Research Article | Open Access | Download PDF
Volume 16 | Issue 1 | Year 2026 | Article Id. IJPTT-V16I1P401 | DOI : https://doi.org/10.14445/22492615/IJPTT-V16I1P401A Critical Analysis of Different Malware Analysis Techniques and How They Can Be Incorporated into the Process of Cyber Kill Chain to Enhance the Overall Effectiveness
Kultar Singh
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 06 Feb 2026 | 12 Mar 2026 | 29 Mar 2026 | 13 Apr 2026 |
Citation :
Kultar Singh, "A Critical Analysis of Different Malware Analysis Techniques and How They Can Be Incorporated into the Process of Cyber Kill Chain to Enhance the Overall Effectiveness," International Journal of P2P Network Trends and Technology (IJPTT), vol. 16, no. 1, pp. 1-7, 2026. Crossref, https://doi.org/10.14445/22492615/IJPTT-V16I1P401
Abstract
In order to improve overall cybersecurity efficacy, this research study seeks to critically assess a variety of malware analysis methodologies and investigate how they might be integrated into the Cyber Kill Chain framework. This study examines both established and novel techniques for analyzing malware, evaluates their advantages and disadvantages, and suggests tactical points of integration for the Cyber Kill Chain. Organizations can strengthen their defenses against complex cyberattacks by combining these components.
Keywords
Cyber Security, Cyber Kill Chain, Analyzing Malware, Organization, Cyber Attack.
References
[1] Yussuf Ahmed, A. Taufiq Asyhari, and Md. Arafatur
Rahman, “Cyber Kill Chain Approach
for Detecting Advanced Persistent Threats,” Computers, Materials & Continua, vol. 67, no. 4, pp. 2497-2513, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Francis Kwesi Aidoo, “End Users Security
Awareness Campaign from Information Security Threats, Vulnerabilities and
Concurrent Cyber-Attacks,” Texila International Journal of Academic Research, vol. 4 no. 2, pp. 195-201, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[3] M. Akbanov, V.G. Vassilakis, and M.D. Logothetis, “WannaCry
Ransomware: Analysis of Infection, Persistence, Recovery Prevention and
Propagation Mechanisms,” Journal
of Telecommunications and Information Technology, 2019.
[Google Scholar]
[4] Mohammad Aljaidi et al., “NHS
WannaCry Ransomware Attack: Technical Explanation of The Vulnerability, Exploitation,
and Countermeasures,” International
Engineering Conference on Electrical, Energy, and Artificial Intelligence, pp. 1-6, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Şerif Bahtiyar, Mehmet Barış Yaman, and Can Yılmaz
Altıniğne, “A
Multi-Dimensional Machine Learning Approach to Predict Advanced Malware,” Computer Networks, vol. 160, pp. 118-129, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Alejandro Chuquilla, Teresa Guarda, and Geovanni
Ninahualpa Quiña, “Ransomware - WannaCry Security is Everyone’s,” 14th
Iberian Conference on Information Systems and Technologies, pp. 1-4, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Tooska Dargahi et al., “A Cyber-Kill-Chain Based Taxonomy of
Crypto-Ransomware Features,” Journal of Computer Virology and Hacking
Techniques, vol. 15 no. 4, pp. 277-305, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Nitul Dutta et al., “Introduction to Malware
Analysis,” Cyber
Security: Issues and Current Trends, pp. 129-141, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Kristian Haga, Per Håkon Meland, and Guttorm Sindre, “Breaking the Cyber Kill
Chain by Modelling Resource Costs,” Graphical Models for Security, pp. 111-126, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Romuald Hoffmann, “Markov
Models of Cyber Kill Chains with Iterations,” International Conference on
Military Communications and Information Systems, pp. 1-6, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Reyhaneh Hosseini Nejad et al., “A Cyber Kill Chain Based
Analysis of Remote Access Trojans,” Handbook of Big Data and IoT Security, pp. 273-299, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Mamoona Humayun et al., “Cyber Security Threats and
Vulnerabilities: A Systematic Mapping Study,” Arabian Journal for Science and
Engineering,
vol. 45, no. 1, pp. 3171-3189,
2020.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Da-Yu Kao, Shou-Ching Hsiao, and Raylin Tso, “Analyzing WannaCry
Ransomware Considering the Weapons and Exploits,” 21st
International Conference on Advanced Communication Technology,
pp. 1098-1107, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Ilker Kara, “A Basic Malware Analysis Method,” Computer Fraud & Security, vol. 2019 no. 6, pp. 11-19, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Andrew McDole et al., “Deep Learning Techniques
for Behavioral Malware Analysis in Cloud IaaS,” Malware Analysis Using
Artificial Intelligence and Deep Learning, pp. 269-285, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Serena McDonnell et al., “CyberBERT: A Deep
Dynamic-State Session-Based Recommender System for Cyber Threat Recognition,” IEEE Aerospace Conference, pp. 1-12,
2021.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Qublai K. Ali Mirza et al., “Ransomware Analysis using
Cyber Kill Chain,” 8th International Conference
on Future Internet of Things and Cloud, pp. 58-65, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Pooneh Nikkhah Bahrami et al., “Cyber Kill Chain-Based
Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques,
and Procedures,” Journal of
Information Processing Systems, vol. 15, no. 4, pp. 865-889, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Ori Or-Meir et al., “Dynamic Malware Analysis in the Modern
Era—A State of the Art Survey,” ACM Computing Surveys, vol. 52, no. 5, pp. 1-48, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[20] S. Sibi Chakkaravarthy, D. Sangeetha, and V.
Vaidehi, “A
Survey on Malware Analysis and Mitigation Techniques,” Computer Science Review, vol. 32, pp. 1-23, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Clare Stevens, “Assembling Cybersecurity:
The Politics and Materiality of Technical Malware Reports and the Case of
Stuxnet,” Contemporary
Security Policy, vol. 41, no. 1, pp. 129-152, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Jeremy Straub, “Modeling
Attack, Defense and Threat Trees and the Cyber Kill Chain, ATT amp;CK and
STRIDE Frameworks as Blackboard Architecture Networks,” IEEE International Conference on Smart Cloud
(SmartCloud), pp. 148-153, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Jun Zengy et al., “SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System
Audit Records,” IEEE Symposium on Security
and Privacy,
pp. 489-506, 2022.
[CrossRef] [Google Scholar] [Publisher Link]