2018 Eleventh International Conference on Contemporary Computing (IC3) 2018
DOI: 10.1109/ic3.2018.8530562
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Distributed Machine Learning Framework for Semi-Supervised Detection of Botnet Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…• Unsupervised or semisupervised clustering requires only a training dataset of normal system behavior to form a corresponding cluster. Then, any event sufficiently different from the previously learned cluster is considered anomalous system behavior [28,29].…”
Section: Basic Requirements Of Ddos Detection In Modern Information Systemsmentioning
confidence: 99%
“…• Unsupervised or semisupervised clustering requires only a training dataset of normal system behavior to form a corresponding cluster. Then, any event sufficiently different from the previously learned cluster is considered anomalous system behavior [28,29].…”
Section: Basic Requirements Of Ddos Detection In Modern Information Systemsmentioning
confidence: 99%
“…Botnet attack is a champion among the most lethal attacks. A botnet may be a compromised note in the frameworks that are linked over the web and are controlled distantly by a criminal to perform malignant action without consent and approval [42]. The essential purpose of criminals to perform Botnet is a cash-related advantage by performing Denial of service assault, Phishing, spamming, etc.…”
Section: Security Issues In Fog Computingmentioning
confidence: 99%
“…We have categorized malware detection existing methods for IoT devices [ 12 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 ] into two methods based on machine learning and deep learning. Researchers [ 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 ] have proposed a variety of machine learning intrusion detection methods. Table 1 critically evaluates the existing machine learning methods.…”
Section: Related Workmentioning
confidence: 99%
“…Costa et al [ 20 ] introduced an intrusion detection system using Support Vector Domain. To determine if network traffic is an attack or not, a novelty detection model based on SSPV-SVDD as a classifier and SMO as a solution is used.…”
Section: Related Workmentioning
confidence: 99%