2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE) 2014
DOI: 10.1109/malware.2014.6999406
|View full text |Cite
|
Sign up to set email alerts
|

BoTGen: A new approach for in-lab generation of botnet datasets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 7 publications
0
9
0
Order By: Relevance
“…It will be used for training and testing ML algorithms, as well as feature set optimization and reduction. For this purpose, we have created a diversified dataset as described in [14]. In the following section we present the metrics used in evaluating and comparing detection results from various ML models/algoritms and feature-sets.…”
Section: Figure 1 Botnet Communication Segmentationmentioning
confidence: 99%
See 2 more Smart Citations
“…It will be used for training and testing ML algorithms, as well as feature set optimization and reduction. For this purpose, we have created a diversified dataset as described in [14]. In the following section we present the metrics used in evaluating and comparing detection results from various ML models/algoritms and feature-sets.…”
Section: Figure 1 Botnet Communication Segmentationmentioning
confidence: 99%
“…Our decision to include these botwares was based on a detailed analysis of several botware samples where we take into account the diversity of the dataset. More details about our analysis results can be found in [14] By using BoTGen, we run 6 botware variations from each family for 6 hours separately on 10 virtual machines (VMs). Variations differ from each other in botnet and network configuration such as (PING/PONG IRC rate, HTTP request rate, start-up/shutdown of VMs) and the executed scenario (number of commands, order of commands, etc.).…”
Section: Detection Model Design and Implementationmentioning
confidence: 99%
See 1 more Smart Citation
“…However, we intend to look into their techniques in the future to increase the number of bots in our testbed to more accurately represent real-world IoT botnets. We are in the process of collecting datasets for the IoT botnet research community, similar to [20], and hope to release them in near future. Out testbed is not restricted to specific attacks such as HTTP flooding [21] and we also use virtualization to create multiple bots on a physical machine, albeit not through VMWare hypervisor as done in [22].…”
Section: Related Workmentioning
confidence: 99%
“…ElSheikh et al [20] have addressed the lack of publicly available botnet research datasets by creating an in-lab botnet experimentation testbed in a contained environment and using it to generate botnet datasets. [21] has implemented an HTTP (Hypertext Transfer Protocol)-based botnet testbed for performing HTTP GET flooding attacks against web servers.…”
Section: Related Workmentioning
confidence: 99%