Research Article | Open Access | Download PDF
Volume 16 | Issue 1 | Year 2026 | Article Id. IJPTT-V16I1P401 | DOI : https://doi.org/10.14445/22492615/IJPTT-V16I1P401A Critical Analysis of Different Malware Analysis Techniques and How They Can Be Incorporated into the Process of Cyber Kill Chain to Enhance the Overall Effectiveness
Kultar Singh
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 06 Feb 2026 | 12 Mar 2026 | 29 Mar 2026 | 13 Apr 2026 |
Citation :
Kultar Singh, "A Critical Analysis of Different Malware Analysis Techniques and How They Can Be Incorporated into the Process of Cyber Kill Chain to Enhance the Overall Effectiveness," International Journal of P2P Network Trends and Technology (IJPTT), vol. 16, no. 1, pp. 1-7, 2026. Crossref, https://doi.org/10.14445/22492615/IJPTT-V16I1P401
Abstract
In order to improve overall cybersecurity efficacy, this research study seeks to critically assess a variety of malware analysis methodologies and investigate how they might be integrated into the Cyber Kill Chain framework. This study examines both established and novel techniques for analyzing malware, evaluates their advantages and disadvantages, and suggests tactical points of integration for the Cyber Kill Chain. Organizations can strengthen their defenses against complex cyberattacks by combining these components.
Keywords
Cyber Security, Cyber Kill Chain, Analyzing Malware, Organization, Cyber Attack.
References
[1] Yussuf Ahmed, A. Taufiq Asyhari, and Md. Arafatur Rahman, “Cyber Kill Chain Approach for Detecting Advanced Persistent
Threats,” Computers, Materials & Continua, vol. 67, no. 4, pp. 2497-2513, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Francis Kwesi Aidoo, “End Users Security Awareness Campaign from Information Security Threats, Vulnerabilities and Concurrent
Cyber-Attacks,” Texila International Journal of Academic Research, vol. 4 no. 2, pp. 195-201, 2019.
[CrossRef] [Google Scholar]
[Publisher Link]
[3] M. Akbanov, V.G. Vassilakis, and M.D. Logothetis, “WannaCry Ransomware: Analysis of Infection, Persistence, Recovery Prevention
and Propagation Mechanisms,” Journal of Telecommunications and Information Technology, 2019.
[Google Scholar]
[4] Mohammad Aljaidi et al., “NHS WannaCry Ransomware Attack: Technical Explanation of The Vulnerability, Exploitation, and
Countermeasures,” International Engineering Conference on Electrical, Energy, and Artificial Intelligence, pp. 1-6, 2022.
[CrossRef]
[Google Scholar] [Publisher Link]
[5] Şerif Bahtiyar, Mehmet Barış Yaman, and Can Yılmaz Altıniğne, “A Multi-Dimensional Machine Learning Approach to Predict
Advanced Malware,” Computer Networks, vol. 160, pp. 118-129, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Alejandro Chuquilla, Teresa Guarda, and Geovanni Ninahualpa Quiña, “Ransomware - WannaCry Security is Everyone’s,” 14th Iberian
Conference on Information Systems and Technologies, pp. 1-4, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Tooska Dargahi et al., “A Cyber-Kill-Chain Based Taxonomy of Crypto-Ransomware Features,” Journal of Computer Virology and
Hacking Techniques, vol. 15 no. 4, pp. 277-305, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Nitul Dutta et al., “Introduction to Malware Analysis,” Cyber Security: Issues and Current Trends, pp. 129-141, 2021.
[CrossRef]
[Google Scholar] [Publisher Link]
[9] Kristian Haga, Per Håkon Meland, and Guttorm Sindre, “Breaking the Cyber Kill Chain by Modelling Resource Costs,” Graphical
Models for Security, pp. 111-126, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Romuald Hoffmann, “Markov Models of Cyber Kill Chains with Iterations,” International Conference on Military Communications and
Information Systems, pp. 1-6, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Reyhaneh Hosseini Nejad et al., “A Cyber Kill Chain Based Analysis of Remote Access Trojans,” Handbook of Big Data and IoT
Security, pp. 273-299, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Mamoona Humayun et al., “Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study,” Arabian Journal for Science
and Engineering, vol. 45, no. 1, pp. 3171-3189, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Da-Yu Kao, Shou-Ching Hsiao, and Raylin Tso, “Analyzing WannaCry Ransomware Considering the Weapons and Exploits,” 21st
International Conference on Advanced Communication Technology, pp. 1098-1107, 2019.
[CrossRef] [Google Scholar] [Publisher
Link]
[14] Ilker Kara, “A Basic Malware Analysis Method,” Computer Fraud & Security, vol. 2019 no. 6, pp. 11-19, 2019.
[CrossRef] [Google
Scholar] [Publisher Link]
[15] Andrew McDole et al., “Deep Learning Techniques for Behavioral Malware Analysis in Cloud IaaS,” Malware Analysis Using Artificial
Intelligence and Deep Learning, pp. 269-285, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Serena McDonnell et al., “CyberBERT: A Deep Dynamic-State Session-Based Recommender System for Cyber Threat Recognition,”
IEEE Aerospace Conference, pp. 1-12, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Qublai K. Ali Mirza et al., “Ransomware Analysis using Cyber Kill Chain,” 8th International Conference on Future Internet of Things
and Cloud, pp. 58-65, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Pooneh Nikkhah Bahrami et al., “Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics,
Techniques, and Procedures,” Journal of Information Processing Systems, vol. 15, no. 4, pp. 865-889, 2019. [CrossRef] [Google
Scholar] [Publisher Link]
[19] Ori Or-Meir et al., “Dynamic Malware Analysis in the Modern Era—A State of the Art Survey,” ACM Computing Surveys, vol. 52, no.
5, pp. 1-48, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[20] S. Sibi Chakkaravarthy, D. Sangeetha, and V. Vaidehi, “A Survey on Malware Analysis and Mitigation Techniques,” Computer Science
Review, vol. 32, pp. 1-23, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Clare Stevens, “Assembling Cybersecurity: The Politics and Materiality of Technical Malware Reports and the Case of Stuxnet,”
Contemporary Security Policy, vol. 41, no. 1, pp. 129-152, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Jeremy Straub, “Modeling Attack, Defense and Threat Trees and the Cyber Kill Chain, ATT amp;CK and STRIDE Frameworks as
Blackboard Architecture Networks,” IEEE International Conference on Smart Cloud (SmartCloud), pp. 148-153, 2020.
[CrossRef]
[Google Scholar] [Publisher Link]
[23] Jun Zengy et al., “SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records,” IEEE
Symposium on Security and Privacy, pp. 489-506, 2022.
[CrossRef] [Google Scholar] [Publisher Link]