Please use this identifier to cite or link to this item:
http://hdl.handle.net/2080/5686Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Sarfaraj, Raini Arbaz | - |
| dc.contributor.author | Gond, Bishwajit Prasad | - |
| dc.contributor.author | Shahnawaz, Md | - |
| dc.contributor.author | Mohapatra, Durga Prasad | - |
| dc.date.accessioned | 2026-02-17T05:29:04Z | - |
| dc.date.available | 2026-02-17T05:29:04Z | - |
| dc.date.issued | 2026-01 | - |
| dc.identifier.citation | 4th International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (ICIITCEE), BNM Institute of Technology, Bengaluru, 22-23 January 2026 | en_US |
| dc.identifier.uri | http://hdl.handle.net/2080/5686 | - |
| dc.description | Copyright belongs to the proceeding publisher. | en_US |
| dc.description.abstract | The classification of malware continues to be a significant cybersecurity problem because malicious software can rapidly evolve obfuscation and evasion mechanism to disguise its real behaviour. Common static analysis techniques can often fail to detect malware that is polymorphic or metamorphic, meaning that code structure changes but malicious intent remain the same. This paper proposes a dynamic behaviour-based malware classification framework as a solution to these issues. It generates visually understandable Custom RGB (Infernoinspired) heatmap images by using API call sequences and argument features captured during execution. These perceptually consistent heatmaps, which transition from deep blue tomagenta to bright yellow, enhance the visual separability of subtle behavioural differences across malware families. Three deep learning architectures are implemented and evaluated: Existing CNN Architecture, Proposed EfficientNet Model and Proposed CNN Model that employed transfer learning, for finegrained feature extraction. The accuracy results for tests on 22,056 samples dataset from eight malware families were 98.76%, 98.88% and 99.12% respectively. The results demonstrate how behavioural visualisation, in conjunction with hybrid and multistage deep learning architectures, significantly enhances malware classification accuracy and resilience to obfuscation-based attacks. This approach provides a vision-driven, interpretable approach for cybersecurity systems of the future. | en_US |
| dc.subject | Malware Classification | en_US |
| dc.subject | Dynamic Analysis | en_US |
| dc.subject | RGB Heatmap | en_US |
| dc.subject | CNN | en_US |
| dc.subject | EfficientNet | en_US |
| dc.subject | Deep Learning | en_US |
| dc.title | A Novel Deep Learning Framework with Behavioral Heatmap, for Malware Classification | en_US |
| dc.type | Article | en_US |
| Appears in Collections: | Conference Papers | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| 2026_ICIITCEE_RASarfaraj_A Novel.pdf | 8.03 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
