Multi-objective Markov-enhanced adaptive whale optimization cybersecurity model for binary and multi-class malware cyberthreat classification

Saif Ali Abd Alradha Alsaidi , Riyadh Rahef Nuiaa Al Ogaili , Zaid Abdi Alkareem Alyasseri , Dhiah Al-Shammary , Ayman Ibaida , Adam Slowik

Journal of Electronic Science and Technology ›› 2025, Vol. 23 ›› Issue (4) : 100334

PDF (2903KB)
Journal of Electronic Science and Technology ›› 2025, Vol. 23 ›› Issue (4) :100334 DOI: 10.1016/j.jnlest.2025.100334
research-article

Multi-objective Markov-enhanced adaptive whale optimization cybersecurity model for binary and multi-class malware cyberthreat classification

Author information +
History +
PDF (2903KB)

Abstract

The rapid and increasing growth in the volume and number of cyber threats from malware is not a real danger; the real threat lies in the obfuscation of these cyberattacks, as they constantly change their behavior, making detection more difficult. Numerous researchers and developers have devoted considerable attention to this topic; however, the research field has not yet been fully saturated with high-quality studies that address these problems. For this reason, this paper presents a novel multi-objective Markov-enhanced adaptive whale optimization (MOMEAWO) cybersecurity model to improve the classification of binary and multi-class malware threats through the proposed MOMEAWO approach. The proposed MOMEAWO cybersecurity model aims to provide an innovative solution for analyzing, detecting, and classifying the behavior of obfuscated malware within their respective families. The proposed model includes three classification types: Binary classification and multi-class classification (e.g., four families and 16 malware families). To evaluate the performance of this model, we used a recently published dataset called the Canadian Institute for Cybersecurity Malware Memory Analysis (CIC-MalMem-2022) that contains balanced data. The results show near-perfect accuracy in binary classification and high accuracy in multi-class classification compared with related work using the same dataset.

Keywords

Malware cybersecurity attacks / Malware detection and classification / Markov chain / Multi-objective / MOMEAWO cybersecurity model

Cite this article

Download citation ▾
Saif Ali Abd Alradha Alsaidi, Riyadh Rahef Nuiaa Al Ogaili, Zaid Abdi Alkareem Alyasseri, Dhiah Al-Shammary, Ayman Ibaida, Adam Slowik. Multi-objective Markov-enhanced adaptive whale optimization cybersecurity model for binary and multi-class malware cyberthreat classification. Journal of Electronic Science and Technology, 2025, 23(4): 100334 DOI:10.1016/j.jnlest.2025.100334

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

S. Chandran, S.R. Syam, S. Sankaran, T. Pandey, K. Achuthan, From static to AI-driven detection: a comprehensive review of obfuscated malware techniques, IEEE Access 13 (2025) 74335-74358.

[2]

N.D. Bastian, M.D. Dinmore, Military and Security Applications: Cybersecurity, Encyclopedia of Optimization, Springer, Cham, Germany, 2023, pp. 1-10.

[3]

S. Berrios, D. Leiva, B. Olivares, H. Allende-Cid, P. Hermosilla, Systematic review: malware detection and classification in cybersecurity, Appl. Sci. 15 (14) (2025) 7747.

[4]

A. Koul, S. Gochhait, S.A. Hamood, H.S. Abdulghani, Healthcare cyber risk and its impact on healthcare, in: L. Garg, G.Mirajkar, S. Misra, V.K. Chattu (Eds.), Intelligent Biomedical Technologies and Applications for Healthcare 5.0, Academic, London, UK, 2025, pp. 245-253.

[5]

M. Vijarania, S. Gupta, A. Agrawal, S. Misra, Achieving sustainable development goals in cyber security using AIoT for healthcare application, Artificial Intelligence of Things for Achieving Sustainable Development Goals, Springer, Cham, Germany, 2024, pp. 207-231.

[6]

N.N. Cele, S. Kwenda, Do cybersecurity threats and risks have an impact on the adoption of digital banking? A systematic literature review, J. Financ. Crime 32 (1) (2025) 31-48.

