Javascript must be enabled to continue!
An Effective Conversation‐Based Botnet Detection Method
View through CrossRef
A botnet is one of the most grievous threats to network security since it can evolve into many attacks, such as Denial‐of‐Service (DoS), spam, and phishing. However, current detection methods are inefficient to identify unknown botnet. The high‐speed network environment makes botnet detection more difficult. To solve these problems, we improve the progress of packet processing technologies such as New Application Programming Interface (NAPI) and zero copy and propose an efficient quasi‐real‐time intrusion detection system. Our work detects botnet using supervised machine learning approach under the high‐speed network environment. Our contributions are summarized as follows: (1) Build a detection framework using PF_RING for sniffing and processing network traces to extract flow features dynamically. (2) Use random forest model to extract promising conversation features. (3) Analyze the performance of different classification algorithms. The proposed method is demonstrated by well‐known CTU13 dataset and nonmalicious applications. The experimental results show our conversation‐based detection approach can identify botnet with higher accuracy and lower false positive rate than flow‐based approach.
Title: An Effective Conversation‐Based Botnet Detection Method
Description:
A botnet is one of the most grievous threats to network security since it can evolve into many attacks, such as Denial‐of‐Service (DoS), spam, and phishing.
However, current detection methods are inefficient to identify unknown botnet.
The high‐speed network environment makes botnet detection more difficult.
To solve these problems, we improve the progress of packet processing technologies such as New Application Programming Interface (NAPI) and zero copy and propose an efficient quasi‐real‐time intrusion detection system.
Our work detects botnet using supervised machine learning approach under the high‐speed network environment.
Our contributions are summarized as follows: (1) Build a detection framework using PF_RING for sniffing and processing network traces to extract flow features dynamically.
(2) Use random forest model to extract promising conversation features.
(3) Analyze the performance of different classification algorithms.
The proposed method is demonstrated by well‐known CTU13 dataset and nonmalicious applications.
The experimental results show our conversation‐based detection approach can identify botnet with higher accuracy and lower false positive rate than flow‐based approach.
Related Results
Funkcije komunikacijski relevantne šutnje u njemačkome
Funkcije komunikacijski relevantne šutnje u njemačkome
Additionally, this chapter presents research of silence with review of main aspects of papers in the field of conversational analysis, ethnography of communication and metaphor of ...
Mitigating Botnet Attack Using Encapsulated Detection Mechanism (EDM)
Mitigating Botnet Attack Using Encapsulated Detection Mechanism (EDM)
Botnet as it is popularly called became fashionable in recent times owing to it embedded force on network servers. Botnet has an exponential growth of a...
Towards a Universal Features Set for IoT Botnet Attacks Detection
Towards a Universal Features Set for IoT Botnet Attacks Detection
Abstract
The security pitfalls of IoT devices make it easy for the attackers to exploit the IoT devices and make them a part of a botnet. Once hundreds of thousands of IoT ...
Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning
Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning
The Industrial Revolution 4.0 began with the breakthrough technological advances in 5G, and artificial intelligence has innovatively transformed the manufacturing industry from dig...
A Meta-Classification Model for Optimized ZBot Malware Prediction Using Learning Algorithms
A Meta-Classification Model for Optimized ZBot Malware Prediction Using Learning Algorithms
Botnets pose a real threat to cybersecurity by facilitating criminal activities like malware distribution, attacks involving distributed denial of service, fraud, click fraud, phis...
Machine Learning-based Information Security Model for Botnet Detection
Machine Learning-based Information Security Model for Botnet Detection
Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated ...
A STUDY ON ADVANCED BOTNETS DETECTION IN VARIOUS COMPUTING SYSTEMS USING MACHINE LEARNING TECHNIQUES
A STUDY ON ADVANCED BOTNETS DETECTION IN VARIOUS COMPUTING SYSTEMS USING MACHINE LEARNING TECHNIQUES
Due to the rapid growth and use of Emerging technologies such as Artificial Intelligence, Machine Learning and Internet of Things, Information industry became so popular, meanwhile...
Computer-Mediated Chat
Computer-Mediated Chat
The technical apparatus is, then, being made at home with the rest of our world. And that's a thing that's routinely being done, and it's the source of the failure of technocratic ...

