UPM Institutional Repository

Convolutional long short-term memory for fileless malware detection


Citation

Kareegalan, Kunaprasan and Asmawi, Aziah and Abdullah, Mohd Taufik and Ninggal, Mohd Izuan Hafez and Abdullah, Muhammad Daniel Hafiz and Muhsen, Yousif Raad (2025) Convolutional long short-term memory for fileless malware detection. Journal of Advanced Research in Applied Sciences and Engineering Technology, 64 (4). pp. 136-157. ISSN 2462-1943

Abstract

In cybersecurity, the rise of fileless malware poses a significant challenge to endpoint security. Traditional detection methods often fail against these sophisticated attacks, necessitating advanced techniques like deep learning models. This study highlights the limitations of Bi-Directional Long Short-Term Memory (BLSTM) models in dynamic malware analysis and proposes enhancements through Convolutional Long Short-Term Memory (ConvLSTM) architecture. BLSTM models process input sequences in forward and backward directions, combining the results into one output. While this dual-layer approach improves analysis, it is time-consuming, potentially increasing the risk of fileless malware attacks. A key limitation of BLSTM is the lack of parameter sharing between forward and backward directions. This reduces its ability to capture spatial and temporal features simultaneously, hindering effectiveness in detecting fileless malware. To address this, the ConvLSTM model consolidates feature extraction within a single LSTM cell layer. ConvLSTM breaks down samples into subsequences and uses timesteps for additional feature extraction, enabling spatial-temporal data analysis and improving malware prediction accuracy. The model was tested using a dynamic malware dataset. Unlike traditional LSTM, ConvLSTM integrates convolutional layers, allowing parameter sharing across both spatial and temporal dimensions. This reduces computational complexity and improves model performance in handling multidimensional data. The research re-simulated prior work with BLSTM using the same malware dataset. The Spyder app ran the event simulator, and the ConvLSTM model's results replaced BLSTM's using identical parameters. Time, accuracy, and loss were the main performance metrics. ConvLSTM outperformed BLSTM, achieving 98% detection accuracy compared to BLSTM's 90%. It also significantly reduced processing time, averaging 10 seconds, while BLSTM took 22 seconds. ConvLSTM experienced lower losses, averaging 10% per epoch versus BLSTM's 20%. In conclusion, ConvLSTM offers superior performance over BLSTM in fileless malware detection. Its enhanced computational efficiency and ability to quickly mitigate threats make it a robust solution for fortifying endpoint security against evolving cyber threats. ConvLSTM holds potential in strengthening defense mechanisms against sophisticated malware attacks, providing a proactive approach to safeguarding networks and data.


Download File

[img] Text
117331.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial.

Download (752kB)

Additional Metadata

Item Type: Article
Divisions: Faculty of Computer Science and Information Technology
DOI Number: https://doi.org/10.37934/araset.64.4.136157
Publisher: Semarak Ilmu Publishing
Keywords: Cybersecurity; Fileless Malware; endpoint security; Dynamic Malware; ConvLSTM; RNN
Depositing User: Ms. Che Wa Zakaria
Date Deposited: 14 May 2025 06:45
Last Modified: 14 May 2025 06:45
Altmetrics: http://www.altmetric.com/details.php?domain=psasir.upm.edu.my&doi=10.37934/araset.64.4.136157
URI: http://psasir.upm.edu.my/id/eprint/117331
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item