Machine Learning-Enhanced Malware Obfuscation and Innovative Defense Strategies Article

Kanwal, P, Kumar, TA, Sunil, S et al. (2026). Machine Learning-Enhanced Malware Obfuscation and Innovative Defense Strategies . 14 12605-12627. 10.1109/ACCESS.2026.3656242

cited authors

  • Kanwal, P; Kumar, TA; Sunil, S; Chandrasekaran, S; Jaiswal, S; Honnavalli, PB; Iyengar, SS

authors

abstract

  • In the evolving landscape of sustainable digital technologies, safeguarding cyber-ecosystems has become a critical priority. Traditional machine learning-based malware detection systems are increasingly ineffective against sophisticated adversarial techniques that exploit system-level vulnerabilities and bypass standard security protocols. This paper introduces a novel machine learning-driven malware obfuscation methodology and proposes a comprehensive defense strategy to counteract such threats. By leveraging Generative Adversarial Networks (GANs), combined with advanced encryption techniques and structural modifications of Portable Executable (PE) files, we generate highly obfuscated malware capable of evading conventional detection mechanisms. These malicious payloads are engineered for stealth, enabling seamless reconstruction and execution on target systems with minimal user interaction, while remaining undetected by over 90% of existing antivirus and endpoint security solutions. The residual detection rate is largely attributable to encryption heuristics rather than behavioral indicators. We also underscore the often-overlooked role of executable author privileges in facilitating unauthorized access through privilege-aware execution flows. To mitigate these risks, we present an innovative defense framework that enhances endpoint protection and strengthens the resilience of digital infrastructure against advanced obfuscation-based threats. Our approach is validated through the development of a custom image-based malware dataset, enabling both visual and behavioral analysis of obfuscated samples, and offering a new paradigm for malware research and cybersecurity defenses.

publication date

  • January 1, 2026

Digital Object Identifier (DOI)

start page

  • 12605

end page

  • 12627

volume

  • 14