AI-Powered Encryption: Innovative Approach for Malware Intrusions in File-Sharing Networks


  • Intekab Alam, Adlin Jebakumari S., Sunil Kumar Jakhar, Karishma Desai, Madhur Grover


Malware Intrusions, Encryption, Encryption, Adaptive Emperor Penguin tuned Bayesian Belief Networks (AEP-BBN), Artificial intelligence (AI).


Malware intrusions in file-sharing networks are a prevalent problem, compromising the integrity and security of encrypted data. These disguised attacks took the utilization of flaws in network designs, spreading intentionally and corrupting data shared by users. The dynamic and distributed organization of file-sharing networks complicates the detection and prevention of such attacks. In this study, we developed an optimized encryption model named Adaptive Emperor Penguin tuned Bayesian Belief Networks (AEP-BBN) for enhancing the prediction of malware activities in file-sharing networks. Initially, we gathered a dataset that includes infected shared files from the organizations to train our proposed prediction model. A robust Scaling (RS) algorithm is employed to pre-process the gathered raw data, to improve the quality of the data. We extracted significant features from the pre-processed data using Recursive Feature Elimination (RFE). Adaptive Emperor Penguin Optimization (AEPO) is used to enhance the primary features of the suggested BBN architecture. The recommended approach has been implemented in Python software. The result assessment phase is performed with numerous metrics such as recall, precision, f1 score and accuracy to evaluate the suggested AEP-BBN approach with other conventional approaches. The outcomes of the experiments demonstrate that the proposed AEP-BBN approach performed better than other existing approaches for enhancing the prediction of malware activities in file-sharing networks.


Download data is not yet available.


Faruk, M. J. H., Shahriar, H., Valero, M., Barsha, F. L., Sobhan, S., Khan, M. A., ... & Wu, F. (2021, December). Malware detection and prevention using artificial intelligence techniques. In 2021 IEEE International Conference on Big Data (Big Data) (pp. 5369-5377). IEEE.

Yadav, C. S., Singh, J., Yadav, A., Pattanayak, H. S., Kumar, R., Khan, A. A., ... & Alharby, S. (2022). Malware analysis in iot & android systems with defensive mechanism. Electronics, 11(15), 2354. 10.3390/electronics11152354.

Chakraborty, A., Biswas, A., & Khan, A. K. (2023). Artificial intelligence for cybersecurity: Threats, attacks and mitigation. In Artificial Intelligence for Societal Issues (pp. 3-25). Cham: Springer International Publishing.

Almomani, I., Alkhayer, A., & El-Shafai, W. (2022). An automated vision-based deep learning model for efficient detection of android malware attacks. IEEE Access, 10, 2700-2720.

Melvin, A. A. R., Kathrine, G. J. W., Ilango, S. S., Vimal, S., Rho, S., Xiong, N. N., & Nam, Y. (2022). Dynamic malware attack dataset leveraging virtual machine monitor audit data for the detection of intrusions in cloud. Transactions on Emerging Telecommunications Technologies, 33(4), e4287. 10.1002/ett.4287

McIntosh, T., Watters, P., Kayes, A. S. M., Ng, A., & Chen, Y. P. P. (2021). Enforcing situation-aware access control to build malware-resilient file systems. Future Generation Computer Systems, 115, 568-582. 10.1016/j.future.2020.09.035

Al-Hawawreh, M., Alazab, M., Ferrag, M. A., & Hossain, M. S. (2023). Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms. Journal of Network and Computer Applications, 103809.

Pramanik, S., & Teja, H. (2019, January). EMBER-Analysis of Malware Dataset Using Convolutional Neural Networks. In 2019 Third International Conference on Inventive Systems and Control (ICISC) (pp. 286-291). IEEE. 10.1109/ICISC44355.2019.9036424

Karrar, A. E. (2022). Adopting Graph-Based Machine Learning Algorithms to Classify Android Malware. IJCSNS International Journal of Computer Science and Network Security, 22(9), 840.10.22937/IJCSNS.2022.22.9.109

Al Sarah, N., Rifat, F. Y., Hossain, M. S., & Narman, H. S. (2021). An efficient android malware prediction using Ensemble machine learning algorithms. Procedia Computer Science, 191, 184-191. 10.1016/j.procs.2021.07.023

Ashraf, F., Naseer, A., & Iqbal, S. (2019, April). Comparative analysis of unstructured P2P file sharing networks. In Proceedings of the 2019 3rd International Conference on Information System and Data Mining (pp. 148-153). 10.1145/3325917.3325952

Kumar, D., & Kumar, K. P. (2023, March). Artificial Intelligence based Cyber Security Threats Identification in Financial Institutions Using Machine Learning Approach. In 2023 2nd International Conference for Innovation in Technology (INOCON) (pp. 1-6). IEEE.10.1109/INOCON57975.2023.10100967

Tyagi, A. K., Hemamalini, V., & Soni, G. (2023). Digital Health Communication With Artificial Intelligence-Based Cyber Security. In AI-Based Digital Health Communication for Securing Assistive Systems (pp. 178-213). IGI Global.10.4018/978-1-6684-8938-3.ch009

Poudyal, S., & Dasgupta, D. (2020, December). AI-powered ransomware detection framework. In 2020 IEEE Symposium Series on Computational Intelligence (SSCI) (pp. 1154-1161). IEEE.

Haider, U., Nawaal, B., Khan, I. U., & El Hajjami, S. AI-Based Secure Wireless Communication Technologies and Cyber Threats for IoT Networks. In Cyber Security for Next-Generation Computing Technologies (pp. 70-83). CRC Press.

Lofù, D., Pazienza, A., Abbatecola, A., Lella, E., Macchiarulo, N., & Noviello, P. (2023, June). Watching against the Unseen: AI-powered Approach to Detect Attacks on Critical Infrastructure. In 2023 8th International Conference on Smart and Sustainable Technologies (SpliTech) (pp. 1-6). IEEE.

bin Asad, A., Mansur, R., Zawad, S., Evan, N., & Hossain, M. I. (2020, June). Analysis of malware prediction based on infection rate using machine learning techniques. In 2020 IEEE region 10 symposium (TENSYMP) (pp. 706-709). IEEE.

Dehkordy, D. T., & Rasoolzadegan, A. (2021). A new machine learning-based method for android malware detection on imbalanced dataset. Multimedia Tools and Applications, 80, 24533-24554. 10.1007/s11042-021-10647-z




How to Cite

Sunil Kumar Jakhar, Karishma Desai, Madhur Grover, I. A. A. J. S. . (2024). AI-Powered Encryption: Innovative Approach for Malware Intrusions in File-Sharing Networks. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 1435–1441. Retrieved from



Research Article