Using artificial intelligence methods to detect and eliminate malware

Authors

  • Ibrokhimov Nodirbek Ikromjonovich Fergana State Technical University
  • Olimov Fayozbek Fazliddin oglu Fergana State Technical University

Keywords:

Artificial Intelligence, Machine Learning, Deep Learning, Malware Detection, Malware Elimination, Cybersecurity, Threat Intelligence, Incident Response

Abstract

This article reviews how Artificial Intelligence (AI), especially Machine Learning (ML) and Deep Learning (DL), is transforming malware defense amid the growing challenges of modern malware. It highlights AI’s role in improving threat detection, automating incident response, and enabling proactive defense across various malware analysis techniques. The article also addresses key challenges like data quality, model interpretability, and adversarial attacks. Overall, it emphasizes AI’s crucial role in strengthening cybersecurity against evolving threats.

References

1. ResearchGate. (2025, April 9). Comprehensive review on machine learning and deep learning techniques for malware detection in Android and IoT devices. https://www.researchgate.net/publication/390625697_Comprehensive_review_on_machine_learning_and_deep_learning_techniques_for_malware_detection_in_android_and_IoT_devices

2. ResearchGate. (2024, December 24). Artificial intelligence in cybersecurity: A comprehensive review and future direction. https://www.researchgate.net/publication/386882116_Artificial_Intelligence_in_Cybersecurity_A_Comprehensive_Review_and_Future_Direction

3. Wikipedia. (n.d.). Malware. https://en.wikipedia.org/wiki/Malware

4. World Journal of Advanced Research and Reviews. (2025, January 30). Automating cybersecurity with AI/ML: Defending against advanced threats. https://wjarr.com/sites/default/files/WJARR-2020-0166.pdf

5. arXiv. (2025, May 13). Security through the eyes of AI: How visualization is shaping malware detection [PDF version]. https://arxiv.org/pdf/2505.07574

6. Stamp, M., & Yang, S. (2022). Artificial intelligence for cybersecurity: Techniques, challenges and research directions. Springer.

7. Ligh, M. H., Adair, S., Hartstein, B., & Richard, M. (2010). Malware analyst's cookbook and DVD: Tools and techniques for fighting malicious code. Wiley.

8. Sikorski, M., & Honig, A. (2012). Practical malware analysis: The hands-on guide to dissecting malicious software. No Starch Press.

Published

2025-05-27

How to Cite

Ibrokhimov, N., & Olimov, F. (2025). Using artificial intelligence methods to detect and eliminate malware. Research and Implementation, 3(5), 261–269. Retrieved from https://rai-journal.uz/index.php/rai/article/view/1411

Issue

Section

Статьи

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.