Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Classification of Malware using Machine learning and Deep learning Techniques

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2021
B.A.S. Dilhara

B A S Dilhara. Classification of Malware using Machine learning and Deep learning Techniques. International Journal of Computer Applications 183(32):12-17, October 2021. BibTeX

	author = {B.A.S. Dilhara},
	title = {Classification of Malware using Machine learning and Deep learning Techniques},
	journal = {International Journal of Computer Applications},
	issue_date = {October 2021},
	volume = {183},
	number = {32},
	month = {Oct},
	year = {2021},
	issn = {0975-8887},
	pages = {12-17},
	numpages = {6},
	url = {},
	doi = {10.5120/ijca2021921708},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


The threats impose by the cyber-attacks due to malicious software (malware) have been increasing drastically with the evolution of information technology. Since people use web applications on a daily basis these malware attacks have become challenging. There have been various attacks affecting confidentiality, integrity and availability of data which has become a major security concern. Though the manual inspection and classification methods seemed to bring up some light to this facet, these methods are no longer considered effective, since they are time consuming and inefficient. With the high-rate malware spreading, it is a necessity to come up with some novelty approach to classify them as malware or benign software. So, this is where machine learning comes up as a novelty approach in malware classification. In this paper, a malware dataset was used on several machine learning classifiers like Support Vector Machinery (SVM) and Gaussian Naive Bayes classifiers were used and Recurrent Neural Network (RNN) and Convolutional Neural Networks (CNN) were used as the deep learning classifiers. Although there are many other methods for malware classification, a machine learning approach could be efficient and effective in detecting malicious software. Thus, the primary objective of this paper is to provide an insight to the machine learning approach in malware classification by depicting, which is the best classifier of the listed, that can effectively classify malware based on their accuracy or precision. In conclusion, based on the results this recognizes Recurrent Neural networks as the best approach that recorded the highest accuracy.


  1. B. Cakir and E. Dogdu, “Malware classification using deep learning methods,” Proc. ACMSE 2018 Conf., vol. 2018-January, no. April 2018.
  2. A. P. Namanya, A. Cullen, I. U. Awan, and J. P. Disso, “The World of Malware: An Overview,” Proc. - 2018 IEEE 6th Int. Conf. Futur. Internet Things Cloud, FiCloud 2018, no. September, pp. 420–427, 2018.
  3. D. Gibert, C. Mateu, and J. Planes, “The rise of machine learning for detection and classification of malware: Research developments, trends and challenges,” J. Netw. Comput. Appl., vol. 153, no. July 2019, p. 102526, 2020. [Online].Available:
  4. R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, and S. Venkatraman, “Robust Intelligent Malware Detection Using Deep Learning,” IEEE Access, vol. 7, pp. 46 717–46 738, 2019.
  5. V. Menger, F. Scheepers, and M. Spruit, “Comparing deep learning and classical machine learning approaches for predicting inpatient violence incidents from clinical text,” Applied Sciences, vol. 8, no. 6, p. 981, Jun. 2018. [Online]. Available:
  6. C. Liu, L. Wang, B. Lang, and Y. Zhou, “Finding effective classifier for malicious URL detection,” in Proceedings of the 2018 2nd International Conference on Management Engineering, Software Engineering and Service Sciences - ICMSS 2018. ACM Press, 2018. [Online].Available:
  7. Z. Cui, F. Xue, X. Cai, Y. Cao, G. G. Wang, and J. Chen, “Detection of Malicious Code Variants Based on Deep Learning,” IEEE Trans. Ind. Informatics, vol. 14, no. 7, pp. 3187–3196, 2018.
  8. B. B. Benuwa, Y. Zhan, B. Ghansah, D. K. Wornyo, and F. B. Kataka, “A review of deep machine learning,” Int. J. Eng. Res. Africa, vol. 24, no. February 2017, pp. 124–136, 2016.
  9. Y. Kim, Y. Jernite, D. Sontag, and A. M. Rush, “Character-Aware neural language models,” 30th AAAI Conf. Artif. Intell. AAAI 2016, pp. 2741– 2749, 2016.
  10. M. Rhode, P. Burnap, and K. Jones, “Early-stage malware prediction using recurrent neural networks,” Comput. Secur., vol. 77, no. December 2017, pp. 578–594, 2018. [Online]. Available:
  11. R. Olson, G. James, and R. Howard, Cyber Security Cyber Security. Springer Singapore, 2011. [Online]. Available: 8
  12. I. Firdausi, C. Lim, A. Erwin, and A. S. Nugroho, “Analysis of machine learning techniques used in behavior-based malware detection,” Proc. - 2010 2nd Int. Conf. Adv. Comput. Control Telecommun. Technol. ACT 2010, pp. 201–203, 2010.
  13. A. M. M. Muhammad Furqan Rafique, Aqsa Saeed Qureshi, Asifullah Khan, Jin Young Kim, “Malware Classification using Deep Learning based Feature Extraction and Wrapper based Feature Selection Technique Muhammad,” pp. 1–20.
  14. Saravana, “Malware detection,” Apr 2018. [Online]. Available:
  15. L. Zhang, Y. Zhu, P. Shi, and Q. Lu, “Performance analysis,” Stud. Syst. Decis. Control, vol. 53, pp. 59–85, 2016.


Malware Classification, Machine Learning, Deep Learning, Binary Classification