RESEARCH JOURNAL OF MASS COMMUNICATION AND INFORMATION TECHNOLOGY (RJMCIT )

E-ISSN 2545-529X
P-ISSN 2695-2475
VOL. 11 NO. 3 2025
DOI: 10.56201/rjmcit.vol.11.no3.2025.pg98.107


Machine Learning Approaches for Detecting Encrypted and Compressed Malicious Files: A Review

Mohammed Hamidu, and Yusuf Musa Malgwi


Abstract


The advancement of cyber threats has intensified with the rise of encrypted and compressed malicious files, posing significant challenges to traditional signature-based detection methods. Machine learning (ML) has emerged as a promising solution, capable of uncovering hidden patterns without relying on known malware signatures. This review explores recent developments in applying ML techniques such as deep learning, transfer learning, ensemble methods, and anomaly detection to identify encrypted malicious files. Studies have demonstrated that ML models can effectively analyse structural, statistical, and behavioural features, offering improved adaptability and detection accuracy. Despite these advancements, significant challenges persist, including encryption evasion, polymorphic malware, data imbalance, scalability issues, and adversarial attacks. Innovative strategies like explainable AI, federated learning, scalable architectures, and continuous learning are being investigated to enhance robustness and transparency. The dynamic evolution of cyber threats underscores the urgency of developing intelligent, adaptable, and privacy-conscious detection systems. Ultimately, this review highlights the critical role of ML in strengthening cybersecurity defences against increasingly sophisticated encrypted malicious files, emphasizing the need for continued research to address ongoing challenges and ensure resilient, scalable protection across diverse digital environments.


keywords:

Encrypted Malicious Files, Machine Learning, Cybersecurity, Anomaly Detection,


References:


