Skip to Content
Next-Generation Systems and Secure Computing
book

Next-Generation Systems and Secure Computing

by Subhabrata Barman, Santanu Koley, Subhankar Joardar
April 2025
Intermediate to advanced
480 pages
12h 39m
English
Wiley-Scrivener
Content preview from Next-Generation Systems and Secure Computing

3A Comprehensive Study on Deep Learning and Artificial Intelligence for Malware Analysis

Tukkappa Gundoor* and Sridevi

Department of Computer Science, Karnatak University, Dharwad, Karnataka, India

Abstract

This chapter offers a thorough review of the use of deep learning and artificial intelligence (AI) in malware analysis, emphasizing the essential methods, uses, difficulties, and prospects. It explains that essential ideas for feature extraction and malware classification, including convolutional neural networks (CNNs), recurrent neural networks (RNNs), and generative adversarial networks (GANs), are examples of neural networks. The categorization of malware using supervised learning techniques like CNNs and RNNs as well as the identification of anomalies using unsupervised learning methods like auto encoders and GANs are also covered in this chapter. It solves issues such as the lack of labeled malware samples and the constantly changing nature of malware. The necessity of interpretable deep learning models to comprehend identified malware is also emphasized in this chapter. Deep learning and AI present significant opportunities for improving malware detection, classification, and dynamic analysis, ultimately enhancing the security of computer systems and networks against the risks posed by harmful software.

Keywords: Attacks, artificial intelligence, deep learning, machine learning, malware, security

3.1 Introduction

Over time, there has been a considerable increase ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

Software Supply Chain Security

Software Supply Chain Security

Cassie Crossley
Three Essentials for Agentic AI Security

Three Essentials for Agentic AI Security

Paolo Dal Cin, Daniel Kendzior, Yusof Seedat, Renato Marinho

Publisher Resources

ISBN: 9781394228263Purchase Link