Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Machine Learning-Based Model for Identification of Malicious Encrypted Files

View through CrossRef
The widespread use of encryption to protect digital data and communication has posed new challenges for cybersecurity, as attackers increasingly exploit encrypted files to hide malicious content that bypasses traditional signature-based detection systems. This research develops a machine learning model designed to detect harmful encrypted files, overcoming the weaknesses of conventional methods that fail to analyze encrypted data effectively. Since encryption conceals the payloads of malicious files, advanced classification models are essential for accurate identification. The study applies three supervised learning algorithms Convolutional Neural Network (CNN), Support Vector Machine (SVM), and Recurrent Neural Network (RNN) to train and evaluate models capable of differentiating between legitimate and malicious encrypted files. The dataset was obtained from the Canadian Institute for Cybersecurity (CIC), and model performance was assessed using confusion matrix–based evaluation metrics implemented in Python. Among the models tested, SVM achieved the highest detection accuracy of 98.7%, outperforming RNN (91%) and CNN (74.3%). These results indicate that SVM delivers superior classification efficiency, particularly in handling complex and high-dimensional data features. The study concludes that integrating such models into enterprise cybersecurity systems can significantly enhance threat detection and protection mechanisms. It further recommends exploring hybrid deep learning strategies to improve adaptability, reduce false positives, and enable real-time detection of malicious encrypted files in rapidly changing digital environments.
Title: Machine Learning-Based Model for Identification of Malicious Encrypted Files
Description:
The widespread use of encryption to protect digital data and communication has posed new challenges for cybersecurity, as attackers increasingly exploit encrypted files to hide malicious content that bypasses traditional signature-based detection systems.
This research develops a machine learning model designed to detect harmful encrypted files, overcoming the weaknesses of conventional methods that fail to analyze encrypted data effectively.
Since encryption conceals the payloads of malicious files, advanced classification models are essential for accurate identification.
The study applies three supervised learning algorithms Convolutional Neural Network (CNN), Support Vector Machine (SVM), and Recurrent Neural Network (RNN) to train and evaluate models capable of differentiating between legitimate and malicious encrypted files.
The dataset was obtained from the Canadian Institute for Cybersecurity (CIC), and model performance was assessed using confusion matrix–based evaluation metrics implemented in Python.
Among the models tested, SVM achieved the highest detection accuracy of 98.
7%, outperforming RNN (91%) and CNN (74.
3%).
These results indicate that SVM delivers superior classification efficiency, particularly in handling complex and high-dimensional data features.
The study concludes that integrating such models into enterprise cybersecurity systems can significantly enhance threat detection and protection mechanisms.
It further recommends exploring hybrid deep learning strategies to improve adaptability, reduce false positives, and enable real-time detection of malicious encrypted files in rapidly changing digital environments.

Related Results

Design of Malicious Code Detection System Based on Binary Code Slicing
Design of Malicious Code Detection System Based on Binary Code Slicing
<p>Malicious code threatens the safety of computer systems. Researching malicious code design techniques and mastering code behavior patterns are the basic work of network se...
Selection of Injectable Drug Product Composition using Machine Learning Models (Preprint)
Selection of Injectable Drug Product Composition using Machine Learning Models (Preprint)
BACKGROUND As of July 2020, a Web of Science search of “machine learning (ML)” nested within the search of “pharmacokinetics or pharmacodynamics” yielded over 100...
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Facing the surge in malicious behaviors in the network environment, the existing cybersecurity knowledge graph suffers from fragmented security knowledge and limited application sc...
Advanced Feature Selection Techniques for Machine Learning-Based Detection of Encrypted Malicious Traffic
Advanced Feature Selection Techniques for Machine Learning-Based Detection of Encrypted Malicious Traffic
The increasing prevalence of encrypted traffic in modern networks presents significant challenges in detecting malicious activities, necessitating advanced techniques for effective...
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
<p>Accessing and retrieving users’ browser and network information is a common practice used by advertisers and many online services to deliver targeted ads and explicit impr...
Learning-Based Detection for Malicious Android Application Using Code Vectorization
Learning-Based Detection for Malicious Android Application Using Code Vectorization
The malicious APK (Android Application Package) makers use some techniques such as code obfuscation and code encryption to avoid existing detection methods, which poses new challen...
Status and solutions of malicious complaints
Status and solutions of malicious complaints
In Korea, malicious complaints that go beyond common sense are continuously occurring. Considering that Korea is a leading country in terms of security, the serious level of malici...
Enhanced Encrypted Traffic Analysis Leveraging Graph Neural Networks and Optimized Feature Dimensionality Reduction
Enhanced Encrypted Traffic Analysis Leveraging Graph Neural Networks and Optimized Feature Dimensionality Reduction
With the continuously growing requirement for encryption in network environments, web browsers are increasingly employing hypertext transfer protocol security. Despite the increase...

Back to Top