2022
DOI: 10.22266/ijies2022.0831.48
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Botnet Attack Communication Pattern Behavior on Computer Networks

Abstract: Botnets are a severe threat to a computer network, affecting various aspects of security systems, including spreading malicious programs, phishing, sending spam messages, and click fraud. Because of their negative consequences, botnets must be identified early. Nevertheless, their different characteristics have made them challenging to detect. This research proposes a bot patterns communication detection from traffic flows analysis consisting of three main activities: bot detection, extraction, and communicati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 26 publications
0
13
0
Order By: Relevance
“…Bot activity is obtained by extracting bot behavior from scenario 1 to 13 datasets on CTU-13 and NCC [1 , 2] . The extraction process is carried out to analyze bot attack behavior and normal behavior [3] , whose extraction path is shown in Fig. 4 .…”
Section: Experimental Design Materials and Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Bot activity is obtained by extracting bot behavior from scenario 1 to 13 datasets on CTU-13 and NCC [1 , 2] . The extraction process is carried out to analyze bot attack behavior and normal behavior [3] , whose extraction path is shown in Fig. 4 .…”
Section: Experimental Design Materials and Methodsmentioning
confidence: 99%
“…The dataset simulates botnet attacks using botnet activities described in CTU-13 [1] and NCC [2] . The simulation extracts all scenarios from those two datasets to determine attack activities, attack phases, and the time difference between attacks and normal activities [3] , leading to four scenarios represented by the corresponding sub-datasets. Additionally, it is assumed that this simulation employs three sensors.…”
Section: Data Descriptionmentioning
confidence: 99%
“…Basically, data transformation is a series of techniques used to change raw data into a form or format that is more suitable or useful for machine learning models. Data transformation was implemented in this research because several categorical features in the dataset need to be converted to numerical data [31]. This is an essential step because categorical data cannot be processed with some machine learning methods.…”
Section: Data Preprocessingmentioning
confidence: 99%
“…This detection model has been widely developed because it produces optimal reliability, simplicity, accuracy, and time processing [8][9][10]. Signature-based models extract botnet attack characteristics such as attack communication pattern behavior [11], features [12], attack sequential patterns [6], number of attack stages [13], and attack time gap [14]. However, there needs to be more focus on analyzing botnet communication intensity using visualization with a graph analysis approach.…”
Section: Introductionmentioning
confidence: 99%