Open Access iconOpen Access

ARTICLE

crossmark

Semantic Malware Classification Using Artificial Intelligence Techniques

Eliel Martins1, Javier Bermejo Higuera2,*, Ricardo Sant’Ana1, Juan Ramón Bermejo Higuera2, Juan Antonio Sicilia Montalvo2, Diego Piedrahita Castillo3

1 Systems Development Center, Brazilian Army, QGEx, Bloco G, 2° Piso-SMU, Brasilia, 70630-901, DF, Brazil
2 School of Engineering and Technology, International University of La Rioja, Avda. de La Paz, 137, Logroño, 26006, La Rioja, Spain
3 Faculty of Technology and Science, Camilo José Cela University, Castillo de Alarcón 49, Villanueva de la Cañada, Madrid, 28692, Spain

* Corresponding Author: Javier Bermejo Higuera. Email: email

(This article belongs to the Special Issue: Emerging Technologies in Information Security )

Computer Modeling in Engineering & Sciences 2025, 142(3), 3031-3067. https://doi.org/10.32604/cmes.2025.061080

Abstract

The growing threat of malware, particularly in the Portable Executable (PE) format, demands more effective methods for detection and classification. Machine learning-based approaches exhibit their potential but often neglect semantic segmentation of malware files that can improve classification performance. This research applies deep learning to malware detection, using Convolutional Neural Network (CNN) architectures adapted to work with semantically extracted data to classify malware into malware families. Starting from the Malconv model, this study introduces modifications to adapt it to multi-classification tasks and improve its performance. It proposes a new innovative method that focuses on byte extraction from Portable Executable (PE) malware files based on their semantic location, resulting in higher accuracy in malware classification than traditional methods using full-byte sequences. This novel approach evaluates the importance of each semantic segment to improve classification accuracy. The results revealed that the header segment of PE files provides the most valuable information for malware identification, outperforming the other sections, and achieving an average classification accuracy of 99.54%. The above reaffirms the effectiveness of the semantic segmentation approach and highlights the critical role header data plays in improving malware detection and classification accuracy.

Keywords

Malware; portable executable; semantic; convolutional neural networks

Cite This Article

APA Style
Martins, E., Higuera, J.B., Sant’Ana, R., Higuera, J.R.B., Montalvo, J.A.S. et al. (2025). Semantic malware classification using artificial intelligence techniques. Computer Modeling in Engineering & Sciences, 142(3), 3031–3067. https://doi.org/10.32604/cmes.2025.061080
Vancouver Style
Martins E, Higuera JB, Sant’Ana R, Higuera JRB, Montalvo JAS, Castillo DP. Semantic malware classification using artificial intelligence techniques. Comput Model Eng Sci. 2025;142(3):3031–3067. https://doi.org/10.32604/cmes.2025.061080
IEEE Style
E. Martins, J. B. Higuera, R. Sant’Ana, J. R. B. Higuera, J. A. S. Montalvo, and D. P. Castillo, “Semantic Malware Classification Using Artificial Intelligence Techniques,” Comput. Model. Eng. Sci., vol. 142, no. 3, pp. 3031–3067, 2025. https://doi.org/10.32604/cmes.2025.061080



cc Copyright © 2025 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 132

    View

  • 167

    Download

  • 0

    Like

Share Link