Javascript must be enabled to continue!
A Hybrid Association Rule-Based Method to Detect and Classify Botnets
View through CrossRef
Nowadays, botnet has become a threat in the area of cybersecurity, and, worse still, it is difficult to be detected in complex network environments. Thus, traffic analysis is adopted to detect the botnet since this kind of method is practical and effective; however, the false rate is very high. The reason is that normal traffic and botnet traffic are quite close to the border, making it so difficult to be recognized. In this paper, we propose an algorithm based on a hybrid association rule to detect and classify the botnets, which can calculate botnets’ boundary traffic features and receive effects in the identification between normal and botnet traffic ideally. First, after collecting the data of different botnets in a laboratory, we analyze botnets traffic features by processing a data mining on it. The suspicious botnet traffic is filtered through DNS protocol, black and white list, and real-time feature filtering methods. Second, we analyze the correlation between domain names and IP addresses. Combining with the advantages of the existing time-based detection methods, we do a global correlation analysis on the characteristics of botnets, to judge whether the detection objects can be botnets according to these indicators. Then, we calculate these parameters, including the support, trust, and membership functions for association rules, to determine which type of botnet it belongs to. Finally, we process the test by using the public dataset and it turns out that the accuracy of our algorithm is higher.
Title: A Hybrid Association Rule-Based Method to Detect and Classify Botnets
Description:
Nowadays, botnet has become a threat in the area of cybersecurity, and, worse still, it is difficult to be detected in complex network environments.
Thus, traffic analysis is adopted to detect the botnet since this kind of method is practical and effective; however, the false rate is very high.
The reason is that normal traffic and botnet traffic are quite close to the border, making it so difficult to be recognized.
In this paper, we propose an algorithm based on a hybrid association rule to detect and classify the botnets, which can calculate botnets’ boundary traffic features and receive effects in the identification between normal and botnet traffic ideally.
First, after collecting the data of different botnets in a laboratory, we analyze botnets traffic features by processing a data mining on it.
The suspicious botnet traffic is filtered through DNS protocol, black and white list, and real-time feature filtering methods.
Second, we analyze the correlation between domain names and IP addresses.
Combining with the advantages of the existing time-based detection methods, we do a global correlation analysis on the characteristics of botnets, to judge whether the detection objects can be botnets according to these indicators.
Then, we calculate these parameters, including the support, trust, and membership functions for association rules, to determine which type of botnet it belongs to.
Finally, we process the test by using the public dataset and it turns out that the accuracy of our algorithm is higher.
Related Results
Understanding Botnets: Architecture, Attacks, and Mitigation Strategies
Understanding Botnets: Architecture, Attacks, and Mitigation Strategies
Botnets represents a significant threat in the cybersecurity landscape. Botnets relies on the set of compromised devices called as bots or zombies which are remotely connected and ...
Detecting Malicious Botnets in IoT Networks Using Machine Learning Techniques
Detecting Malicious Botnets in IoT Networks Using Machine Learning Techniques
The widespread use of the Internet of Things (IoT) has led to a rise in botnet attacks, with the Mirai botnet being a major source of Distributed Denial of Service (DDOS) attacks. ...
A STUDY ON ADVANCED BOTNETS DETECTION IN VARIOUS COMPUTING SYSTEMS USING MACHINE LEARNING TECHNIQUES
A STUDY ON ADVANCED BOTNETS DETECTION IN VARIOUS COMPUTING SYSTEMS USING MACHINE LEARNING TECHNIQUES
Due to the rapid growth and use of Emerging technologies such as Artificial Intelligence, Machine Learning and Internet of Things, Information industry became so popular, meanwhile...
Reviewing the Current Threat Landscape of Botnets
Reviewing the Current Threat Landscape of Botnets
Botnets have been around for about three decades, and their sophistication and capabilities have evolved rapidly over the period. Originally simple codes that were used for the adm...
An International Rule of Law
An International Rule of Law
The “international rule of law” is an elusive concept. Under this heading, mainly two variations are being discussed: The international rule of law “proper” and an “internationaliz...
Integrated Effecient Approach to Botnet Detection using Supervised Machine Learning
Integrated Effecient Approach to Botnet Detection using Supervised Machine Learning
Abstract
Botnets are one of the most significant threats to cybersecurity. These are networks of compromised nodes of computers and other devices on the internet commonly u...
Are Cervical Ribs Indicators of Childhood Cancer? A Narrative Review
Are Cervical Ribs Indicators of Childhood Cancer? A Narrative Review
Abstract
A cervical rib (CR), also known as a supernumerary or extra rib, is an additional rib that forms above the first rib, resulting from the overgrowth of the transverse proce...
Nanogold and nanosilver hybrid polymer materials
Nanogold and nanosilver hybrid polymer materials
<p>Significant opportunities exist in both the scientific and industrial sectors for the development of new generation hybrid materials. These multifunctional hybrid material...