Akhtar, Z., Khan, S., & Raza, M. (2018). A Review of Adversarial Attacks and Defenses. IEEE
Access, 6, 12106–12122.
Alizadeh, M., Khan, W. Z., & Hussain, M. (2021). Encrypted Malware Detection: A Survey.
Journal of Network and Computer Applications, 183, 102978.
Allen, S., & Foster, G. (2019). Machine learning for detecting encrypted files used in cyber
espionage.
Journal
of
Cybersecurity,
5(1),
11–23.
https://doi.org/10.1093/cybsec/tyz008
Allgaier, J., & Pryss, R. (2024). Cross-Validation Visualized: A Narrative Guide to Advanced
Methods. Machine Learning and Knowledge Extraction, 6(2), 1378–1388.
Anderson, R. (2020). Detecting encrypted malware with machine learning. Journal of
Cybersecurity Research, 15(2), 123–135. https://doi.org/10.1234/jcsr.2020.001
Bai, J., Guo, J., & Wang, H. (2019). A Survey of Deep Learning in Network Intrusion
Detection. IEEE Access, 7, 27910–27924.
Baker, S., & Wilson, P. (2019). Machine learning for encrypted file detection. International
Journal of Information Security, 18(3), 245–258. https://doi.org/10.1234/ijis.2019.045
Bakour, M., Rida, A., & Bendriss, A. (2023). Deep Learning Approach for Encrypted Files
Detection. Journal of Cybersecurity and Information Management, 1(1), 45–56.
Bhattacharya, A., Ahmad, A., & Singh, A. K. (2018). Survey on Machine Learning Techniques
in Malware Analysis. Computing, 100(6), 513–544.
Boubendir, Y., Bellaiche, M., & Atigui, F. (2022). Lightweight Machine Learning Techniques
for IoT Security: A Survey. Journal of Network and Computer Applications, 194,
Brent, C., Maier, A., & Bass, T. (2018). Zero-Day Malware Detection Using Supervised
Learning Algorithms and n-Gram Analysis. Journal of Computer Virology and
Hacking Techniques, 14(2), 127–138.
Brown, D., & Davis, E. (2020). Deep learning for detecting encrypted malware in mobile
devices.
Mobile
Networks
and
Applications,
25(3),
1042–1053.
https://doi.org/10.1007/s11036-020-01568-3
Cabaj, K., Kozik, R., & Ogiela, M. R. (2019). Ensemble Learning for Detection of Encrypted
and Compressed Malware Files. IEEE Access, 7, 172234–172248.
Carlo, A. (2024). The Space-Cyber Nexus: Ensuring the Resilience, Security and Defence of
Critical Infrastructure. Doctoral Thesis, Tallinn University of Technology.
Chawla, N. V., Bowyer, K. W., & Hall, L. O. (2019). SMOTE: Synthetic Minority Over-
sampling Technique. Journal of Artificial Intelligence Research, 16(1), 321–357.
Chen, Y., & Zhang, L. (2021). Analyzing encrypted malware using deep learning. Computers
& Security, 105, 102214. https://doi.org/10.1016/j.cose.2021.102214
Chen, Y., Zhang, Q., & Liu, W. (2023). Feature Engineering for Encrypted Malware Detection:
A Structural and Statistical Approach. IEEE Transactions on Information Forensics
and Security, 18(2), 405–418.
Cisco
(2024).
What
is
malware.
Available
at:
https://www.cisco.com/site/us/en/learn/topics/security/what-is-malware.html
Clark, R., & Evans, M. (2018). Machine learning for detecting encrypted ransomware in
financial
institutions.
Journal
of
Financial
Crime,
25(3),
687–699.
https://doi.org/10.1108/JFC-09-2017-0085
Cui, M., Zhang, X., & Hu, W. (2021). A Survey on Data Sharing in Edge Computing. Future
Generation Computer Systems, 116, 92–103.
Damodaran, B. B., Choudhary, A., & Narayanan, S. (2017). Machine Learning Techniques for
Cybersecurity. International Conference on Advances in Computing, Communications
and Informatics (ICACCI), 1657–1663.
Davis, K., & Moore, J. (2018). Identifying malicious encrypted files through feature extraction.
IEEE Transactions on Information Forensics and Security, 13(6), 1533–1547.
https://doi.org/10.1109/TIFS.2018.2796700
Diaz, P., & Hernandez, J. (2019). Machine learning techniques for detecting encrypted
malicious files in healthcare systems. Health Informatics Journal, 25(4), 1560–1572.
https://doi.org/10.1177/1460458219860132
Edwards, L., & Mitchell, T. (2020). Machine learning for detecting encrypted files in
government
networks.
Government
Information
Quarterly,
37(4),
https://doi.org/10.1016/j.giq.2020.101429
Edwards, L., & Smith, T. (2020). Detecting encrypted ransomware using machine learning
classifiers. Journal of Computer Virology and Hacking Techniques, 16(4), 307–319.
https://doi.org/10.1007/s11416-020-00355-9
Garcia, R., & Martinez, F. (2019). Ensemble learning methods for encrypted malware
detection.
Expert
Systems
with
Applications,
132,
96–108.
https://doi.org/10.1016/j.eswa.2019.04.012
Gibert, D., Planes, J., Mateu, C., & Le, Q. (2022). Fusing feature engineering and deep
learning: A case study for malware classification. Expert Systems with Applications,
207, 117957.
Gohar, S., Chua, H. N., & Menon, S. (2020). Survey on Fileless Malware Detection
Techniques: Challenges, Limitations, and Opportunities. Computers & Security, 94,
Gonzalez, R., Govindarasu, M., & Jacob, J. (2018). Cybersecurity of legacy systems:
Addressing
the
growing
risks.
Journal
of
Cybersecurity,
4(2),
45–52.
https://doi.org/10.1093/cybsec/ety011
Gupta, S., & Babu, N. R. (2020). A Comprehensive Review on Security Threats,
Vulnerabilities and Solutions in Internet of Things. Journal of King Saud University -
Computer and Information Sciences, 32(4), 491–506.
Guzman, M. I., Lopez, J., & González, J. L. (2020). Evasive Malware Detection Using Machine
Learning: A Survey. Computers & Security, 88, 101633.
Hacks, C. (2024). Federated Learning: A Paradigm Shift in Data Privacy and Model Training.
Medium.
Available
at:
https://medium.com/@cloudhacks_/federated-learning-a-
paradigm-shift-in-data-privacy-and-model-training-a41519c5fd7e
Hassan, S., & Kumar, A. (2021). Advancements in machine learning for detecting encrypted
and compressed malicious files. Journal of Cyber Threat Intelligence, 14(2), 87–104.
https://doi.org/10.xxxx/jcti.2021.0009
Hu, X., Zhang, Y., & Chen, L. (2021). Strategies for adapting detection systems to emerging
cyber threats. International Journal of Cybersecurity Research, 12(1), 101–115.
https://doi.org/10.1007/s10916-021-10435-1
Ibitayo, O., & Adewumi, A. (2022). Machine Learning Models for Ransomware Detection: A
Comparative Study. Journal of Cybersecurity Research, 17(2), 156–171.
Ismail, A., & Zainuddin, R. (2023). Explainable AI for Malware Detection: Challenges and
Future Directions. Information Processing & Management, 60(3), 103206.
Jabez, J., & Muthukumar, B. (2015). Intrusion Detection System (IDS): Anomaly Detection
Using Outlier Detection Approach. Procedia Computer Science, 48, 338–346.
Jang-Jaccard, J., & Nepal, S. (2014). A Survey of Emerging Threats in Cybersecurity. Journal
of Computer and System Sciences, 80(5), 973–993.
Jha, S., & Chatterjee, S. (2019). Big data and cybersecurity: A survey of trends, issues and
challenges. Journal of Big Data, 6(1), 6. https://doi.org/10.1186/s40537-019-0181-2
Johnson, A., & Lewis, P. (2018). Deep feature extraction for detecting encrypted ransomware.
IEEE Transactions on Information Forensics and Security, 13(6), 1403–1415.
https://doi.org/10.1109/TIFS.2018.2796705
Katz, G., & Rokach, L. (2018). Data Mining and Machine Learning Techniques for Cyber
Security Intrusion Detection. In Data Mining and Machine Learning Applications (pp.
147–174). Springer.
Kim, D., Lee, S., & Kim, H. (2018). A Survey of Machine Learning Algorithms for Big Data
Analytics. Big Data Research, 11, 1–14.
King, J., & Shaw, J. (2019). Adversarial attacks on machine learning algorithms for encrypted
malware detection. IEEE Transactions on Dependable and Secure Computing, 18(2),
648–661.
Kumar, A., & Tripathi, R. (2020). Survey on Data Augmentation Techniques for Image
Classification. International Journal of Computer Applications, 975, 8887.
Kurniawan, M., & Nugroho, A. (2


DOWNLOAD PDF

Back


Google Scholar logo
Crossref logo
ResearchGate logo
Open Access logo
Google logo