Machine Learning-Based Password Vulnerability Detection and Strength Assessment System for Consumer Wi-Fi Routers


Authors : Amaka Eugenia Ngozi; Okpalla Chidimma Lilian; Ezea Jonathan Ikechukwu; Ibeneme-Sabinus Ifeoma Livina; Nworuh Godwinner Emeka; Atomatofa Emmanuel Oghenero; Gloria Ngozi Ezeh; Ugbor Ihechiluru Chinwe; A. A. Galadima

Volume/Issue : Volume 11 - 2026, Issue 2 - February


Google Scholar : https://tinyurl.com/4j7vma37

Scribd : https://tinyurl.com/y4su97zk

DOI : https://doi.org/10.38124/ijisrt/26feb804

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : The improvement of consumer-grade Wi-fi routers greatly ascertained wide access to the global internet, though with numerous security challenges. Thus, existing research evidence confirmed that many users maintain weak passwords, while routers firmware were left outdated and lots of security misconfiguration settings. However, these security flaws were exploited by various attack mechanisms such as brute force attacks, phishing attacks among others, leading to invasion of user’s privacy and campaign launch for distributed denial-of-service (DDoS). Notably, this research developed Secured Router Security Assessment System (SRSAS), applying a machine learning mechanism for evaluating Wi-Fi router password authentications. The system, however, classified the password authentication into three different categories such as Weak, Good and Strong. Similarly, the system used 60,000 datasets of labelled passwords to train the models. Hence, improving the reliability of the system incorporated entropy analysis, checking against known data breaches and generating suggestions to the users for stronger passwords. The results show that the system performs well in predicting password strength and in offering realistic advice for improving router security. The work therefore contributes both academically and practically: it demonstrates how machine learning can be applied to real-world network security and gives everyday users a tool for improving the safety of their home routers.

Keywords : Router Security, Wi-Fi Vulnerability, Password Strength, Machine Learning, Entropy Analysis.

References :

