International Journal of Wireless and Ad Hoc Communication IJWAC 2692-4056 10.54216/IJWAC https://www.americaspg.com/journals/show/1439 2019 2019 Cyber Attack Detection in Wireless Adhoc Network using Artificial Intelligence Faculty of Artificial Intelligence, Egyptian Russian University (ERU), Cairo, Egypt Mahmoud Mahmoud Faculty of Computers and Information, Sadat Academy for Management Sciences, Cairo, Egypt & French University in Cairo, Egypt Nabil M. Eldakhly A wireless sensor network, also known as a WSN, is made up of thousands of minuscule sensor nodes that are connected to one another in order to monitor, track, and organize data collected in an unattended environment in the most prominent location. Due to its one-of-a-kind qualities, it has, the wireless sensor network is gaining traction in a variety of sectors and put to use in a wide range of applications, including surveillance, healthcare, and industry. These networks exposed to a variety of security flaws and major threats because of their dynamic design and deployment in an unsupervised environment. Cybercriminals prey on individuals who utilize the internet as well as organizations in order to get sensitive information. The hackers were able to access critical data on the company's systems, such as login information, credit card details, and bank account numbers. Phishing attacks are a sort of cyberattack in which hackers trick internet users into believing their websites are authentic in order to collect the users' private information. The purpose of these attacks is to steal this information. Malware assaults begin with the covert installation of malicious software on corporate servers or user PCs via the use of the internet. The attackers then continue to steal every piece of information that kept on the targeted server or computer. Malware used in an ever-increasing number of attacks these days. An incursion into a network is a kind of attack in which the perpetrator seeks to take possession of all of the network's resources. Approaches based on heuristic analysis and visual resemblance used, regardless of whether they are blacklisted or whitelisted. 2023 2023 18 33 10.54216/IJWAC.060202 https://www.americaspg.com/articleinfo/20/show/1439