International Journal of Neural Network, 2025, 4(1); doi: 10.38007/NN.2025.040108.
Yihong Zou
Amazon Data Services, Inc, Intent Driven Network, Cupertino, California, 95014, United States
With the continuous advancement of technology, malicious code has become a major challenge in the field of network security, seriously threatening data confidentiality, normal system operation, and personal privacy protection. Existing detection technologies face problems such as insufficient identification of obfuscated code, adversarial sample interference, and excessive reliance on feature libraries leading to false negatives when dealing with complex and diverse malicious code, making it difficult to effectively prevent increasingly complex network threats. This article starts with the harm of malicious code and elaborates on its negative effects in areas such as information leakage and property damage. It also compares the advantages and disadvantages of static and dynamic detection techniques and explores their limitations in application. On this basis, an optimization path is proposed, including building a framework that combines static and dynamic analysis, using artificial intelligence to achieve intelligent detection, strengthening threat intelligence sharing and collaboration, and enhancing behavior analysis and real-time monitoring of unknown malicious code, opening up new directions for enhancing the detection efficiency of network security.
Malicious code detection; Network security; Artificial intelligence; Threat intelligence; Comprehensive detection framework
Yihong Zou. Exploration of the Application of Malicious Code Detection in Network Security. International Journal of Neural Network (2025), Vol. 4, Issue 1: 65-72. https://doi.org/10.38007/NN.2025.040108.
[1] Geetha C, Ramakrishnan M. Replica Node Attack Detection Approaches in Static WSNs. Përparimet në shkencat kompjuterike dhe teknologjinë, 2023, 16(2):141-150.
[2] Marc Chalé, Cox B, Weir J, et al. Optimizim i kufizuar bazuar në gjenerimin e shembullit kundërshtar për sulmet e transferimit në sistemet e zbulimit të intrusioneve në rrjet. Optimization Letters, 2024, 18(9):2169-2188.
[3] Gjetjet nga Universiteti i Teksasit San Antonio Update Knowledge of Information Security (Image-based Malware Representation Approach with Efficientnet Convolutional Neural Networks for Effective Malware Classification). Network Daily News, 2022(26):31-32.
[4] Hulumtuesit e Universitetit Nagoya përshkruajnë kërkimet në teknologjinë e rrjetit (Malware Detection by Control-Flow Graph Level Representation Learning with Graph Isomorphism Network). Network Daily News, 2022(14):34-34.
[5] Landauer M, Skopik F, Frank M, et al. Dataset loge të mirëmbajtura për vlerësimin e sistemeve të zbulimit të intrusioneve. IEEE transactions on dependable and secure computing, 2023(4):20.
[6] Zhu, P. (2025). The Role and Mechanism of Deep Statistical Machine Learning In Biological Target Screening and Immune Microenvironment Regulation of Asthma. arXiv preprint arXiv:2511. 05904.
[7] Liu, B. (2025). Design and Implementation of Data Acquisition and Analysis System for Programming Debugging Process Based On VS Code Plug-In. arXiv preprint arXiv:2511. 05825.
[8] Chang, Chen-Wei. "Compiling Declarative Privacy Policies into Runtime Enforcement for Cloud and Web Infrastructure.” (2025).
[9] Sun, Jiahe. "Research on Sentiment Analysis Based on Multi-source Data Fusion and Pre-trained Model Optimization in Quantitative Finance.” (2025).
[10] F. Liu, "Architecture and Algorithm Optimization of Realtime User Behavior Analysis System for Ecommerce Based on Distributed Stream Computing,” 2025 International Conference on Intelligent Communication Networks and Computational Techniques (ICICNCT), Bidar, India, 2025, pp. 1-8.
[11] F. Liu, "Transformer XL Long Range Dependency Modeling and Dynamic Growth Prediction Algorithm for E-Commerce User Behavior Sequence,” 2025 2nd International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS), Hassan, India, 2025, pp. 1-6.
[12] K. Zhang, "Optimization and Performance Analysis of Personalized Sequence Recommendation Algorithm Based on Knowledge Graph and Long Short Term Memory Network,” 2025 2nd International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS), Hassan, India, 2025, pp. 1-6.
[13] Su H, Luo W, Mehdad Y, et al. Llm-friendly knowledge representation for customer support[C]//Proceedings of the 31st International Conference on Computational Linguistics: Industry Track. 2025: 496-504.
[14] Q. Hu, "Research on Dynamic Identification and Prediction Model of Tax Fraud Based on Deep Learning,” 2025 2nd International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS), Hassan, India, 2025, pp. 1-6.
[15] D. Shen, "Complex Pattern Recognition and Clinical Application of Artificial Intelligence in Medical Imaging Diagnosis, " 2025 International Conference on Intelligent Communication Networks and Computational Techniques (ICICNCT), Bidar, India, 2025, pp. 1-8.
[16] Chen M. Research on Automated Risk Detection Methods in Machine Learning Integrating Privacy Computing. 2025.
[17] Ding, J. (2025). Intelligent Sensor and System Integration Optimization of Auto Drive System. International Journal of Engineering Advances, 2(3), 124-130.
[18] Mingjie Chen. (2025). Exploration of the Application of the LINDDUN Model in Privacy Protection for Electric Vehicle Users. Engineering Advances, 5(4), 160-165.
[19] Liu, X. (2025). Research on Real-Time User Feedback Acceleration Mechanism Based on Genai Chatbot. International Journal of Engineering Advances, 2(3), 109-116.
[20] Zhang, M. (2025). Research on Collaborative Development Mode of C# and Python in Medical Device Software Development. Journal of Computer, Signal, and System Research, 2(7), 25-32.