Survey on AI Malware Detection Methods and Cybersecurity Education
Abstract
This paper provides an extensive overview of recent advancements in deep learning-based methods for detecting malware and in programs for educating people about cybersecurity. The overview includes hybrid models, detection based on images, and advanced techniques for extracting features such as texts and images. The main techniques assessed include Convolutional Neural Networks (CNNs), Long ShortTerm Memory networks (LSTMs), and hybrid models that combine CNNs with Recurrent Neural Networks (RNNs). Furthermore, this article assesses strategies for cybersecurity education, with a focus on engaging employees, providing targeted education for at-risk groups, and integrating digital learning tools. While deep learning models have greatly enhanced the accuracy of malware detection, challenges like the quality of datasets, computational expenses, and adversarial attacks continue to exist. In the field of cybersecurity education, promoting awareness through interactive and gamified techniques has been proven to be effective in creating a more resilient workforce. This overview examines these challenges and suggests future directions, including hybrid models for improved malware detection and scalable digital tools for cybersecurity education
Keywords:
Cybersecurity,, Malware detection, Artificial Intelligence, Convolutional Neural Networks,, Cybersecurity EducationPublished
Issue
Section
License
Copyright (c) 2024 International Journal on Emerging Research Areas

This work is licensed under a Creative Commons Attribution 4.0 International License.
All published work in this journal is licensed under the Creative Commons Attribution 4.0 International License (CC BY 4.0). This license permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
How to Cite
Similar Articles
- Aaron Samuel Mathew, Adhil Salim , From Exorbitant to Affordable: The Evolution of AI Training Costs , International Journal on Emerging Research Areas: Vol. 3 No. 1 (2023): IJERA
- Rema M K, Muhamed Ajmal K R, Deepak T G, Roshini M, Muhammed Bazir, INTERACTIVE TOY , International Journal on Emerging Research Areas: Vol. 3 No. 1 (2023): IJERA
- Arun Robin, Tijo Thomas Titus, Ms. Minu Cherian, Improved Handwritten Digit Recognition Using Deep Learning Technique , International Journal on Emerging Research Areas: Vol. 3 No. 2 (2023): IJERA
- Fabeela Ali Rawther, Akhil P Dominic, Alan James, Christy Chacko, Elena Maria Varghese, Early Detection of Attention Deficiency Using ML , International Journal on Emerging Research Areas: Vol. 3 No. 1 (2023): IJERA
- M Midhun, Sangeetha Tony, Tibin Abraham, B Vyshnav, ACCIDENT DETECTION USING VIDEO SURVEILLANCE , International Journal on Emerging Research Areas: Vol. 3 No. 1 (2023): IJERA
- Albin Thomas Lalu, Resmara S, Alen A Thankachen, Sneha Priya Sebastian, Dany Jennez , Lirin Blesson, Kesia Sunny, Fault Detection of Transmission Lines Using Unmanned Aerial Vehicle (UAV) , International Journal on Emerging Research Areas: Vol. 3 No. 1 (2023): IJERA
- Ansamol Varghese, Anandhu Anoj, Emil Thomas, Deepta K Sunny, Angel Thomas, TrueNews: AI Powered Detection of Manipulated Text and Images , International Journal on Emerging Research Areas: Vol. 4 No. 2 (2024): IJERA
- Anishamol Abraham, Niya Joseph, State-of-the-Art Techniques for Image Forgery Detection: A Review , International Journal on Emerging Research Areas: Vol. 3 No. 1 (2023): IJERA
- Mekha Jose, Jocelyn Anthony, Jose V Joseph, Joshwa Thomas, Sharon Baby Thomas, A Review of Machine Learning and Deep Learning Approaches for Offensive Text Detection , International Journal on Emerging Research Areas: Vol. 4 No. 2 (2024): IJERA
- Prinu Vinod Nair, Rohit Subash Nair, Samuel Thomas Mathew S, Ansamol Varghese, Weed detection using YOLOv3 and elimination using organic weedicides with Live feed on Web App , International Journal on Emerging Research Areas: Vol. 4 No. 1 (2024): IJERA
You may also start an advanced similarity search for this article.