Deep Learning Approach for Malware Classification and Threat Intelligence in Hospital Management

Main Article Content

Md Mashfiquer Rahman https://orcid.org/0009-0004-2174-6714
Md Mosiur Rahman
Sharmin Nahar
Md Mostafijur Rahman
Md Mostafizur Rahman https://orcid.org/0009-0007-2022-8677
Md Shahadat Hossain

Keywords

Deep learning, Malware classification, Threat intelligence, Hospital management systems, Healthcare cybersecurity, nternet of Medical Things (IoMT)

Abstract

The growing dependence on digital systems in hospital administration has increased exposure to malware attacks, thereby jeopardizing patient safety and data integrity. To improve healthcare cybersecurity, this paper suggests a deep learning approach for malware classification and integrated threat intelligence. For feature extraction, convolutional neural networks are used; for temporal behavior analysis, recurrent neural networks are applied; and an attention mechanism sorts high-risk threats. Superior detection accuracy, precision, and recall were attained with the framework using a hybrid dataset combining simulated malware samples with anonymized hospital system logs over those of traditional machine learning techniques. Moreover, a threat intelligence layer helps proactive defensive techniques by classifying malware families and tracking evolving attack vectors. The findings show that artificial intelligence can provide dependable, scalable, and adaptive protection for hospital information systems. The research offers both a methodological improvement in malware detection and a practical method of integrating threat intelligence into healthcare management, thereby ensuring continuity of clinical services and compliance with security requirements.

Downloads

Download data is not yet available.

