School of Computing, College of Arts and Science, University Utara Malaysia (UUM), Sintok, Kedah, Malaysia.
World Journal of Advanced Research and Reviews, 2025, 27(01), 063-074
Article DOI: 10.30574/wjarr.2025.27.1.2463
Received on 17 May 2025; revised on 28 June 2025; accepted on 30 June 2025
The evolving nature of cyber threats, especially zero-day exploits, demands a shift from traditional reactive security mechanisms to proactive and predictive defense strategies. This paper explores the integration of Artificial Intelligence (AI) with ethical hacking tools to enhance predictive vulnerability detection, focusing on Snort and Maltego. By embedding machine learning algorithms into these tools, their capabilities in anomaly detection and threat intelligence are significantly enhanced. This research investigates the integration of machine learning (ML) algorithms into ethical hacking tools, Snort and Maltego to strengthen their anomaly detection and threat intelligence functionalities. This study presents AI-driven framework where supervised and unsupervised learning models are embedded into Snort for packet level anomaly detection and into Maltego for enhanced threat correlation. Applying machine learning algorithms to detect and classify threats based on data from live network traffic and threat intelligence sources. Training and evaluation methods are used to improve accuracy and reduce false alarms. Although challenges like data labelling, changing patterns, and ethical issues exist, this approach greatly strengthens early threat detection and response. This research supports the advancement of intelligent cybersecurity systems capable of proactive threat mitigation.
Artificial Intelligence; Ethical Hacking; Machine Learning; Predictive Detection; Snort; Maltego
Preview Article PDF
Mullaishselvi Krishnasamy and Mohamad Fadli bin Zolkipli. Integration of AI with ethical hacking tools for predictive vulnerability detection. World Journal of Advanced Research and Reviews, 2025, 27(01), 063-074. Article DOI: https://doi.org/10.30574/wjarr.2025.27.1.2463.
Copyright © 2025 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0