Architecture and Model of Neural Network Based Service for Choice of the Penetration Testing Tools

Authors

  • Artem Tetskyi
  • Vyacheslav Kharchenko
  • Dmytro Uzun
  • Artem Nechausov

DOI:

https://doi.org/10.47839/ijc.20.4.2438

Keywords:

neural network, web service, cybersecurity, penetration testing, web applications, tools

Abstract

During penetration testing of web applications, different tools are actively used to relieve the tester from repeating monotonous operations. The difficulty of the choice is in the fact that there are tools with similar functionality, and it is hard to define which tool is best to choose for a particular case. In this paper, a solution of the problem with making a choice by creating a Web service that will use a neural network on the server side is proposed. The neural network is trained on data obtained from experts in the field of penetration testing. A trained neural network will be able to select tools in accordance with specified requirements. Examples of the operation of a neural network trained on a small sample of data are shown. The effect of the number of neural network learning epochs on the results of work is shown. An example of input data is given, in which the neural network could not select the tool due to insufficient data for training. The advantages of the method shown are the simplicity of implementation (the number of lines of code is used as a metric) and the possibility of using opinions about tools from various experts. The disadvantages include the search for data for training, the need for experimental selection of the parameters of the neural network and the possibility of situations where the neural network will not be able to select tool that meets the specified requirements.

References

M. Vieira, N. Antunes and H. Madeira, “Using web security scanners to detect vulnerabilities in web services,” in Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems & Networks, Lisbon, Portugal, June 29 - July 2, 2009, pp. 566-571. https://doi.org/10.1109/DSN.2009.5270294.

N. Awang and A. Manaf, “Detecting vulnerabilities in web applications using automated black box and manual penetration testing,” in Proceedings of the International Conference on Advances in Security of Information and Communication Networks SecNet’2013, Cairo, Egypt, September 3-5, 2013, pp. 230-239. https://doi.org/10.1007/978-3-642-40597-6_20.

F. R. Muñoz, I. I. S. Cortes and L. J. G. Villalba, “Enlargement of vulnerable web applications for testing,” The Journal of Supercomputing, vol. 74, issue 12, pp. 6598-6617, 2018. https://doi.org/10.1007/s11227-017-1981-2.

A. Doupé, M. Cova and G. Vigna, “Why Johnny can’t pentest: An analysis of black-box web vulnerability scanners,” in Proceedings of the International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment DIMVA’2010, Bonn, Germany, July 8-9, 2010, pp. 111-131. https://doi.org/10.1007/978-3-642-14215-4_7.

M. C. Nicoletti, J. R. Bertini Jr., D. Elizondo, L. Franco and J. M. Jerez, “Constructive neural network algorithms for feedforward architectures suitable for classification tasks,” in: L. Franco, D. A. Elizondo, J. M. Jerez (Eds.), Constructive Neural Networks, Berlin, Heidelberg, 2010, pp. 1-23. https://doi.org/10.1007/978-3-642-04512-7_1.

R. Sadeghian and M. R. Sadeghian, “A decision support system based on artificial neural network and fuzzy analytic network process for selection of machine tools in a flexible manufacturing system,” International Journal of Advanced Manufacturing Technology, vol. 82, issue 9-12, pp. 1795-1803, 2016. https://doi.org/10.1007/s00170-015-7440-4.

J. Saxe and K. Berlin, “Deep neural network based malware detection using two dimensional binary program features,” in Proceedings of the 2015 10th International Conference on Malicious and Unwanted Software (MALWARE), Fajardo, Puerto Rico, October 20-22, 2015, pp. 11-20. https://doi.org/10.1109/MALWARE.2015.7413680.

M. Alazab, S. Venkatraman, S. Watters and M. Alazab, “Zero-day malware detection based on supervised learning algorithms of API call signatures,” in Proceedings of the Ninth Australasian Data Mining Conference, vol. 121, Ballarat, Australia, December 1-2, 2011, pp. 171-182.

A. S. Ashoor and S. Gore, “Difference between intrusion detection system (IDS) and intrusion prevention system (IPS),” in Proceedings of the International Conference on Network Security and Applications, Chennai, India, July 15-17, 2011, pp. 497-501. https://doi.org/10.1007/978-3-642-22540-6_48.

S. S. Roy, A. Mallik, R. Gulati, M. S. Obaidat and P. V. Krishna, “A deep learning based artificial neural network approach for intrusion detection,” in Proceedings of the International Conference on Mathematics and Computing, Haldia, India, January 17-21, 2017, pp. 44-53. https://doi.org/10.1007/978-981-10-4642-1_5.

A. Tetskyi, V. Kharchenko and D. Uzun, “Neural networks based choice of tools for penetration testing of web applications,” in Proceedings of the 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT’2018), Kyiv, Ukraine, May 24-27, 2018, pp. 402-405. https://doi.org/10.1109/DESSERT.2018.8409167.

S. Nissen and E. Nemerson, Fast Artificial Neural Network Library (FANN), [Online]. Available at: http://leenissen.dk/fann/html/files/fann-h.html

M. Mirjalili, A. Nowroozi and M. Alidoosti, “A survey on web penetration test,” Advances in Computer Science: An International Journal, Los Alamitos, CA, vol. 3, issue 6, no. 12, pp. 107-121, 2014.

J. E. Dayhoff and J. M. DeLeo, “Artificial neural networks: opening the black box,” Cancer: Interdisciplinary International Journal of the American Cancer Society, vol. 91, no. S8, pp. 1615-1635, 2001. https://doi.org/10.1002/1097-0142(20010415)91:8+<1615::AID-CNCR1175>3.0.CO;2-L.

C. Y. Chen, J. R. C. Hsu and C. W. Chen, “Fuzzy logic derivation of neural network models with time delays in subsystems,” International Journal on Artificial Intelligence Tools, vol. 14, no. 6, pp. 967-974, 2005. https://doi.org/10.1142/S021821300500248X.

Kali Linux Tools Listing, 2019, [Online]. Available at: https://tools.kali.org/tools-listing

H. Park and S. Baek, “An empirical validation of a neural network model for software effort estimation,” Expert Systems with Applications: An International Journal, vol. 35, issue 3, pp. 929-937, 2008. https://doi.org/10.1016/j.eswa.2007.08.001.

T. Masters, Practical Neural Network Recipes in C++, Morgan Kaufmann, 1993, 493 p. https://doi.org/10.1016/B978-0-08-051433-8.50017-3.

X. Glorot and Y. Bengio, “Understanding the difficulty of training deep feedforward neural networks,” in Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, Sardinia, Italy, May 13-15, 2010, pp. 249-256.

C. Igel and M. Hüsken, Improving the Rprop Learning Algorithm, in: H. Bothe, R. Rojas (Eds.), Proceedings of the Second International ICSC Symposium on Neural Computation (NC 2000), vol. 2000, ICSC Academic Press, 2000, pp. 115-121.

R. Setiono, “Feedforward neural network construction using cross validation,” Neural Computation, vol. 13, no. 12, pp. 2865-2877, 2001. https://doi.org/10.1162/089976601317098565.

Downloads

Published

2021-12-31

How to Cite

Tetskyi, A., Kharchenko, V., Uzun, D., & Nechausov, A. (2021). Architecture and Model of Neural Network Based Service for Choice of the Penetration Testing Tools. International Journal of Computing, 20(4), 513-518. https://doi.org/10.47839/ijc.20.4.2438

Issue

Section

Articles