Abstract 22 | PDF Downloads 3

References

1.Xiao, P. Malware cyber threat intelligence system for internet of things (IoT) using machine learning. J Cyber Secur Mobil. 2024;13(1):53–89. https://doi.org/10.13052/jcsm2245-1439.1313.
2.Ravi, V., Pham, T.D., Alazab, M. Attention-based multidimensional deep learning approach for cross-architecture IoMT malware detection and classification in healthcare cyber-physical systems. IEEE Trans Comput Social Syst. 2022;10(4):1597–1606. https://doi.org/10.1109/TCSS.2022.3198123.
3.Haque, N.I., Rahman, M.A., Shahriar, M.H., et al. A novel framework for threat analysis of machine learning-based smart healthcare systems. 2021; arXiv preprint:arXiv:2103.03472. https://doi.org/10.48550/arXiv.2103.03472.
4.Sarker, I.H., Khan, A.I., Abushark, Y.B.,et al. Internet of things (IoT) security intelligence: a comprehensive overview, machine learning solutions and research directions. Mob Netw Appl. 2023;28(1):296–312. https://doi.org/10.1007/s11036-022-01937-32023.
5.Kritika, E.A. comprehensive literature review on ransomware detection using deep learning. Cyber Secur Appl. 2025;3:100078. https://doi.org/10.1016/j.csa.2024.100078.
6.Fraley, J. B., Cannady, J. The promise of machine learning in cybersecurity. In Proceedings of IEEE SoutheastCon. SoutheastCon 2017, Concord, NC, USA, 2017. March 30 – April 02, 2017:1–6 https://doi.org/10.1109/SECON.2017.7925283.
7.Hussain, F., Hussain, R., Hassan, S.A., et al. Machine learning in IoT security: current solutions and future challenges. IEEE Communications Surveys & Tutorials. 2020;22(3):1686–1721. https://doi.org/10.1109/COMST.2020.2986444.
8.Santos, P., Abreu, R., Reis, M.J., et al. A systematic review of cyber threat intelligence: the effectiveness of technologies, strategies, and collaborations in combating modern threats. Sensors.2025;25(14):4272. https://doi.org/10.3390/s25144272.
9.Rawat, R., Sarangi, S.K., Rimal, Y.N., et al. Malware threat affecting financial organization analysis using machine learning approach. Int J Inform Technol Web Eng (IJITWE).2022;17(1):1–20. https://doi.org/10.4018/IJITWE.304051.
10.Pemmasani, P.K. AI in national security: leveraging machine learning for threat intelligence and response. Computertech. 2023;9(1):1–10.
11.Suryotrisongko, H., Musashi, Y., Tsuneda, A., et al. Robust botnet DGA detection: blending XAI and OSINT for cyber threat intelligence sharing. IEEE Access. 2022;10:34613–34624. https://doi.org/10.1109/ACCESS.2022.3162588.
12.Ampel, B.M., Samtani, S., Zhu, H., et al. Creating proactive cyber threat intelligence with hacker exploit labels: a deep transfer learning approach. MIS Quart. 2024;48(1):137–166. https://doi.org/10.25300/MISQ/2023/17316.
13.Vinayakumar, R., Soman, K.P., Poornachandran, P. Detecting malicious domain names using deep learning approaches at scale. J Intell Fuzzy Syst. 2018;34(3):1355–1367. https://doi.org/10.3233/JIFS-169431.
14.Kattamuri, S.J., Penmatsa, R.K.V., Chakravarty, S., et al. Swarm optimization and machine learning applied to PE malware detection towards cyber threat intelligence. Electronics. 2023;12(2):342. https://doi.org/10.3390/electronics12020342.
15.Venkatasubramanian, M., Lashkari, A.H., Hakak, S. IoT malware analysis using federated learning: a comprehensive survey. IEEE Access. 2023;11:5004–5018. https://doi.org/10.1109/ACCESS.2023.3235389.
16.Arisoy, M.V. Trends in malware detection in IoHT using deep learning: a review. In Practical Artificial Intelligence for Internet of Medical Things; Soufiene, B.O., Chakraborty, C., et al., eds. CRC Press: Boca Raton, FL; 2023; pp. 127–150. https://doi.org/10.1201/9781003315476-7.
17.Islam, M.T., Ahmad, S., Rahman, M.A., et al. Neural network–based risk prediction and simulation framework for medical IOT cybersecurity: an engineering management model for smart hospitals. Int J Sci Interdiscip Res. 2024;5(2):30–57. https://doi.org/10.63125/g0mvct35.
18.Manoharan, A., Sarker, M. Revolutionizing cybersecurity: unleashing the power of artificial intelligence and machine learning for next-generation threat detection. Int Res J Modern Eng Technol Sci. 2023;04(12):2151–2164. https://doi.org/10.56726/IRJMETS32644.
19.Camilo, R., Yuki, S., Eleanor, B. AI-driven threat intelligence: enhancing cybersecurity in modern software systems. J Adapt Learn Technol. 2024;1(8):53–68. Available online: http://eprints.umsida.ac.id/id/eprint/16393.
20.Samtani, S., Abate, M., Benjamin, V., et al. Cybersecurity as an industry: a cyber threat intelligence perspective. In The Palgrave Handbook of International Cybercrime and Cyberdeviance; Holt, T.J., Bossler, A.M., eds. Palgrave Macmillan: Cham, Switzerland; 2019; pp. 1–20. https://doi.org/10.1007/978-3-319-90307-1_8-1.
21.Ebrahimi, M., Nunamaker Jr, J.F., Chen, H. Semi-supervised cyber threat identification in dark net markets: a transductive and deep learning approach. J Manag Inform Syst. 2020;37(3):694–722. https://doi.org/10.1080/07421222.2020.1790186.
22.Alexander, C.A., Wang, L. Assessing cyber intelligence, learning, and automation capabilities. J Appl Inform Sci. 2024;12(2):33. Available online: http://www.publishingindia.com/jais/71/assessing-cyber-intelligence-learning-and-automation-capabilities/32170/87744/.
