Behavioral analysis of malware using sandboxing techniques

Pokhrel, Ramesh Prasad (2025) Behavioral analysis of malware using sandboxing techniques. International Journal of Science and Research Archive, 15 (3). pp. 582-586. ISSN 2582-8185

[thumbnail of IJSRA-2025-1781.pdf] Article PDF
IJSRA-2025-1781.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download ( 484kB)

Abstract

This research paper investigates the dynamic behavioral analysis of Windows-based Portable Executable (PE) malware samples using sandboxing techniques. The study focuses on comparing various sandboxing methodologies with an emphasis on their ability to detect sophisticated malware behaviors in a controlled environment. In particular, techniques such as the incorporation of realistic user behavior emulation and the integration of machine learning with sandbox environments are examined. The methodology involves deploying agent-based and agent-less sandbox systems to monitor malware execution and capturing system interactions. The results underscore the effectiveness of advanced sandboxing techniques in mitigating evasion tactics deployed by modern malware. Moreover, the paper discusses recent trends that integrate artificial intelligence to further enhance detection accuracy. Overall, the paper asserts that while agent-based approaches generally perform better in terms of comprehensive behavior capture, the evolution in sandboxing designs, notably with user behavior emulation and machine learning integration, significantly improves malware detection outcomes.

Item Type: Article
Official URL: https://doi.org/10.30574/ijsra.2025.15.3.1781
Uncontrolled Keywords: Sandbox Analysis; Behavioral Malware Analysis; Windows PE Malware; Dynamic Analysis; User Behavior Emulation; Machine Learning; Malware Evasion; Cybersecurity
Depositing User: Editor IJSRA
Date Deposited: 27 Jul 2025 13:36
Related URLs:
URI: https://eprint.scholarsrepository.com/id/eprint/2249