ORIGINAL RESEARCH article
Front. Big Data
Sec. Data Science
A Blockchain-Based Framework for Malware Detection Using Behavioral Artifact Analysis
- GM
Gowri M 1
- ST
Sasikala T 2,3
1. Centre for Remote Sensing and Geoinformatics, Sathyabama University, Chennai, India
2. JAIN (Deemed-to-be University), Bengaluru, India
3. Marudhar Kesari Jain College for Women, Vaniyambadi, India
Select one of your emails
You have multiple emails registered with Frontiers:
Notify me on publication
Please enter your email address:
If you already have an account, please login
You don't have a Frontiers account ? You can register here
Abstract
Through the analysis of runtime behaviours such as file system operations, network activity, and API requests, machine learning can be used to discover behavioural artefacts, including those left by malware. Patterns suggestive of malicious activity can then be found using algorithms. Using a range of methods, numerous malware detection strategies have been presented in the past ten years. Most of the time, network-based threats like DDoS attacks are recognised threats to network security. This research proposes novel method in web monitoring based behavioral artifacts analysis for malware detection using blockchain architecture and structure learning method. Input is collected as monitored web data and processed for noise removal and normalization. Then this data has been analysed for detection of malware attacks using reinforcement structure learning based Quantile regression with adversarial neural networks. the output gives classified malware attacks and network monitoring has been carried out using decentralized contract based blockchain encryption model. Simulation results revealed that the proposed method performed with an accuracy of 97 %, an F1-score of 96 %, and a mean average precision of 95 % for web-based behavioral data sets.
Summary
Keywords
adversarial neural networks, Behavioral Artifact Analysis, Blockchain-based security, Malware detection, structure learning
Received
02 February 2026
Accepted
03 April 2026
Copyright
© 2026 M and T. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
*Correspondence: Gowri M
Disclaimer
All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.