ORIGINAL RESEARCH article

Front. Big Data

Sec. Data Science

A Blockchain-Based Framework for Malware Detection Using Behavioral Artifact Analysis

  • 1. Centre for Remote Sensing and Geoinformatics, Sathyabama University, Chennai, India

  • 2. JAIN (Deemed-to-be University), Bengaluru, India

  • 3. Marudhar Kesari Jain College for Women, Vaniyambadi, India

The final, formatted version of the article will be published soon.

Abstract

Through the analysis of runtime behaviours such as file system operations, network activity, and API requests, machine learning can be used to discover behavioural artefacts, including those left by malware. Patterns suggestive of malicious activity can then be found using algorithms. Using a range of methods, numerous malware detection strategies have been presented in the past ten years. Most of the time, network-based threats like DDoS attacks are recognised threats to network security. This research proposes novel method in web monitoring based behavioral artifacts analysis for malware detection using blockchain architecture and structure learning method. Input is collected as monitored web data and processed for noise removal and normalization. Then this data has been analysed for detection of malware attacks using reinforcement structure learning based Quantile regression with adversarial neural networks. the output gives classified malware attacks and network monitoring has been carried out using decentralized contract based blockchain encryption model. Simulation results revealed that the proposed method performed with an accuracy of 97 %, an F1-score of 96 %, and a mean average precision of 95 % for web-based behavioral data sets.

Summary

Keywords

adversarial neural networks, Behavioral Artifact Analysis, Blockchain-based security, Malware detection, structure learning

Received

02 February 2026

Accepted

03 April 2026

Copyright

© 2026 M and T. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Gowri M

Disclaimer

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.

Outline

Share article

Article metrics