Artificial Intelligence-Driven Penetration Testing for Wireless Networks: Enhancing Security Vulnerability Detection Using CNN Models

Abstract

Adware, spyware, viruses, and other forms of malware are serious risks to people, companies, governments, and military activities. Advanced methods for vulnerability detection are required since traditional security measures frequently fall short in the face of complex and dynamic cyberthreats. In order to increase accuracy, adaptability, and scalability in discovering security vulnerabilities, this study investigates the incorporation of artificial intelligence (AI) in the design of a wireless network penetration testing system, utilizing machine learning. The dataset used was BoTNeTIoT-L01, which has over 7 million records of IoT botnet attacks. Using the Keras library, a convolutional neural network (CNN) model with layers for convolution, max pooling, and dense was created. The Adam algorithm was then used to optimize the CNN model's training process. The model's remarkable 99.46% accuracy rate in categorizing assaults indicates how well it can detect security holes and adjusts to emerging threats. The results also confirm the capabilities of artificial intelligence in enhancing cybersecurity measures and ensuring strong protection in increasingly complex wireless network environments.

Country : Lebanon

1 Mustafa Salim Mohammed Al-Saudi2 Kassem Hamze

  1. Department of Computer and Communications, Faculty of Engineering, Islamic University of Lebanon, Wardanieh, Lebanon
  2. Department of Computer and Communications, Faculty of Engineering, Islamic University of Lebanon, Wardanieh, Lebanon

IRJIET, Volume 8, Issue 5, May 2024 pp. 232-237

doi.org/10.47001/IRJIET/2024.805034

References

  1. A.A. R. Melvin, G. J. W. Kathrine, S. S. Ilango, S. Vimal, S. Rho, N. N. Xiong, and Y. Nam, “Dynamic malware attack dataset leveraging virtual machine monitor audit data for the detection of intrusions in cloud,” Transactions on Emerging Telecommunications Technologies, vol. 33, no. 4, 2022.
  2. D. C. Stockman, “EDUCaTION MaTTERS,” Pulse-Chartered Institute for Information Security, 2022.
  3. Ö. A.Aslan, and R. Samet, “A comprehensive review on malware detection approaches,” IEEE access, vol. 8, pp. 6249-6271, 2020.
  4. M. Stampar, and K. Fertalj, “Artificial intelligence in network intrusion detection,” In 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 1318-1323, May. 2015.
  5. M. H. Huang, and R. T. Rust, “Artificial intelligence in service,” Journal of service research, vol. 21, no. 2, pp. 155-172, 2018.
  6. M. Al-Qatf, Y. Lasheng, M. Al-Habib, and K. Al-Sabahi, “Deep learning approach combining sparse autoencoder with SVM for network intrusion detection,” Ieee Access, vol. 6, pp. 52843-52856, 2018.
  7. R. M. Mohammad, and M. K. Alsmadi, “Intrusion detection using Highest Wins feature selection algorithm,”Neural Computing and Applications,vol. 33, pp. 9805-9816, 2021.
  8. A.Halimaa, and K. Sundarakantham, “Machine learning based intrusion detection system,” In 2019 3rd International conference on trends in electronics and informatics (ICOEI), pp. 916-920, 2019.
  9. T. Radivilova, L. Kirichenko, D. Ageiev, and V. Bulakh, “Classification methods of machine learning to detect DDoS attacks,” In 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), vol. 1, pp. 207-210, 2019.
  10. H. Liu and B. Lang, “Machine learning and deep learning methods for intrusion detection systems: A survey,” applied sciences, vol. 9, no. 20, 2019.
  11. M. Asad, M.Asim, T. Javed, M. O. Beg, H. Mujtaba, and S. Abbas, “Deepdetect: detection of distributed denial of service attacks using deep learning,” The Computer Journal, vol. 63, no. 7, pp. 983-994, 2022.
  12. A.K. Sahu, S. Sharma, M. Tanveer, and R. Raja, “Internet of Things attack detection using hybrid Deep Learning Model,” Computer Communications, vol. 176, pp. 146-154, 2021.
  13. A.Abusitta, G. H. de Carvalho, O. A. Wahab, T. Halabi, B. C. Fung, and S. Al Mamoori, “Deep learning-enabled anomaly detection for IoT systems,” Internet of Things, vol. 21, 2023.
  14. S. Dwibedi, M. Pujari, and W. Sun, “A comparative study on contemporary intrusion detection datasets for machine learning research,” In 2020 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 1-6, 2020.