2016 IEEE Biennial Congress of Argentina (ARGENCON) 2016
DOI: 10.1109/argencon.2016.7585247
|View full text |Cite
|
Sign up to set email alerts
|

An analysis of Recurrent Neural Networks for Botnet detection behavior

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
77
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 144 publications
(77 citation statements)
references
References 3 publications
0
77
0
Order By: Relevance
“…IoT devices generate large amounts of sequential data from several sources, such as network traffic flows, which are among the key features for detecting several potential network attacks. For example, a previous study [197] discussed the feasibility of an RNN in examining network traffic behaviour to detect potential attacks (malicious behaviour) and confirmed the usefulness of the RNN in classifying network traffic for accurate malicious behaviour detection. Thus, RNNs provide a practical solution in realworld scenarios.…”
Section: Figure 8 Illustration Of Cnn Working Principle For Iot Securmentioning
confidence: 87%
See 2 more Smart Citations
“…IoT devices generate large amounts of sequential data from several sources, such as network traffic flows, which are among the key features for detecting several potential network attacks. For example, a previous study [197] discussed the feasibility of an RNN in examining network traffic behaviour to detect potential attacks (malicious behaviour) and confirmed the usefulness of the RNN in classifying network traffic for accurate malicious behaviour detection. Thus, RNNs provide a practical solution in realworld scenarios.…”
Section: Figure 8 Illustration Of Cnn Working Principle For Iot Securmentioning
confidence: 87%
“…A previous study [197] discussed the viability of an RNN (i.e. large short-term memory [LSTM] network) in the analysis of network traffic behaviour to detect potential attacks (malicious behaviour) and confirmed the effectiveness of the RNN in precisely classifying network traffic to detect malicious behaviour; thus, the LSTM network can be adopted as a practical solution in real-world scenarios.…”
Section: B Network Layermentioning
confidence: 99%
See 1 more Smart Citation
“…They design a parallel detection framework for identifying both client-server and hybrid botnets, and demonstrate encouraging performance. Torres et al investigate the common behavior patterns that botnets exhibit across their life cycle, using LSTMs [423]. They employ both under-sampling and over-sampling to address the class imbalance between botnet and normal traffic in the dataset, which is common in anomaly detection problems.…”
Section: Infrastructure Level Securitymentioning
confidence: 99%
“…More recently, deep neural network models (also generally referred to as deep learning models) have been embraced by the research community to tackle anomaly detection problem in networking setting. Existing supervised deep learning approaches include work by Tang et al [20] that utilizes a classical deep neural network for flow-based anomalies classification in a Software Defined Networking (SDN) environment, and use of the recurrent neural network (RNN) models for developing intrusion detection solution [21].…”
Section: Related Workmentioning
confidence: 99%