GHIRIJHA V P , LAKSHMI PRIYA S J, NIGIL CHRYSO PRAISES N C
Abstract
The rapid growth of web applications has led to an exponential increase in the volume and diversity of data handled online, including text, images, audio, video, and structured logs— collectively referred to as multi-modal data. Traditional security mechanisms often apply uniform encryption strategies that fail to address the distinct characteristics and threat profiles of different data modalities. This paper proposes an intelligent cybersecurity framework that integrates adaptive encryption, machine learning–based threat assessment, and secure key management to provide robust, end-to-end protection for multi-modal data in web applications. The framework dynamically selects encryption algorithms and key lengths based on data type, sensitivity, and contextual risk, thereby optimizing both security strength and system performance. Experimental evaluation demonstrates improved resistance to common web-based attacks while maintaining acceptable latency and scalability.
This paper presents an intelligent cybersecurity framework for multi-modal data encryption and decryption in web applications. By combining adaptive cryptographic techniques with machine learning–based risk assessment, the framework addresses the limitations of traditional static security approaches. Future work will focus on incorporating advanced deep learning models, supporting edge and cloud-native deployments, and conducting large-scale real-world evaluations.
References
1.Stallings, W. (2019). Cryptography and Network Security: Principles and Practice. Pearson Education.
2.Bishop, M. (2018). Computer Security: Art and Science. Addison-Wesley Professional.
3.Schneier, B.( 2015). Applied Cryptography Protocols, Algorithms, and Source law in C. Wiley.
4.Alsmadi, I., & Xu, S. (2020). “Security of AI and AI for Security: Challenges and Opportunities.” IEEE Security & Privacy, 18(3), 14–25.
5.Shaukat, K., Luo, S., Varadharajan, V., & Hameed, I. A.( 2020). “ A Survey on Machine Learning ways for Cybersecurity. ” IEEE Access, 8, 222310 – 222354.
6.Dua, S., & Du, X. (2016). Data Mining and Machine Learning in Cybersecurity. CRC Press.
7.Patel, A., Taghavi, M., Bakhtiyari, K., & Javadi, B. (2013). “An intrusion detection and prevention system in cloud computing: A systematic review.” Journal of Network and Computer Applications, 36(1), 25–41.
8.Zhang, C., & Wang, J. (2021). “AI-driven encryption for secure multimedia transmission.” International Journal of Information Security, 20(2), 151–168.
9.Shafiq, M., & Ahmad, H. F. (2020). “Deep learning-based network intrusion detection systems: A review.” IEEE Access, 8, 219650–219670.
10.Wang, P., Chen, C., & Zhao, L.( 2022). “ A mongrel Cryptographic Model forMulti-Modal Data Protection in Web operations. ” Journal of Information Security and Applications, 66, 103115.
How to Cite This Paper
GHIRIJHA V P , LAKSHMI PRIYA S J, NIGIL CHRYSO PRAISES N C (2026). AN INTELLIGENT CYBERSECURITY FRAMEWORK FOR MULTI-MODAL DATA ENCRYPTION AND DECRYPTION IN WEB APPLICATIONS. International Journal of Computer Techniques, 13(2). ISSN: 2394-2231.