botnet detection
Recently Published Documents


TOTAL DOCUMENTS

478
(FIVE YEARS 188)

H-INDEX

25
(FIVE YEARS 6)

2022 ◽  
Vol 23 (1) ◽  
pp. 95-115
Author(s):  
Wan Nurhidayah Ibrahim ◽  
Mohd Syahid Anuar ◽  
Ali Selamat ◽  
Ondrej Krejcar

Botnet is a significant cyber threat that continues to evolve. Botmasters continue to improve the security framework strategy for botnets to go undetected. Newer botnet source code runs attack detection every second, and each attack demonstrates the difficulty and robustness of monitoring the botnet. In the conventional network botnet detection model that uses signature-analysis, the patterns of a botnet concealment strategy such as encryption & polymorphic and the shift in structure from centralized to decentralized peer-to-peer structure, generate challenges. Behavior analysis seems to be a promising approach for solving these problems because it does not rely on analyzing the network traffic payload. Other than that, to predict novel types of botnet, a detection model should be developed. This study focuses on using flow-based behavior analysis to detect novel botnets, necessary due to the difficulties of detecting existing patterns in a botnet that continues to modify the signature in concealment strategy. This study also recommends introducing Independent Component Analysis (ICA) and data pre-processing standardization to increase data quality before classification. With and without ICA implementation, we compared the percentage of significant features. Through the experiment, we found that the results produced from ICA show significant improvements.  The highest F-score was 83% for Neris bot. The average F-score for a novel botnet sample was 74%. Through the feature importance test, the feature importance increased from 22% to 27%, and the training model false positive rate also decreased from 1.8% to 1.7%. ABSTRAK: Botnet merupakan ancaman siber yang sentiasa berevolusi. Pemilik bot sentiasa memperbaharui strategi keselamatan bagi botnet agar tidak dapat dikesan. Setiap saat, kod-kod sumber baru botnet telah dikesan dan setiap serangan dilihat menunjukkan tahap kesukaran dan ketahanan dalam mengesan bot. Model pengesanan rangkaian botnet konvensional telah menggunakan analisis berdasarkan tanda pengenalan bagi mengatasi halangan besar dalam mengesan corak botnet tersembunyi seperti teknik penyulitan dan teknik polimorfik. Masalah ini lebih bertumpu pada perubahan struktur berpusat kepada struktur bukan berpusat seperti rangkaian rakan ke rakan (P2P). Analisis tingkah laku ini seperti sesuai bagi menyelesaikan masalah-masalah tersebut kerana ianya tidak bergantung kepada analisis rangkaian beban muatan trafik. Selain itu, bagi menjangka botnet baru, model pengesanan harus dibangunkan. Kajian ini bertumpu kepada penggunaan analisa tingkah-laku berdasarkan aliran bagi mengesan botnet baru yang sukar dikesan pada corak pengenalan botnet sedia-ada yang sentiasa berubah dan menggunakan strategi tersembunyi. Kajian ini juga mencadangkan penggunakan Analisis Komponen Bebas (ICA) dan pra-pemprosesan data yang standard bagi meningkatkan kualiti data sebelum pengelasan. Peratusan ciri-ciri penting telah dibandingkan dengan dan tanpa menggunakan ICA. Dapatan kajian melalui eksperimen menunjukkan dengan penggunaan ICA, keputusan adalah jauh lebih baik. Skor F tertinggi ialah 83% bagi bot Neris. Purata skor F bagi sampel botnet baru adalah 74%. Melalui ujian kepentingan ciri, kepentingan ciri meningkat dari 22% kepada 27%, dan kadar positif model latihan palsu juga berkurangan dari 1.8% kepada 1.7%.


Author(s):  
Mrs. Jaishma Kumari B ◽  
Manisha ◽  
Ravish Acharya ◽  
R Yajnesh

Among the diverse forms of malware, Botnet is the serious threat which occurs commonly in today’s cyber attacks and cyber crimes. Botnets are designed to perform predefined functions in an automated fashion, where these malicious activities range from online searching of data, moving files sharing channel information to DDoS attacks against critical targets, click fraud etc. Botnet detection has been an interesting research topic related to cyber-threat and cyber-crime prevention. In this survey paper we provide a brief look at how existing botnet research, the evolution and future of botnets, as well as the goals and visibility of today’s network intersect to inform the field of botnet technology and defense.


2021 ◽  
Vol 22 (6) ◽  
pp. 1347-1357
Author(s):  
Tzong-Jye Liu Tzong-Jye Liu ◽  
Tze-Shiun Lin Tzong-Jye Liu ◽  
陳靜雯 Tze-Shiun Lin


2021 ◽  
Author(s):  
Himanshu Gandhi ◽  
Misha Mehra ◽  
Vinay Ribeiro
Keyword(s):  

Author(s):  
Susanto ◽  
Deris Stiawan ◽  
M. Agus Syamsul Arifin ◽  
Juli Rejito ◽  
Mohd. Yazid Idris ◽  
...  

2021 ◽  
Vol 26 (5) ◽  
pp. 790-790
Author(s):  
Yijing Chen ◽  
Bo Pang ◽  
Guolin Shao ◽  
Guozhu Wen ◽  
Xingshu Chen
Keyword(s):  

2021 ◽  
Vol 12 (4) ◽  
pp. 0-0

The botnet interrupts network devices and keeps control of the connections with the command, which controls the programmer, and the programmer controls the malicious code injected in the machine for obtaining information about the machines. The attacker uses a botnet to commence dangerous attacks as DDoS, phishing, despoil of information, and spamming. The botnet establishes with a large network and several hosts belong to it. In the paper, the authors proposed the framework of botnet detection by using an Artificial Neural Network. The author research upgrading the extant system by comprising of cache memory to fast the process. Finally, for detection, the author used an analytical approach, which is known as an artificial neural network that contains three layers: the input layer, hidden layer, output layer, and all layers are connected to correlate and approximate the results. The experiment result determines that the classifier with 25 epochs gives optimal accuracy is 99.78 percent and shows the detection rate is 99.7 percent.


2021 ◽  
Vol 574 ◽  
pp. 84-95
Author(s):  
Zhou Shao ◽  
Sha Yuan ◽  
Yongli Wang

Sign in / Sign up

Export Citation Format

Share Document