TESTING NEURAL NETWORK MODELS FOR SOLVING THE PROBLEM OF DETECTING INFECTED PCS BASED ON DIGITAL TRACES

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.29.941

Keywords:

artificial intelligence; neural network models; LLM; computer viruses; digital artifacts; testing; prompt; cybersecurity.

Abstract

The development of artificial intelligence has made great progress and already today has a significant impact on a large number of industries and with the development of LLM will have an even greater impact in the future, especially on cybersecurity. AI can both help save data by early detection of cyberattacks, and harm cybersecurity by facilitating the writing of convincing phishing emails, reproducing fragments of malicious code, helping to identify weak points in the network, and finding vulnerabilities in the operating system, programs, etc. that are still unknown to software manufacturers (zero day vulnerability). Therefore, in order not to be lagging behind in this "arms race", it is necessary to already implement AI as one of the components of cyber protection in the enterprise. The relevance of the work lies in the need to find such artificial intelligence models that can already be involved in solving the problems of protecting infocommunication networks. The purpose of the article is to test neural network models of the GGUF format to assess the possibility of their application in solving the problem of detecting infected PCs based on digital traces. The paper considers the types and technologies of artificial intelligence, and their impact on cybersecurity both as protection against cyberattacks and as one of the components for attacks on information infrastructure. In order to assess the possibilities of using existing AI models to solve current cyberdefense problems, in particular, detecting infected PCs based on digital traces using AI, criteria were determined for an AI model that would be acceptable for use in a corporate environment and 135 GGUF format models were tested for their detection or non-detection of signs of viral activity and indicators of compromise in the prompt provided by the user. Since it was found that when running the same neural network model with the same prompts but different programs that can run local models on a PC, its response changes dramatically, a number of summary tables were prepared with the name of the model and answer options for each program for running AI models, excluding those that gave the wrong answer, took too long to answer, or ended with an error. A list of AI models in the GGUF format that are appropriate for use in solving cybersecurity problems, in particular for detecting infected PCs based on digital traces, was determined. However, since each model performs better in specific conditions with different launch scenarios, the choice of model will depend on the current tasks and available resources. Further research can be focused on improving the methodology for studying models for processing digital traces, converting digital traces from a PC into a prompt understandable for AI, and automatically analyzing the AI response.

Downloads

Download data is not yet available.

References

Microsoft. (2025, August 3). What is AI for cybersecurity? | Microsoft Security Essentials. Microsoft. https://www.microsoft.com/uk-ua/security/business/security-101/what-is-ai-for-cybersecurity

Kostiuk, Yu. V., Skladannyi, P. M., Bebeshko, B. T., Khorolska, K. V., Rzaieva, S. L., & Vorokhob, M. V. (2025). Information and communication systems security [Textbook]. Kyiv: Borys Grinchenko Kyiv Metropolitan University.

Kostiuk, Yu. V., Skladannyi, P. M., Hulak, H. M., Bebeshko, B. T., Khorolska, K. V., & Rzaieva, S. L. (2025). Information security systems [Textbook]. Kyiv: Borys Grinchenko Kyiv Metropolitan University.

Hulak, H. M., Zhyltsov, O. B., Kyrychok, R. V., Korshun, N. V., & Skladannyi, P. M. (2023). Enterprise information and cyber security [Textbook]. Kyiv: Borys Grinchenko Kyiv Metropolitan University.

World Economic Forum. (2025, August 5). Global cybersecurity outlook 2025. https://reports.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2025.pdf

Oberig IT. (2025, August 3). Artificial Intelligence (AI) and Privileged Access Management (PAM) Blog. https://oberig-it.com/statti/shtuchnyj-intelekt-shi-ta-upravlinnya-pryvilejovanym-dostupom-pam/

Weigand, S. (2025, August 4). 2025 forecast: AI to supercharge attacks, quantum threats grow, SaaS security woes. SC Media. https://www.scworld.com/feature/cybersecurity-threats-continue-to-evolve-in-2025-driven-by-ai

AV-ATLAS. (2025, September 22). AV-ATLAS – & PUA. https://portal.av-atlas.org/malware

Kalash, M., et al. (2018). Malware classification with deep convolutional neural networks. In 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE. https://doi.org/10.1109/NTMS.2018.8328749

Chernihivskyi, I., & Kriuchkova, L. (2025). Systematic approach to solving the task of protecting information in the infocommunication network from the influence of computer viruses. Cybersecurity: Education, Science, Technique, (27), 572–590. https://doi.org/10.28925/2663-4023.2025.27.781

BlackBerry. (2025, August 5). Predictive AI for cybersecurity. What actually works and how to understand it. https://blackberry.bakotech.com/ua/predictive-ai-for-cybersecurity

Otal, H. T., & Canbaz, M. A. (2024). LLM Honeypot: Leveraging large language models as advanced interactive honeypot systems. IEEE Conference on Communications and Network Security (CNS). https://doi.org/10.1109/CNS62487.2024.10735607

Gholami, Y. (2024). Large language models (LLMs) for cybersecurity: A systematic review. World Journal of Advanced Engineering Technology and Sciences, 13(1), 57–69. https://doi.org/10.30574/wjaets.2024.13.1.0395

Coppolino, L., et al. (2025). The good, the bad, and the algorithm: The impact of generative AI on cybersecurity. Neurocomputing, 623, 129406. https://doi.org/10.1016/j.neucom.2025.129406

Ucci, D., Aniello, L., & Baldoni, R. (2019). Survey of machine learning techniques for malware analysis. Computers & Security, 81, 123–147. https://doi.org/10.1016/j.cose.2018.11.001

Unite.AI. (2025, September 8). Top 10 AI cybersecurity tools (September 2025). Unite.AI – AI News. https://www.unite.ai/uk/ai-cybersecurity-tools/

Chernihivskyi, I., & Kriuchkova, L. (2025). Testing antivirus solutions for the corporate segment. Information Security. Scientific Journals of the State University “Kyiv Aviation Institute”. https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20362

Hugging Face. (2025, August 8). GGUF. Hugging Face – The AI community building the future. https://huggingface.co/docs/hub/gguf

ggml-org. (2025, August 8). GGUF ggml/docs/gguf.md at master. GitHub. https://github.com/ggml-org/ggml/blob/master/docs/gguf.md

Hugging Face. (2025, August 8). Hugging Face – The AI community building the future. https://huggingface.co

Chernihivskyi, I., & Kriuchkova, L. (2025). Effective solutions for rapid detection of committed PCs in the infocommunication networks. Telecommunication and Information Technologies, 87(2). https://doi.org/10.31673/2412-4338.2025.029875

Bohdanov, O., & Chernihivskyi, I. (2024). Types of digital forensic artifacts in Windows computers. Cybersecurity: Education, Science, Technique, 4(24), 221–228. https://doi.org/10.28925/2663-4023.2024.24.221228

Downloads


Abstract views: 18

Published

2025-09-26

How to Cite

Chernihivskyi, I., & Kriuchkova, L. (2025). TESTING NEURAL NETWORK MODELS FOR SOLVING THE PROBLEM OF DETECTING INFECTED PCS BASED ON DIGITAL TRACES. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 1(29), 800–817. https://doi.org/10.28925/2663-4023.2025.29.941

Most read articles by the same author(s)

1 2 > >>