Vol. 1 No. 1 (2026): January 2026
Artificial Intelligence : Technology

Understanding the Evolving Landscape of Malware Threats Through Cyber Threat Intelligence

D Nagabhushanam
Department of CSE (IoT, Cyber Security including Block Chain Technology), Annamacharya Institute of Technology & Sciences (Autonomous), Tirupati, Andra Pradesh, India.
P S Usha Rani
Department of CSE (IoT, Cyber Security including Block Chain Technology), Annamacharya Institute of Technology & Sciences (Autonomous), Tirupati, Andra Pradesh, India.
P Gowthami
Department of CSE (IoT, Cyber Security including Block Chain Technology), Annamacharya Institute of Technology & Sciences (Autonomous), Tirupati, Andra Pradesh, India.
S Mohammed Sameer
Department of CSE (IoT, Cyber Security including Block Chain Technology), Annamacharya Institute of Technology & Sciences (Autonomous), Tirupati, Andra Pradesh, India.
K Yuvaraj
Department of CSE (IoT, Cyber Security including Block Chain Technology), Annamacharya Institute of Technology & Sciences (Autonomous), Tirupati, Andra Pradesh, India.
M Balaji
Department of CSE (IoT, Cyber Security including Block Chain Technology), Annamacharya Institute of Technology & Sciences (Autonomous), Tirupati, Andra Pradesh, India.

Published 2026-02-08

Keywords

  • Malware Detection,
  • Cyber Threat Intelligence,
  • Machine Learning,
  • Random Forest,
  • Cybersecurity,
  • Threat Analysis
  • ...More
    Less

How to Cite

D Nagabhushanam, P S Usha Rani, P Gowthami, S Mohammed Sameer, K Yuvaraj, & M Balaji. (2026). Understanding the Evolving Landscape of Malware Threats Through Cyber Threat Intelligence. Milestone Transactions on Artificial Intelligence, 1(1), 78–91. https://doi.org/10.5281/zenodo.18525909

Abstract

The rapid development of sophisticated forms of malware and ever-changing cyber threats have become a major challenge for cybersecurity globally. Using cyber threat intelligence (CTI), this study aims to provide an overall analysis of the current trend of malware. It has identified various forms of recent attack patterns, behaviors, and evasion techniques of malware. The study has explored various forms of malware activation, propagation, and evasion techniques. It has evaluated their impact on critical infrastructure such as finance, healthcare, and other sectors. Using various case studies, experts, and threat intelligence, this study has demonstrated the importance of timely and accurate threat analysis. A comparative study of various machine learning-based threat classification has been implemented with RF, SVM, and DT algorithms. The performance evaluation of these classifiers shows that the RF classifier performs better than the others. It has achieved an accuracy of 95.57%. Hence, it has been able to show its efficiency while dealing with problems that involve a large number of dimensions, such as cybersecurity. The importance of intelligent detection and mitigation techniques in dealing with malware attacks has been revealed. The importance of international cooperation and collaboration in dealing with malware threats has been demonstrated.

