scholarly journals BOTNET DETECTION USING INDEPENDENT COMPONENT ANALYSIS

2022 ◽  
Vol 23 (1) ◽  
pp. 95-115
Author(s):  
Wan Nurhidayah Ibrahim ◽  
Mohd Syahid Anuar ◽  
Ali Selamat ◽  
Ondrej Krejcar

Botnet is a significant cyber threat that continues to evolve. Botmasters continue to improve the security framework strategy for botnets to go undetected. Newer botnet source code runs attack detection every second, and each attack demonstrates the difficulty and robustness of monitoring the botnet. In the conventional network botnet detection model that uses signature-analysis, the patterns of a botnet concealment strategy such as encryption & polymorphic and the shift in structure from centralized to decentralized peer-to-peer structure, generate challenges. Behavior analysis seems to be a promising approach for solving these problems because it does not rely on analyzing the network traffic payload. Other than that, to predict novel types of botnet, a detection model should be developed. This study focuses on using flow-based behavior analysis to detect novel botnets, necessary due to the difficulties of detecting existing patterns in a botnet that continues to modify the signature in concealment strategy. This study also recommends introducing Independent Component Analysis (ICA) and data pre-processing standardization to increase data quality before classification. With and without ICA implementation, we compared the percentage of significant features. Through the experiment, we found that the results produced from ICA show significant improvements.  The highest F-score was 83% for Neris bot. The average F-score for a novel botnet sample was 74%. Through the feature importance test, the feature importance increased from 22% to 27%, and the training model false positive rate also decreased from 1.8% to 1.7%. ABSTRAK: Botnet merupakan ancaman siber yang sentiasa berevolusi. Pemilik bot sentiasa memperbaharui strategi keselamatan bagi botnet agar tidak dapat dikesan. Setiap saat, kod-kod sumber baru botnet telah dikesan dan setiap serangan dilihat menunjukkan tahap kesukaran dan ketahanan dalam mengesan bot. Model pengesanan rangkaian botnet konvensional telah menggunakan analisis berdasarkan tanda pengenalan bagi mengatasi halangan besar dalam mengesan corak botnet tersembunyi seperti teknik penyulitan dan teknik polimorfik. Masalah ini lebih bertumpu pada perubahan struktur berpusat kepada struktur bukan berpusat seperti rangkaian rakan ke rakan (P2P). Analisis tingkah laku ini seperti sesuai bagi menyelesaikan masalah-masalah tersebut kerana ianya tidak bergantung kepada analisis rangkaian beban muatan trafik. Selain itu, bagi menjangka botnet baru, model pengesanan harus dibangunkan. Kajian ini bertumpu kepada penggunaan analisa tingkah-laku berdasarkan aliran bagi mengesan botnet baru yang sukar dikesan pada corak pengenalan botnet sedia-ada yang sentiasa berubah dan menggunakan strategi tersembunyi. Kajian ini juga mencadangkan penggunakan Analisis Komponen Bebas (ICA) dan pra-pemprosesan data yang standard bagi meningkatkan kualiti data sebelum pengelasan. Peratusan ciri-ciri penting telah dibandingkan dengan dan tanpa menggunakan ICA. Dapatan kajian melalui eksperimen menunjukkan dengan penggunaan ICA, keputusan adalah jauh lebih baik. Skor F tertinggi ialah 83% bagi bot Neris. Purata skor F bagi sampel botnet baru adalah 74%. Melalui ujian kepentingan ciri, kepentingan ciri meningkat dari 22% kepada 27%, dan kadar positif model latihan palsu juga berkurangan dari 1.8% kepada 1.7%.

2020 ◽  
Vol 15 (1) ◽  
pp. 56-64
Author(s):  
A. John Clement Sunder ◽  
A. Shanmugam

Background: Wireless Sensor Networks (WSNs) are self-configured infrastructure-less networks are comprising of a number of sensing devices used to monitor physical or environmental quantities such as temperature, sound, vibration, pressure, motion etc. They collectively transmit data through the network to a sink where it is observed and analyzed. Materials and Methods: The major issues in WSN are interference, delay and attacks that degrade their performance due to their distributed nature and operation. Timely detection of attacks is imperative for various real time applications like healthcare, military etc. To improve the Black hole attack detection in WSN, Projected Independent Component Analysis (PICA) technique is proposed herewith, which detects black hole attack by analyzing collected physiological data from biomedical sensors. Results: The PICA technique performs attack detection through Mutual information to measure the dependence in the joint distribution. The dependence among the nodes is identified based on the independent probability distribution functions and mutual probability function. Conclusion: The black hole attack isolation is then performed through the distribution of the attack separation message. This supports to improve Packet Delivery Ratio (PDR) with minimum delay. The simulation is carried out based on parameters such as black hole attack detection rate (BHADR), Black Hole Attack Detection Time (BHADT), False Positive Rate (FPR), PDR and delay.


2020 ◽  
Vol 2020 (14) ◽  
pp. 357-1-357-6
Author(s):  
Luisa F. Polanía ◽  
Raja Bala ◽  
Ankur Purwar ◽  
Paul Matts ◽  
Martin Maltz

Human skin is made up of two primary chromophores: melanin, the pigment in the epidermis giving skin its color; and hemoglobin, the pigment in the red blood cells of the vascular network within the dermis. The relative concentrations of these chromophores provide a vital indicator for skin health and appearance. We present a technique to automatically estimate chromophore maps from RGB images of human faces captured with mobile devices such as smartphones. The ultimate goal is to provide a diagnostic aid for individuals to monitor and improve the quality of their facial skin. A previous method approaches the problem as one of blind source separation, and applies Independent Component Analysis (ICA) in camera RGB space to estimate the chromophores. We extend this technique in two important ways. First we observe that models for light transport in skin call for source separation to be performed in log spectral reflectance coordinates rather than in RGB. Thus we transform camera RGB to a spectral reflectance space prior to applying ICA. This process involves the use of a linear camera model and Principal Component Analysis to represent skin spectral reflectance as a lowdimensional manifold. The camera model requires knowledge of the incident illuminant, which we obtain via a novel technique that uses the human lip as a calibration object. Second, we address an inherent limitation with ICA that the ordering of the separated signals is random and ambiguous. We incorporate a domain-specific prior model for human chromophore spectra as a constraint in solving ICA. Results on a dataset of mobile camera images show high quality and unambiguous recovery of chromophores.


PIERS Online ◽  
2005 ◽  
Vol 1 (6) ◽  
pp. 750-753 ◽  
Author(s):  
Anxing Zhao ◽  
Yansheng Jiang ◽  
Wenbing Wang

Sign in / Sign up

Export Citation Format

Share Document