Open Access iconOpen Access

ARTICLE

Dynamic Malware Detection Method Based on API Multiple Subsequences

Jinhuo Liang, Jinan Shen*, Pengfei Wang, Fang Liang, Xuejian Deng

College of Intelligent Systems Science and Engineering, Hubei Minzu University, Enshi, 445000, China

* Corresponding Author: Jinan Shen. Email: email

Computers, Materials & Continua 2026, 87(1), 76 https://doi.org/10.32604/cmc.2025.073076

Abstract

The method for malware detection based on Application Programming Interface (API) call sequences, as a primary research focus within dynamic detection technologies, currently lacks attention to subsequences of API calls, the variety of API call types, and the length of sequences. This oversight leads to overly complex call sequences. To address this issue, a dynamic malware detection approach based on multiple subsequences is proposed. Initially, APIs are remapped and encoded, with the introduction of percentile lengths to process sequences. Subsequently, a combination of One-Dimensional Convolutional Neural Network (1D-CNN) and Bidirectional Long Short-Term Memory (Bi-LSTM) networks, along with an attention mechanism, is employed to extract features from subsequences of varying lengths for feature fusion and classification. Experiments conducted on two widely used public API-based datasets, namely MalBehavD-V1 and Alibaba Cloud, demonstrate that the proposed method reduces the number of API call types by approximately 20% compared to representative deep learning–based API sequence detection methods, while achieving a peak accuracy of 98.70%. Additionally, experimental results indicate that sequence length at the 95th percentile represents the optimal solution that balances classification performance and computational efficiency.

Keywords

Malware detection; API call types; percentile; deep learning

Cite This Article

APA Style
Liang, J., Shen, J., Wang, P., Liang, F., Deng, X. (2026). Dynamic Malware Detection Method Based on API Multiple Subsequences. Computers, Materials & Continua, 87(1), 76. https://doi.org/10.32604/cmc.2025.073076
Vancouver Style
Liang J, Shen J, Wang P, Liang F, Deng X. Dynamic Malware Detection Method Based on API Multiple Subsequences. Comput Mater Contin. 2026;87(1):76. https://doi.org/10.32604/cmc.2025.073076
IEEE Style
J. Liang, J. Shen, P. Wang, F. Liang, and X. Deng, “Dynamic Malware Detection Method Based on API Multiple Subsequences,” Comput. Mater. Contin., vol. 87, no. 1, pp. 76, 2026. https://doi.org/10.32604/cmc.2025.073076



cc Copyright © 2026 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 334

    View

  • 47

    Download

  • 0

    Like

Share Link