  1. Alturki, B., & Alsulami, A. A. (2025). Semi-Supervised Learning with Entropy Filtering for Intrusion Detection in Asymmetrical IoT Systems. Symmetry, 17(6). https://doi.org/10.3390/sym17060973
  2. Ammu, E., & Devanathan, B. (n.d.). A Comparison study of various Wireless Intrusion Detection Systems. International Journal on Science and Technology (IJSAT) IJSAT25049500, 16(4). Retrieved www.ijsat.org•
  3. Bhardwaj, A., Bharany, S., Abulfaraj, A. W., Osman Ibrahim, A., & Nagmeldin, W. (2024). Fortifying home IoT security: A framework for comprehensive examination of vulnerabilities and intrusion detection strategies for smart cities. Egyptian Informatics Journal, 25. https://doi.org/10.1016/j.eij.2024.100443
  4. Chatzisofroniou, G., & Kotzanikolaou, P. (2025). Security analysis of the Wi-Fi Easy Connect. International Journal of Information Security, 24(2). https://doi.org/10.1007/s10207-025-00988-3
  5. Farhan, M., Waheed ud din, H., Ullah, S., Hussain, M. S., Khan, M. A., Mazhar, T., Khattak, U. F., & Jaghdam, I. H. (2025). Network-based intrusion detection using deep learning technique. Scientific Reports, 15(1), 1–15. https://doi.org/10.1038/s41598-025-08770-0
  6. Gambo, A. Y., Gambo, F. L., Abdullahi, A. A., Ibrahim, N., Maitama, Y. I., & Zakari, Z. A. (2024a). Improving intrusion detection system accuracy using deep neural network. Dutse Journal of Pure and Applied Sciences, 10(2c), 68–74. https://doi.org/10.4314/dujopas.v10i2c.7
  7. Gambo, A. Y., Gambo, F. L., Abdullahi, A. A., Ibrahim, N., Maitama, Y. I., & Zakari, Z. A. (2024b). Improving intrusion detection system accuracy using deep neural network. Dutse Journal of Pure and Applied Sciences, 10(2c), 68–74. https://doi.org/10.4314/dujopas.v10i2c.7
  8. Hu, H., Myers, S., Colizza, V., & Vespignani, A. (2009). WiFi networks and malware epidemiology. www.pnas.org/cgi/content/full/
  9. Karmous, N., Aoueileyine, M. O. E., Abdelkader, M., Romdhani, L., & Youssef, N. (2024). Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices. Sensors, 24(15). https://doi.org/10.3390/s24155022
  10. Kaushik, K., Bhardwaj, A., & Dahiya, S. (2025). Framework to analyze and exploit the smart home IoT firmware. Measurement: Sensors, 37. https://doi.org/10.1016/j.measen.2024.101406
  11. Liu, J. (2024). Enhancing Network Security Through Router-Based Firewalls: An Investigation into Design, Effectiveness, and Human Factors. In Highlights in Science, Engineering and Technology CSIC (Vol. 2023).
  12. M. M., Y., K. G., F., M., C., & L. C., O. (2024). An Efficient Security Routing Protocol for Cloud-Based Networks Using Cisco Packet Tracer. British Journal of Computer, Networking and Information Technology, 7(2), 49–67. https://doi.org/10.52589/bjcnit-oyirlauk
  13. Magara, T., & Zhou, Y. (2024). Internet of Things (IoT) of Smart Homes: Privacy and Security. Journal of Electrical and Computer Engineering, 2024. https://doi.org/10.1155/2024/7716956
  14. Oughton, E., Geraci, G., Polese, M., Shah, V., Bubley, D., & Blue, S. (2024). Reviewing wireless broadband technologies in the peak smartphone era: 6G versus Wi-Fi 7 and 8. Telecommunications Policy, 48(6). https://doi.org/10.1016/j.telpol.2024.102766
  15. Quach, S., Dang, S., Thaichon, P., Le, D., & Le, T. H. H. (2025). Data vulnerability: does privacy protection behaviour improve digital well-being? European Journal of Marketing. https://doi.org/10.1108/EJM-12-2022-0953
  16. Radha, M. C., Midunkumar, M. R., Muralibabu, M. S., Partheeban, M. V, & Mani, M. C. (n.d.). Enhancement of Security in Wireless Network. In International Journal of Scientific Research & Engineering Trends (Vol. 10, Number 6).
  17. Sebestyen, H., Popescu, D. E., & Zmaranda, R. D. (2025). A Literature Review on Security in the Internet of Things: Identifying and Analysing Critical Categories. In Computers (Vol. 14, Number 2). Multidisciplinary Digital Publishing Institute (MDPI). https://doi.org/10.3390/computers14020061
  18. Sivagaminathan, V., Sharma, M., & Henge, S. K. (2023). Intrusion detection systems for wireless sensor networks using computational intelligence techniques. Cybersecurity, 6(1). https://doi.org/10.1186/s42400-023-00161-0
  19. Su, B., Huang, J., Miao, K., Wang, Z., Zhang, X., & Chen, Y. (2023). K-Anonymity Privacy Protection Algorithm for Multi-Dimensional Data against Skewness and Similarity Attacks. Sensors, 23(3). https://doi.org/10.3390/s23031554
  20. Sugai, R., Sei, Y., Tahara, Y., & Ohsuga, A. (2023). A k-Anonymization Method for Social Network Data with Link Prediction. International Conference on Information Systems Security and Privacy, 493–500. https://doi.org/10.5220/0011676800003405
  21. Sweeney, L. (2002). L. Sweeney. k-anonymity: a model for k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY 1. In International Journal on Uncertainty, Fuzziness and Knowledge-based Systems (Vol. 10, Number 5).
  22. Torra, V., & Navarro-Arribas, G. (2023). Attribute disclosure risk for k-anonymity: the case of numerical data. International Journal of Information Security, 22(6), 2015–2024. https://doi.org/10.1007/s10207-023-00730-x
  23. Ussipov, N., Akhtanov, S., Turlykozhayeva, D., Temesheva, S., Akhmetali, A., Zaidyn, M., Namazbayev, T., Bolysbay, A., Akniyazova, A., & Tang, X. (2024). MEGA: Maximum-Entropy Genetic Algorithm for Router Nodes Placement in Wireless Mesh Networks. Sensors, 24(20). https://doi.org/10.3390/s24206735
  24. Valvi, H., Mohan, A., & Nair, S. S. (2025). Analyzing Router Firmware for Potential Security Weaknesses. International Research Journal of Engineering and Technology. www.irjet.net
  25. Vardakis, G., Hatzivasilis, G., Koutsaki, E., & Papadakis, N. (2024). Review of Smart-Home Security Using the Internet of Things. In Electronics (Switzerland) (Vol. 13, Number 16). Multidisciplinary Digital Publishing Institute (MDPI). https://doi.org/10.3390/electronics13163343
  26. Vehkjärvi, P. (n.d.). Understanding the Risks of Home Wi-Fi Router Breaches on Corporate Off-Site.
  27. Xing, L., Zhang, D., Wu, H., Ma, H., & Zhang, X. (2023). Distributed K-Anonymous Location Privacy Protection Algorithm Based on Interest Points and User Social Behavior. Electronics (Switzerland), 12(11). https://doi.org/10.3390/electronics12112446
  28. Ye, J., de Carné de Carnavalet, X., Zhao, L., Zhang, M., Wu, L., & Zhang, W. (2024). Exposed by Default: A Security Analysis of Home Router Default Settings. ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 63–79. https://doi.org/10.1145/3634737.3637671
  29. Ye, J., De Carne De Carnavalet, X., Zhao, L., Zhang, M., Wu, L., & Zhang, W. (2025). Exposed by Default: A Security Analysis of Home Router Default Settings and Beyond. IEEE Internet of Things Journal, 12(2), 1182–1199. https://doi.org/10.1109/JIOT.2024.3502405

The improvement of consumer-grade Wi-fi routers greatly ascertained wide access to the global internet, though with numerous security challenges. Thus, existing research evidence confirmed that many users maintain weak passwords, while routers firmware were left outdated and lots of security misconfiguration settings. However, these security flaws were exploited by various attack mechanisms such as brute force attacks, phishing attacks among others, leading to invasion of user’s privacy and campaign launch for distributed denial-of-service (DDoS). Notably, this research developed Secured Router Security Assessment System (SRSAS), applying a machine learning mechanism for evaluating Wi-Fi router password authentications. The system, however, classified the password authentication into three different categories such as Weak, Good and Strong. Similarly, the system used 60,000 datasets of labelled passwords to train the models. Hence, improving the reliability of the system incorporated entropy analysis, checking against known data breaches and generating suggestions to the users for stronger passwords. The results show that the system performs well in predicting password strength and in offering realistic advice for improving router security. The work therefore contributes both academically and practically: it demonstrates how machine learning can be applied to real-world network security and gives everyday users a tool for improving the safety of their home routers.

Keywords : Router Security, Wi-Fi Vulnerability, Password Strength, Machine Learning, Entropy Analysis.

Paper Submission Last Date
31 - March - 2026

SUBMIT YOUR PAPER CALL FOR PAPERS
Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe