Intelligent detection of network security vulnerabilities based on machine learning and penetration behavior analysis
DOI:
https://doi.org/10.54097/qc3ztm73Keywords:
Machine Learning, Network Security, Penetration TestingAbstract
With the increasing frequency of network attacks, the traditional methods of network vulnerability detection are faced with many challenges. Within this manuscript, a network vulnerability detection framework, utilizing a deep neural network (DNN) that amalgamates advanced deep learning techniques with conventional machine learning methodologies, is posited to enhance discernment capabilities when pinpointing potential threats within network data streams. Through the nonlinear combination of multi-layer neurons, the model can effectively capture complex feature relationships, so as to achieve accurate classification of normal traffic and attack traffic. The model's structure encompasses an input stratum, manifold concealed strata, and an outer stratum. The ReLU activation function is harnessed to amplify the model's nonlinearity, incorporating the Sigmoid activation function in the latest layer augments the process of binary categorization. The choice of binary cross entropy as the loss function is made to refine the model's performance. The experimental blueprint ensures data integrity and dependability via the procedural measures of data prepossessing, feature culling, and normalization. In the training process, the weight of the model is constantly updated by backpropagation algorithm to improve its generalization ability on unknown data.
Downloads
References
[1] Liu Z. Intelligent classification of computer vulnerabilities and network security management system: Combining memristor neural network and improved TCNN model. PloS one. 2025 Jan 27;20(1):e0318075.
[2] Liu Z. Intelligent classification of computer vulnerabilities and network security management system: Combining memristor neural network and improved TCNN model. PloS one. 2025 Jan 27;20(1):e0318075.
[3] Arreche O, Abdallah M. A Comparative Analysis of DNN-based White-Box Explainable AI Methods in Network Security. arxiv preprint arxiv:2501.07801.
[4] Wu C, Wu F. Design and Implementation of Node Degree Centrality Computing of Network Security Database Based on Knowledge Graph. Security and Privacy. 2025 Jan;8(1):e473.
[5] Olutimehin AT. The Synergistic Role of Machine Learning, Deep Learning, and Reinforcement Learning in Strengthening Cyber Security Measures for Crypto Currency Platforms. Deep Learning, and Reinforcement Learning in Strengthening Cyber Security Measures for Crypto Currency Platforms (February 11, 2025). 2025 Feb 11.
[6] Y. Lecun, Y. Bengio, G. Hinton. Deep learning[J]. Nature, 2015, 521(7553): 436-444.
[7] Wang S, Liu T, Tan L. Automatically learning semantic features for defect prediction[C]//Proceedings of the 38th International Conference on Software Engineering, 2016: 297-308.
[8] Y. Shi , Y. E. Sagduyu , K. Davaslioglu . Vulnerability Detection and Analysis in Adversarial Deep Learning[J]. Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach, 2018: 211-234.
[9] P. Tsankov, A. Dan , D. Drachsler-Cohen. Securify: Practical Security Analysis of Smart Contracts[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018: 67-82.
[10] Markkandeyan S, Ananth AD, Rajakumaran M, Gokila RG, Venkatesan R, Lakshmi B. Novel hybrid deep learning based cyber security threat detection model with optimization algorithm. Cyber Security and Applications. 2025 Dec 1;3:100075.
[11] Battistello A, Bertoni G, Corrias M, Nava L, Rusconi D, Zoia M, Pierazzi F, Lanzi A. Unveiling ECC Vulnerabilities: LSTM Networks for Operation Recognition in Side-Channel Attacks. arxiv preprint arxiv:2502.17330. 2025 Feb 24.
[12] Hussain H, Kainat M, Ali T. Leveraging AI and Machine Learning to Detect and Prevent Cyber Security Threats. Dialogue Social Science Review (DSSR). 2025 Jan 22;3(1):881-95.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Journal of Computing and Electronic Information Management

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.