References

  1. Ibrahim, R. M. (2025). Enhancing multifactor authentication using machine learning techniques. Mesopotamian Journal of CyberSecurity, 5(2), 899–912.
  2. Ramcharan, H. (2025). The effective integration of multi-factor authentication (MFA) with zero trust security. American Journal of Mathematical and Computer Modelling, 10(1), 1–5.
  3. Asif, M., Abrar, M., Salam, A., Amin, F., Ullah, F., Shah, S., & AlSalman, H. (2025). Intelligent two-phase dual authentication framework for Internet of Medical Things. Scientific Reports, 15, Article 1760.
  4. Tran-Truong, P. T., Pham, M. Q., Son, H. X., et al. (2025). A systematic review of multi-factor authentication in digital payment systems: NIST standards alignment and industry implementation analysis. Journal of Systems Architecture, 162, 103402.
  5. Zeeshan, N. (2025). Continuous authentication in resource-constrained environments. Sensors, 25(18), Article 5711.
  6. Alotaibi, A. (2025). A review of the authentication techniques for Internet of Things in smart cities. Sensors, 25(6), Article 1649.
  7. Ganmati, A., Afdel, K., & Koutti, L. (2025). Deep learning-based multi-factor authentication: A survey of biometric and smart card integration approaches (arXiv Preprint No. arXiv:2510.05163). arXiv.
  8. Gilbert, C., & Gilbert, M. A. (2025). Continuous user authentication on mobile devices. International Research Journal of Advanced Engineering Science, 10(1), 158–173.
  9. Allafi, R., & Darem, A. A. (2025). Usability and security in online authentication systems. International Journal of Advanced Applied Sciences, 12(6), 1–12.
  10. Lengert, A. (2025). 2FA: Navigating the challenges and solutions for inclusive access (arXiv Preprint No. arXiv:2502.11737). arXiv.
  11. Fahim, A., Dey, S., Absur, M. N., Siam, M. K., Huque, M. T., & Jafreen, J. G. (2025). Optimized approaches to malware detection: A study of machine learning and deep learning techniques. In Proceedings of the 14th IEEE International Conference on Communication Systems and Network Technologies (CSNT) (pp. 269–275). IEEE.
  12. Qin, X., Li, W., & Rosenberg, P. (2025). RoundImage: Towards secure graphical password authentication via rounded image selection in IoT. IEEE Internet of Things Journal.
  13. Mahato, A., Majumdar, R., & Ghosh, S. K. (2025). Feature-driven malware detection using cascade machine learning models. SN Computer Science, 6(7), Article 794.
  14. Ajayi, B., Barakat, B., & McGarry, K. (2025). Leveraging VAE-derived latent spaces for enhanced malware detection with machine learning classifiers (arXiv Preprint No. arXiv:2503.20803). arXiv.
  15. Li, Z., Zhu, H., Liu, H., Song, J., & Cheng, Q. (2024). Comprehensive evaluation of Mal-API-2019 dataset by machine learning in malware detection (arXiv Preprint No. arXiv:2403.02232). arXiv.
  16. Suru, H. U. (2024). Improving the usability of graphical authentication systems using subject-based images.
  17. Ravin, D., Akshwin, T., Thenmozhi, M., et al. (2025). Malware classification using machine learning and deep learning: A comprehensive approach. Cureus Journal of Computer Science, 2, 17095–17112.
  18. Chukwuani, E. N., Odunsi, O. R., & Ikemefuna, C. D. (2025). Machine learning techniques for real-time malware classification and threat detection in distributed systems.
  19. Dias, N. I., Kumaresan, M. S., & Rajakumari, R. S. (2023). Deep learning based graphical password authentication approach against shoulder-surfing attacks. Multiagent and Grid Systems, 19(1), 99–115.
  20. Kamdan, Y. P., Pratama, R. S., Munzi, R. S., Mustafa, A. B., & Kharisma, I. L. (2025). Static malware detection and classification using machine learning: A random forest approach. Engineering Proceedings, 107(1), Article 76.
  21. Joseph, H., Manjus, E., Kokatnoor, S. A., & Madavi, K. P. B. (2024). Data-driven malware detection: Exploring supervised machine learning approaches. In Proceedings of the International Conference on Data Science, Computation and Security (pp. 465–476).
  22. Azeem, M., Khan, D., Iftikhar, S., Bawazeer, S., & Alzahrani, M. (2024). Analyzing and comparing the effectiveness of malware detection: A study of machine learning approaches. Heliyon, 10(1), Article e23574.
  23. George, A. M., Rajan, K. T., Jambula, K. R., & Ahmed, S. T. (2025, August). Adaptive Firewall System to Predict Phishing Websites using Machine Learning Model. In 2025 International Conference on Artificial Intelligence and Machine Vision (AIMV) (pp. 1-6). IEEE.
  24. Fatima, N., Noorain, A., Ahmed, S. T., & Siddiqha, S. A. (2025, December). Automated Medical System for Rural Communities to Provide Medication without Human Interruption Using Machine Learning Techniques. In 2025 IEEE 5th International Conference on ICT in Business Industry & Government (ICTBIG) (pp. 1-5). IEEE.
  25. Alex, S., Shashank, J. T., & Ahmed, S. T. (2025, July). Machine Learning Based Network Traffic Analyser for Malicious and Benign Traffic Detection. In 2025 International Conference on Computing Technologies & Data Communication (ICCTDC) (pp. 1-6). IEEE.
  26. Ahmed, S. T., Akshaya, K. R., Vattikuti, H., Preetham, L. S. P., & Dutta, R. K. (2025, September). Dynamic Traffic Status Classification and Monitoring in Indian Metro Cities Using Edge-AI Computation. In 2025 International Conference on Vehicular Technology and Transportation Systems (ICVTTS) (pp. 1-6). IEEE.