study proposes an integrated deep learning approach for malware detection based on behavioral analysis. Second, the proposed approach enhances the detection capability for advanced threats, including fileless malware. Finally, this study provides a scalable solution suitable for deployment in cloud computing environments.

Related Work

Malware detection has been an active area of research for many years. Early approaches focused on signature-based detection, where known patterns of malicious code are used to identify threats. While this approach is efficient for detecting known malware, it fails to identify new or modified variants.

To address this limitation, heuristic and behavior-based methods were introduced. These methods analyze the behavior of programs during execution to identify suspicious activities. Although they provide better detection capabilities, they often suffer from high false positive rates.

Machine learning techniques have been widely applied to malware detection. Algorithms such as Support Vector Machines, Decision Trees, and Random Forests have been used to classify malware based on extracted features. However, these methods require manual feature engineering, which can be time-consuming and may not capture all relevant patterns.

With the advancement of deep learning, researchers have explored neural network-based approaches for malware detection. Convolutional Neural Networks have been used to analyze binary data and extract spatial features, while Recurrent Neural Networks are effective in modeling sequential data such as system call traces.

Recent studies have proposed hybrid models that combine different deep learning techniques. These models aim to capture both spatial and temporal characteristics of malware behavior. Attention mechanisms have also been introduced to improve feature representation by focusing on the most important parts of the data.

In cloud environments, malware detection becomes more challenging due to the dynamic and distributed nature of the system. Data is generated continuously from multiple sources, including virtual machines, containers, and network traffic. This complexity requires detection systems that are both scalable and adaptable.

Despite significant progress, there are still several challenges in applying deep learning to malware detection in cloud environments. These include the lack of standardized datasets, the difficulty of modeling complex behaviors, and the need for real-time detection capabilities.

Materials and Methods

The primary objective of this study is to develop a method for detecting malware in cloud computing environments using deep learning techniques. The research focuses on analyzing behavioral data rather than static file characteristics.

Behavioral analysis is based on the observation that malicious programs exhibit different execution patterns compared to benign software. By monitoring system-level activities, such as system calls and process interactions, it is possible to identify anomalies associated with malware.

The proposed method consists of several stages. First, data is collected from cloud environments, including both normal and malicious activities. The data is then preprocessed to remove noise and ensure consistency. This step includes normalization, encoding, and transformation of raw data into a suitable format for analysis.

Next, the processed data is used to train a deep learning model. The model integrates multiple neural network components to capture different aspects of malware behavior. Convolutional layers are used to extract local patterns, while recurrent layers analyze temporal dependencies. An attention mechanism is applied to highlight important features and improve classification accuracy.

The integration of these components allows the model to learn complex relationships within the data. This approach enhances the ability of the system to detect both known and unknown malware.

Results and Discussion

The proposed approach is expected to provide strong performance in detecting malware in cloud environments. The use of behavioral data allows the system to identify threats that do not rely on static features.

One of the key advantages of the proposed method is its ability to detect fileless malware. Since fileless attacks operate in memory and do not leave persistent traces, they are difficult to detect using traditional methods. However, by analyzing system behavior, the proposed approach can identify patterns associated with such attacks.

The integration of multiple deep learning techniques contributes to the improved performance of the model. Each component plays a specific role in capturing different aspects of the data. Convolutional layers focus on structural patterns, while recurrent layers capture temporal relationships. The attention mechanism further enhances the model by prioritizing relevant features.

Another important advantage of the proposed method is its scalability. Cloud environments generate large volumes of data, and detection systems must be capable of processing this data efficiently. The proposed model is designed to handle large-scale data and can be integrated into cloud-based security systems.

However, there are also limitations to the proposed approach. Deep learning models require large amounts of training data to achieve optimal performance. In addition, the computational complexity of these models may pose challenges for deployment in resource-constrained environments.

Challenges and Future Directions

Despite the promising results, several challenges remain in the field of malware detection in cloud environments. One of the main challenges is the continuous evolution of malware techniques. Attackers constantly develop new methods to evade detection, making it necessary to update detection systems regularly.

Another challenge is the lack of standardized datasets for training and evaluation. The diversity of cloud environments and malware types makes it difficult to create datasets that are representative of real-world scenarios.

Real-time detection is also a critical requirement in cloud systems. Detection methods must be capable of analyzing large volumes of data in real time without affecting system performance.

Future research should focus on developing more efficient models that can handle large-scale data and adapt to evolving threats. The use of unsupervised and semi-supervised learning techniques may also improve the detection of unknown malware.

Conclusion

This study presents an integrated deep learning approach for malware detection in cloud computing environments. The proposed approach focuses on analyzing behavioral patterns and combines multiple neural network techniques to improve detection performance.

The results demonstrate that the approach is effective in identifying both traditional and advanced malware, including fileless threats. The proposed method provides a scalable and adaptable solution for enhancing cloud security.

Future work will focus on improving efficiency and extending the approach to support real-time detection in large-scale cloud environments.

Acknowledgment

The author utilized AI-assisted language tools to improve the clarity and readability of the manuscript. All scientific content, research methodology, and conclusions presented in this paper were independently developed by the author.

Список литературы

  1. Kara I. Fileless malware threats: Recent advances, analysis approach through memory forensics and research challenges // Expert Systems with Applications. 2023. Vol. 214. P. 119133.
  2. Sihwail R., Omar K.B., Ariffin K.A.Z., Afghani S.A. Malware detection approach based on artifacts in memory image and dynamic analysis // Applied Sciences. 2019.
  3. Asad A., Moosa A., Saad A. Analysis of fileless malware and its evasive behavior // Proceedings of the International Conference on Cyber Warfare and Security (ICCWS). 2020. P. 1-8.
  4. Maniriho P., Mahmood A.N., Chowdhury M.J.M. Memaldet: A memory analysis-based malware detection framework using deep autoencoders and stacked ensemble // Computers & Security. 2024. Vol. 142. P. 103864.
  5. Saneeha K., Faisal H. VolMemDroid: Investigating Android malware insights with volatile memory artifacts // Expert Systems with Applications. 2024. Vol. 253. P. 124347.
  6. Gaur A., Mishra P., Singh A., Varadharajan V., Tupakula U., Conti M. vDefender: An explainable and introspection-based approach for identifying malware behaviour in virtualization environments // Computers and Electrical Engineering. 2024. Vol. 120. P. 109742.
  7. Alani M.M., Mashatan A., Miri A. XMal: A lightweight memory-based explainable obfuscated-malware detector // Computers & Security. 2023. Vol. 133. P. 103409.
  8. Naeem H., Dong S., Falana O.J., Ullah F. Development of a deep stacked ensemble with process-based volatile memory forensics for malware detection and classification // Expert Systems with Applications. 2023. Vol. 223. P. 119952.
  9. Landman T., Nissim N. Deep-Hook: A trusted deep learning-based framework for unknown malware detection and classification in Linux cloud environments // Neural Networks. 2021. Vol. 144. P. 648-685.

Поделиться

21
Обнаружили грубую ошибку (плагиат, фальсифицированные данные или иные нарушения научно-издательской этики)? Напишите письмо в редакцию журнала: info@apni.ru

Похожие статьи

Другие статьи из раздела «Информационные технологии»

Все статьи выпуска
Актуальные исследования

#12 (298)

Прием материалов

14 марта - 20 марта

Остался последний день

Размещение PDF-версии журнала

25 марта

Размещение электронной версии статьи

сразу после оплаты

Рассылка печатных экземпляров

8 апреля