23.Chen, J., Wu, D., Xie, R. Artificial intelligence algorithms for cyberspace security applications: a technological and status review. Front Inform Technol Electron Eng. 2023;24(8):1117–1142. https://doi.org/10.1631/FITEE.2200314.
24.Silvestri, S., Islam, S., Amelin, D., et al. Cyber threat assessment and management for securing healthcare ecosystems using natural language processing. Int J Inform Security. 2024;23(1):31–50. https://doi.org/10.1007/s10207-023-00769-w.
25.Silvestri, S., Islam, S., Papastergiou, S., et al. A machine learning approach for the NLP-based analysis of cyber threats and vulnerabilities of the healthcare ecosystem. Sensors. 2023; 23(2):651. https://doi.org/10.3390/s23020651.
26.Rahman, M., Ullah, S., Nahar, S., et al. The role of explainable AI in cyber threat intelligence: enhancing transparency and trust in security systems. World J Adv Res Rev. 2024;23(2):2897–2907. https://doi.org/10.30574/wjarr.2024.23.2.2404.
27.Fatema, K., Fiza, M.F.A., Hossain, M.S., et al. AI-driven phishing attack and threat detection and mitigation. World J Adv Eng Technol Sci. 2026;18(01):078–088. https://doi.org/10.30574/wjaets.2026.18.1.0007.
28.Mathews, S.M. Explainable artificial intelligence applications in NLP, biomedical, and malware classification: a literature review. In: Intelligent Computing – Proceedings of the Computing Conference. Springer: Cham, Switzerland; 2019; pp. 1269–1292. https://doi.org/10.1007/978-3-030-22868-2_90.
29.Shallom, K., Ikemefuna, C.D. Enhancing malware detection using federated learning and explainable AI for privacy-preserving threat intelligence. World J Adv Res Rev. 2025;27(01):331–351. https://doi.org/10.30574/wjarr.2025.27.1.2541.
30.Gaurav, A., Gupta, B.B., Panigrahi, P.K. A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system. Enterp Inform Syst. 2023;17(3):2023764. https://doi.org/10.1080/17517575.2021.2023764.
31.Rahman, M.M., Dhakal, K., MD. N. G., et al.. AI integration in cybersecurity software: threat detection and response. Int J Innov Res Sci Stud. 2025;8(3):3907–3921. https://doi.org/10.53894/ijirss.v8i3.7403.
32.Odedina, E.A. Integrating AI-driven threat intelligence into healthcare cyber risk assessments. Int J Eng Technol Res Manag. 2022, Aug;06(08):84–94. Available online: https://ijetrm.com/issues/files/May-2022-05-1746454250-August2022093.pdf.
33.Ullah, F., Naeem, H., Jabbar, S., et al. Cyber security threats detection in internet of things using deep learning approach. IEEE Access. 2019;7:124379–124389. https://doi.org/10.1109/ACCESS.2019.2937347.
34.Papaioannou, M., Karageorgou, G., Mantas, G., et al. A survey on security threats and countermeasures in internet of medical things (IoMT). Trans Emerg Telecommun Technol. 2022;33(6):e4049. https://doi.org/10.1002/ett.4049.
35.Kumar, P., Gowda, D.Y., Prakash, A.M. Machine learning in cybersecurity: a comprehensive survey of data breach detection, cyber-attack prevention, and fraud detection. In Pioneering Smart Healthcare 5.0 with IoT, Federated Learning, and Cloud Security; Hassan, A., Prasad, V.K., Bhattacharya, P., et al., eds.; Medical Info Science Reference: Hershey, PA; 2024; pp. 175–197. https://doi.org/10.4018/979-8-3693-2639-8.ch011.
36.VirusShare. VirusShare.com—Because Sharing is Caring. Available online: https://virusshare.com.
37.VirusTotal. VirusTotal—Analyse Suspicious Files and URLs. Google LLC. Available online: https://www.virustotal.com.
38.Anderson, H.S., Roth, P. EMBER: an open dataset for training static PE malware machine learning models. arXiv preprint arXiv:1804.04637. 2018. https://doi.org/10.48550/arXiv.1804.04637.
39.Rahman, M.M., Nahar, S., Rahman, M.M., et al. A novel AI model for improved phishing detection accuracy: a hybrid approach. J Cybersecur Digit Forensics Jurispr. 2025;1:21–27. https://doi.org/10.65879/3070-5789.2025.01.03.
40.Alhawi, O.M., Baldwin, J., Dehghantanha, A. Leveraging machine learning techniques for windows ransomware network traffic detection. In Cyber Threat Intelligence; Jajodia, S., Samarati, P., Lopez, J., et al., eds. Springer: Cham, Switzerland; 2018; pp. 93–106. https://doi.org/10.1007/978-3-319-73951-9_5.
41.Admass, W.S., Munaye, Y.Y., Diro, A.A. Cyber security: state of the art, challenges and future directions. Cyber Secur Appl. 2024;2:100031. https://doi.org/10.1016/j.csa.2023.100031.
42.Pemmasani, P.K., Okara, C. Machine learning models for predicting ransomware attacks on critical public health infrastructure: a cross-national study. Metascience. 2024;2(2):75–85. Available online: https://yuktabpublisher.com/index.php/TMS/article/view/238.
43.Katiyar, N., Tripathi, M.S., Kumar, M.P., et al. AI and cyber-security: enhancing threat detection and response with machine learning. Edu Admin Theory Pract. 2024;30(4):6273–6282. https://doi.org/10.53555/kuey.v30i4.2377.
44.Khan, M.M., Alkhathami, M. Anomaly detection in IoT-based healthcare: machine learning for enhanced security. Sci Rep. 2024;14:5872. https://doi.org/10.1038/s41598-024-56126-x.
45.Dwork, C., Roth, A. The algorithmic foundations of differential privacy. Found Trends Theor Comput Sci. 2014;9(3–4):211–407. https://doi.org/10.1561/0400000042.