[7]

H.S. Lallie, A. Thompson, E. Titis, P. Stephens, Analysing cyber attacks and cyber security vulnerabilities in the university sector, Computers 14 (2) (2025) 49.

[8]

G. Angafor, I. Yevseyeva, L. Maglaras, MalAware: a tabletop exercise for malware security awareness education and incident response training, Internet Things Cyber-Physical syst 4 (2024) 280-292.

[9]

R. Sihwail, M. Al Ghamri, D. Ibrahim, An enhanced model of whale optimization algorithm and k-nearest neighbors for malware detection, Int. J. Intell. Eng. Syst. 17 (3) (2024) 606-621.

[10]

H. Naeem, S. Dong, O.J. Falana, F. Ullah, Development of a deep stacked ensemble with process based volatile memory forensics for platform independent malware detection and classification, Expert Syst. Appl. 223 (2023) 119952.

[11]

S. Benkerroum, K. Chougdali, Enhancing forensic analysis using a machine Learning-based approach, in: Proc. of 2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet), Rabat, Morocco, 2023, pp. 1-6.

[12]

K. Roshan, A. Zafar, Ensemble adaptive online machine learning in data stream: a case study in cyber intrusion detection system, Int. J. Inf. Technol. 16 (2024) 5099-5112.

[13]

S. Bhardwaj, A.S. Li, M. Dave, E. Bertino, Overcoming the lack of labeled data: training malware detection models using adversarial domain adaptation, Comput. Secur. 140 (2024) 103769.

[14]

M. Dener, G. Ok, A. Orman, Malware detection using memory analysis data in big data environment, Appl. Sci. 12 (17) (2022) 8604.

[15]

M. Al-Qudah, Z. Ashi, M. Alnabhan, Q. Abu Al-Haija, Effective one-class classifier model for memory dump malware detection, J. Sens. Actuator Netw. 12 (1) (2023) 5.

[16]

K.S. Roy, T. Ahmed, P.B. Udas, M.E. Karim, S. Majumdar, Malhystack: a hybrid stacked ensemble learning framework with feature engineering schemes for obfuscated malware analysis, Intell. Syst. Appl. 20 (2023) 200283.

[17]

A. Mezina, R. Burget, Obfuscated malware detection using dilated convolutional network, in: Proc. of 2022 14th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), Valencia, Spain, 2022, pp. 110-115.

[18]

D. Cevallos-Salas, F. Grijalva, J. Estrada-Jiménez, D. Benítez, R. Andrade, Obfuscated privacy malware classifiers based on memory dumping analysis, IEEE Access 12 (2024) 17481-17498.

[19]

S.S. Shafin, G. Karmakar, I. Mareels, Obfuscated memory malware detection in resource-constrained IoT devices for smart city applications, Sensors 23 (11) (2023) 5348.

[20]

W. Cassel, N.E. Majd, A lightweight obfuscated malware multi-class classifier for IoT using machine learning, in: Proc. of 2024 International Conference on Computing, Networking and Communications (ICNC), Big Island, USA, 2024, pp. 239-243.

[21]

T. Carrier, P. Victor, A. Tekeoglu, A.H. Lashkari, Detecting obfuscated malware using memory feature engineering, in: Proc. of 8th International Conference on Information Systems Security and Privacy, Virtual Event, 2022, pp. 177-188.

[22]

S. Mirjalili, A. Lewis, The whale optimization algorithm, Adv. Eng. Software 95 (2016) 51-67.

[23]

A.A. Ewees, M. Abd Elaziz, D. Oliva, A new multi-objective optimization algorithm combined with opposition-based learning, Expert Syst. Appl. 165 (2021) 113844.

[24]

H. Morteza, S.M. Jameii, M.K. Sohrabi, An improved learning automata based multi-objective whale optimization approach for multi-objective portfolio optimization in financial markets, Expert Syst. Appl. 224 (2023) 119970.

PDF (2903KB)

135

Accesses

0

Citation

Detail

Sections
Recommended

/