International Journal of P2P
Network Trends and Technology

Research Article | Open Access | Download PDF
Volume 16 | Issue 1 | Year 2026 | Article Id. IJPTT-V16I1P401 | DOI : https://doi.org/10.14445/22492615/IJPTT-V16I1P401

A Critical Analysis of Different Malware Analysis Techniques and How They Can Be Incorporated into the Process of Cyber Kill Chain to Enhance the Overall Effectiveness


Kultar Singh

Received Revised Accepted Published
06 Feb 2026 12 Mar 2026 29 Mar 2026 13 Apr 2026

Citation :

Kultar Singh, "A Critical Analysis of Different Malware Analysis Techniques and How They Can Be Incorporated into the Process of Cyber Kill Chain to Enhance the Overall Effectiveness," International Journal of P2P Network Trends and Technology (IJPTT), vol. 16, no. 1, pp. 1-7, 2026. Crossref, https://doi.org/10.14445/22492615/IJPTT-V16I1P401

Abstract

In order to improve overall cybersecurity efficacy, this research study seeks to critically assess a variety of malware analysis methodologies and investigate how they might be integrated into the Cyber Kill Chain framework. This study examines both established and novel techniques for analyzing malware, evaluates their advantages and disadvantages, and suggests tactical points of integration for the Cyber Kill Chain. Organizations can strengthen their defenses against complex cyberattacks by combining these components.

Keywords

Cyber Security, Cyber Kill Chain, Analyzing Malware, Organization, Cyber Attack.

References

[1] Yussuf Ahmed, A. Taufiq Asyhari, and Md. Arafatur Rahman, “Cyber Kill Chain Approach for Detecting Advanced Persistent Threats,” Computers, Materials & Continua, vol. 67, no. 4, pp. 2497-2513, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Francis Kwesi Aidoo, “End Users Security Awareness Campaign from Information Security Threats, Vulnerabilities and Concurrent Cyber-Attacks,” Texila International Journal of Academic Research, vol. 4 no. 2, pp. 195-201, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[3] M. Akbanov, V.G. Vassilakis, and M.D. Logothetis, “WannaCry Ransomware: Analysis of Infection, Persistence, Recovery Prevention and Propagation Mechanisms,” Journal of Telecommunications and Information Technology, 2019.
[Google Scholar]
[4] Mohammad Aljaidi et al., “NHS WannaCry Ransomware Attack: Technical Explanation of The Vulnerability, Exploitation, and Countermeasures,” International Engineering Conference on Electrical, Energy, and Artificial Intelligence, pp. 1-6, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Şerif Bahtiyar, Mehmet Barış Yaman, and Can Yılmaz Altıniğne, “A Multi-Dimensional Machine Learning Approach to Predict Advanced Malware,” Computer Networks, vol. 160, pp. 118-129, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Alejandro Chuquilla, Teresa Guarda, and Geovanni Ninahualpa Quiña, “Ransomware - WannaCry Security is Everyone’s,” 14th Iberian Conference on Information Systems and Technologies, pp. 1-4, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Tooska Dargahi et al., “A Cyber-Kill-Chain Based Taxonomy of Crypto-Ransomware Features,” Journal of Computer Virology and Hacking Techniques, vol. 15 no. 4, pp. 277-305, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Nitul Dutta et al., “Introduction to Malware Analysis,” Cyber Security: Issues and Current Trends, pp. 129-141, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Kristian Haga, Per Håkon Meland, and Guttorm Sindre, “Breaking the Cyber Kill Chain by Modelling Resource Costs,” Graphical Models for Security, pp. 111-126, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Romuald Hoffmann, “Markov Models of Cyber Kill Chains with Iterations,” International Conference on Military Communications and Information Systems, pp. 1-6, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Reyhaneh Hosseini Nejad et al., “A Cyber Kill Chain Based Analysis of Remote Access Trojans,” Handbook of Big Data and IoT Security, pp. 273-299, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Mamoona Humayun et al., “Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study,” Arabian Journal for Science and Engineering, vol. 45, no. 1, pp. 3171-3189, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Da-Yu Kao, Shou-Ching Hsiao, and Raylin Tso, “Analyzing WannaCry Ransomware Considering the Weapons and Exploits,” 21st International Conference on Advanced Communication Technology, pp. 1098-1107, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Ilker Kara, “A Basic Malware Analysis Method,” Computer Fraud & Security, vol. 2019 no. 6, pp. 11-19, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Andrew McDole et al., “Deep Learning Techniques for Behavioral Malware Analysis in Cloud IaaS,” Malware Analysis Using Artificial Intelligence and Deep Learning, pp. 269-285, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Serena McDonnell et al., “CyberBERT: A Deep Dynamic-State Session-Based Recommender System for Cyber Threat Recognition,” IEEE Aerospace Conference, pp. 1-12, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Qublai K. Ali Mirza et al., “Ransomware Analysis using Cyber Kill Chain,” 8th International Conference on Future Internet of Things and Cloud, pp. 58-65, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Pooneh Nikkhah Bahrami et al., “Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures,” Journal of Information Processing Systems, vol. 15, no. 4, pp. 865-889, 2019. [CrossRef] [Google Scholar] [Publisher Link]
[19] Ori Or-Meir et al., “Dynamic Malware Analysis in the Modern Era—A State of the Art Survey,” ACM Computing Surveys, vol. 52, no. 5, pp. 1-48, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[20] S. Sibi Chakkaravarthy, D. Sangeetha, and V. Vaidehi, “A Survey on Malware Analysis and Mitigation Techniques,” Computer Science Review, vol. 32, pp. 1-23, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Clare Stevens, “Assembling Cybersecurity: The Politics and Materiality of Technical Malware Reports and the Case of Stuxnet,” Contemporary Security Policy, vol. 41, no. 1, pp. 129-152, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Jeremy Straub, “Modeling Attack, Defense and Threat Trees and the Cyber Kill Chain, ATT amp;CK and STRIDE Frameworks as Blackboard Architecture Networks,” IEEE International Conference on Smart Cloud (SmartCloud), pp. 148-153, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Jun Zengy et al., “SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records,” IEEE Symposium on Security and Privacy, pp. 489-506, 2022.
[CrossRef] [Google Scholar] [Publisher Link]