Optimized Multi-Task Evolutionary Artificial Neural Network Fostered Crypto-Ransomware Prevention in File-Sharing Scenarios with Encrypted Traffic

Authors

  • Vyom Kulshreshtha Department of Computer Science & Engineering, Amity University Madhya Pradesh, Gwalior, India
  • Deepak Motwani Department of Computer Science & Engineering, Amity University Madhya Pradesh, Gwalior, India https://orcid.org/0000-0002-0217-7155
  • Pankaj Sharma Department of Computer Science & Engineering, Eshan College of Engineering, Mathura, India
Volume: 15 | Issue: 6 | Pages: 30663-30668 | December 2025 | https://doi.org/10.48084/etasr.11023

Abstract

This study addresses the substantial threat of ransomware to both home users and enterprises, particularly in corporate settings where shared servers store critical data accessed by users. A novel approach is proposed to prevent crypto-ransomware attacks in File-Sharing Scenarios with Encrypted Traffic (CRP-MTEANN-BWOA-FSET). Ransomware samples are collected from encrypted files shared in the network during infection and from benign activities of office users. Employing Adaptive Self-Guided Filtering (ASGF) for normalization and General Synchroextracting Chirplet Transform (GSCT) for feature extraction, the proposed method extracts critical network traffic features for analysis. Subsequently, MTEANN is utilized to classify ransomware samples as safe or risky, with an emphasis on blocking crypto-ransomware activities in file-sharing scenarios. The proposed method uses the Beluga Whale Optimization Algorithm (BWOA) to optimize the weight parameters in MTEANN, improving the accuracy of ransomware classification. The efficiency of the CRP-MTEANN-BWOA-FSET method was evaluated using accuracy, precision, recall, F-measure, and phi coefficient, and the results showed that it achieved better performance compared to existing methods.

Keywords:

adaptive self-guided filtering, beluga whale optimization, file-sharing, multi-task evolutionary artificial neural network, ransomware

Downloads

Download data is not yet available.

References

B. V. Reddy, G. J. Krishna, V. Ravi, and D. Dasgupta, "Machine Learning and Feature Selection Based Ransomware Detection Using Hexacodes," in Evolution in Computational Intelligence, 2021, pp. 583–597. DOI: https://doi.org/10.1007/978-981-15-5788-0_56

C. M. Hsu, C. C. Yang, H. H. Cheng, P. E. Setiasabda, and J. S. Leu, "Enhancing File Entropy Analysis to Improve Machine Learning Detection Rate of Ransomware," IEEE Access, vol. 9, pp. 138345–138351, 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3114148

I. Bello et al., "Detecting ransomware attacks using intelligent algorithms: recent development and next direction from deep learning and big data perspectives," Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 9, pp. 8699–8717, Sep. 2021. DOI: https://doi.org/10.1007/s12652-020-02630-7

F. Faghihi and M. Zulkernine, "RansomCare: Data-centric detection and mitigation against smartphone crypto-ransomware," Computer Networks, vol. 191, May 2021, Art. no. 108011. DOI: https://doi.org/10.1016/j.comnet.2021.108011

B. A. S. Al-rimy et al., "Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection technique for Crypto-ransomware early detection," Future Generation Computer Systems, vol. 115, pp. 641–658, Feb. 2021. DOI: https://doi.org/10.1016/j.future.2020.10.002

S. Sharma, C. R. Krishna, and R. Kumar, "RansomDroid: Forensic analysis and detection of Android Ransomware using unsupervised machine learning technique," Forensic Science International: Digital Investigation, vol. 37, Jun. 2021, Art. no. 301168. DOI: https://doi.org/10.1016/j.fsidi.2021.301168

A. Mantri, N. Singh, K. Kumar, and S. Dahiya, "Pre-Encryption and Identification (PEI): An Anti-crypto Ransomware Technique," IETE Journal of Research, vol. 69, no. 11, pp. 8058–8066, Nov. 2023. DOI: https://doi.org/10.1080/03772063.2022.2048706

D. Smith, S. Khorsandroo, and K. Roy, "Machine Learning Algorithms and Frameworks in Ransomware Detection," IEEE Access, vol. 10, pp. 117597–117610, 2022. DOI: https://doi.org/10.1109/ACCESS.2022.3218779

