Open Access
ARTICLE
Dual-Channel Attention Deep Bidirectional Long Short Term Memory for Enhanced Malware Detection and Risk Mitigation
Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, 22254, Saudi Arabia
* Corresponding Author: Syed Hamid Hasan. Email:
(This article belongs to the Special Issue: Emerging Technologies in Information Security )
Computer Modeling in Engineering & Sciences 2025, 144(2), 2627-2645. https://doi.org/10.32604/cmes.2025.064926
Received 27 February 2025; Accepted 15 July 2025; Issue published 31 August 2025
Abstract
Over the past few years, Malware attacks have become more and more widespread, posing threats to digital assets throughout the world. Although numerous methods have been developed to detect malicious attacks, these malware detection techniques need to be more efficient in detecting new and progressively sophisticated variants of malware. Therefore, the development of more advanced and accurate techniques is necessary for malware detection. This paper introduces a comprehensive Dual-Channel Attention Deep Bidirectional Long Short-Term Memory (DCA-DBiLSTM) model for malware detection and risk mitigation. The Dual Channel Attention (DCA) mechanism improves the model’s capability to concentrate on the features that are most appropriate in the input data, which reduces the false favourable rates. The Bidirectional Long, Short-Term Memory framework helps capture crucial interdependence from past and future circumstances, which is essential for enhancing the model’s understanding of malware behaviour. As soon as malware is detected, the risk mitigation phase is implemented, which evaluates the severity of each threat and helps mitigate threats earlier. The outcomes of the method demonstrate better accuracy of 98.96%, which outperforms traditional models. It indicates the method detects and mitigates several kinds of malware threats, thereby providing a proactive defence mechanism against the emerging challenges in cybersecurity.Keywords
Cite This Article
Copyright © 2025 The Author(s). Published by Tech Science Press.This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Submit a Paper
Propose a Special lssue
View Full Text
Download PDF
Downloads
Citation Tools