Intelligent detection of network security vulnerabilities based on machine learning and penetration behavior analysis

Authors

  • Xiaoyang Qiao
  • Xin Ai
  • Yiping Wu
  • Shuo Zhang
  • Bei Hu
  • Yunxia Yu

DOI:

https://doi.org/10.54097/qc3ztm73

Keywords:

Machine Learning, Network Security, Penetration Testing

Abstract

With the increasing frequency of network attacks, the traditional methods of network vulnerability detection are faced with many challenges. Within this manuscript, a network vulnerability detection framework, utilizing a deep neural network (DNN) that amalgamates advanced deep learning techniques with conventional machine learning methodologies, is posited to enhance discernment capabilities when pinpointing potential threats within network data streams. Through the nonlinear combination of multi-layer neurons, the model can effectively capture complex feature relationships, so as to achieve accurate classification of normal traffic and attack traffic. The model's structure encompasses an input stratum, manifold concealed strata, and an outer stratum. The ReLU activation function is harnessed to amplify the model's nonlinearity, incorporating the Sigmoid activation function in the latest layer augments the process of binary categorization. The choice of binary cross entropy as the loss function is made to refine the model's performance. The experimental blueprint ensures data integrity and dependability via the procedural measures of data prepossessing, feature culling, and normalization. In the training process, the weight of the model is constantly updated by backpropagation algorithm to improve its generalization ability on unknown data.

Downloads

Download data is not yet available.

References

[1] Liu Z. Intelligent classification of computer vulnerabilities and network security management system: Combining memristor neural network and improved TCNN model. PloS one. 2025 Jan 27;20(1):e0318075.

[2] Liu Z. Intelligent classification of computer vulnerabilities and network security management system: Combining memristor neural network and improved TCNN model. PloS one. 2025 Jan 27;20(1):e0318075.

[3] Arreche O, Abdallah M. A Comparative Analysis of DNN-based White-Box Explainable AI Methods in Network Security. arxiv preprint arxiv:2501.07801.

[4] Wu C, Wu F. Design and Implementation of Node Degree Centrality Computing of Network Security Database Based on Knowledge Graph. Security and Privacy. 2025 Jan;8(1):e473.

[5] Olutimehin AT. The Synergistic Role of Machine Learning, Deep Learning, and Reinforcement Learning in Strengthening Cyber Security Measures for Crypto Currency Platforms. Deep Learning, and Reinforcement Learning in Strengthening Cyber Security Measures for Crypto Currency Platforms (February 11, 2025). 2025 Feb 11.

[6] Y. Lecun, Y. Bengio, G. Hinton. Deep learning[J]. Nature, 2015, 521(7553): 436-444.

[7] Wang S, Liu T, Tan L. Automatically learning semantic features for defect prediction[C]//Proceedings of the 38th International Conference on Software Engineering, 2016: 297-308.

[8] Y. Shi , Y. E. Sagduyu , K. Davaslioglu . Vulnerability Detection and Analysis in Adversarial Deep Learning[J]. Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach, 2018: 211-234.

[9] P. Tsankov, A. Dan , D. Drachsler-Cohen. Securify: Practical Security Analysis of Smart Contracts[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018: 67-82.

[10] Markkandeyan S, Ananth AD, Rajakumaran M, Gokila RG, Venkatesan R, Lakshmi B. Novel hybrid deep learning based cyber security threat detection model with optimization algorithm. Cyber Security and Applications. 2025 Dec 1;3:100075.

[11] Battistello A, Bertoni G, Corrias M, Nava L, Rusconi D, Zoia M, Pierazzi F, Lanzi A. Unveiling ECC Vulnerabilities: LSTM Networks for Operation Recognition in Side-Channel Attacks. arxiv preprint arxiv:2502.17330. 2025 Feb 24.

[12] Hussain H, Kainat M, Ali T. Leveraging AI and Machine Learning to Detect and Prevent Cyber Security Threats. Dialogue Social Science Review (DSSR). 2025 Jan 22;3(1):881-95.

Downloads

Published

28-03-2025

Issue

Section

Articles

How to Cite

Qiao, X., Ai, X., Wu, Y., Zhang, S., Hu, B., & Yu, Y. (2025). Intelligent detection of network security vulnerabilities based on machine learning and penetration behavior analysis. Journal of Computing and Electronic Information Management, 16(2), 51-55. https://doi.org/10.54097/qc3ztm73