V. Thangapandian, "Machine Learning in Automated Detection of Ransomware: Scope, Benefits and Challenges," in Illumination of Artificial Intelligence in Cybersecurity and Forensics, S. Misra and C. Arumugam, Eds. Springer International Publishing, 2022, pp. 345–372. DOI: https://doi.org/10.1007/978-3-030-93453-8_15

J. Singh, K. Sharma, M. Wazid, and A. K. Das, "SINN-RD: Spline interpolation-envisioned neural network-based ransomware detection scheme," Computers and Electrical Engineering, vol. 106, Mar. 2023, Art. no. 108601. DOI: https://doi.org/10.1016/j.compeleceng.2023.108601

F. Manavi and A. Hamzeh, "A novel approach for ransomware detection based on PE header using graph embedding," Journal of Computer Virology and Hacking Techniques, vol. 18, no. 4, pp. 285–296, Dec. 2022. DOI: https://doi.org/10.1007/s11416-021-00414-x

R. O. Ogundokun, J. B. Awotunde, S. Misra, O. C. Abikoye, and O. Folarin, "Application of Machine Learning for Ransomware Detection in IoT Devices," in Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities, S. Misra and A. Kumar Tyagi, Eds. Springer International Publishing, 2021, pp. 393–420. DOI: https://doi.org/10.1007/978-3-030-72236-4_16

E. Berrueta, D. Morato, E. Magaña, and M. Izal, "Crypto-ransomware detection using machine learning models in file-sharing network scenarios with encrypted traffic," Expert Systems with Applications, vol. 209, Dec. 2022, Art. no. 118299. DOI: https://doi.org/10.1016/j.eswa.2022.118299

S. H. Kok, A. Abdullah, and N. Jhanjhi, "Early detection of crypto-ransomware using pre-encryption detection algorithm," Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 5, pp. 1984–1999, May 2022. DOI: https://doi.org/10.1016/j.jksuci.2020.06.012

J. A. Gómez-Hernández, R. Sánchez-Fernández, and P. García-Teodoro, "Inhibiting crypto-ransomware on windows platforms through a honeyfile-based approach with R-Locker," IET Information Security, vol. 16, no. 1, pp. 64–74, 2022. DOI: https://doi.org/10.1049/ise2.12042

M. Waty, H. Sulistio, and A. Prihatiningsih, "The Impact of Change Orders on the Waste Materials of Large-Scale Projects," Engineering, Technology & Applied Science Research, vol. 14, no. 6, pp. 18363–18370, Dec. 2024. DOI: https://doi.org/10.48084/etasr.8910

E. Berrueta, D. Morató, E. Magaña, and M. Izal, "Open Repository for the Evaluation of Ransomware Detection Tools." IEEE DataPort, Feb. 27, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.2984187

S. Zhu and Z. Yu, "Self-guided filter for image denoising," IET Image Processing, vol. 14, no. 11, pp. 2561–2566, 2020. DOI: https://doi.org/10.1049/iet-ipr.2019.1471

Z. Meng, M. Lv, Z. Liu, and F. Fan, "General synchroextracting chirplet transform: Application to the rotor rub-impact fault diagnosis," Measurement, vol. 169, Feb. 2021, Art. no. 108523. DOI: https://doi.org/10.1016/j.measurement.2020.108523

D. Guijo-Rubio, A. M. Gómez-Orellana, P. A. Gutiérrez, and C. Hervás-Martínez, "Short- and long-term energy flux prediction using Multi-Task Evolutionary Artificial Neural Networks," Ocean Engineering, vol. 216, Nov. 2020, Art. no. 108089. DOI: https://doi.org/10.1016/j.oceaneng.2020.108089

C. Zhong, G. Li, and Z. Meng, "Beluga whale optimization: A novel nature-inspired metaheuristic algorithm," Knowledge-Based Systems, vol. 251, Sep. 2022, Art. no. 109215. DOI: https://doi.org/10.1016/j.knosys.2022.109215

Downloads

How to Cite

[1]
V. Kulshreshtha, D. Motwani, and P. Sharma, “Optimized Multi-Task Evolutionary Artificial Neural Network Fostered Crypto-Ransomware Prevention in File-Sharing Scenarios with Encrypted Traffic”, Eng. Technol. Appl. Sci. Res., vol. 15, no. 6, pp. 30663–30668, Dec. 2025.

Metrics

Abstract Views: 181
PDF Downloads: 176

Metrics Information