2020
DOI: 10.11591/ijece.v10i3.pp2543-2550
|View full text |Cite
|
Sign up to set email alerts
|

Botnet detection using ensemble classifiers of network flow

Abstract: Recently, Botnets have become a common tool for implementing and transferring various malicious codes over the Internet. These codes can be used to execute many malicious activities including DDOS attack, send spam, click fraud, and steal data. Therefore, it is necessary to use Modern technologies to reduce this phenomenon and avoid them in advance in order to differentiate the Botnets traffic from normal network traffic. In this work, ensemble classifier algorithms to identify such damaging botnet traffic. We… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
7
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 28 publications
2
7
0
1
Order By: Relevance
“…The process of automatically or manually selecting the features that contribute the most to the prediction variable or output in which you are interested is known as feature selection. Irrelevant features in a dataset may reduce model accuracy and lead the model to train on irrelevant features [32]. There are several advantages to selecting features before modeling data [33], including:…”
Section: Feature Selectionmentioning
confidence: 99%
“…The process of automatically or manually selecting the features that contribute the most to the prediction variable or output in which you are interested is known as feature selection. Irrelevant features in a dataset may reduce model accuracy and lead the model to train on irrelevant features [32]. There are several advantages to selecting features before modeling data [33], including:…”
Section: Feature Selectionmentioning
confidence: 99%
“…Many researchers tried with various ensemble algorithms to compare and examine how well they could separate botnet activity from regular traffic by picking out distinctive characteristics of the network traffic. According to experimental findings, machine learning approaches are capable of efficiently detecting numerous invasions [62], [63]. Different techniques were also analyzed using machine learning by Khammas [64] and Sonker and Gupta [65] in 2021 to detect ransomware viruses, where the results showed a detection accuracy of 98%.…”
Section: Figure 2 Overview Of Grey Hole Attack [19]mentioning
confidence: 99%
“…In this paper, we will not only evaluate features to select important features but also evaluate the anomaly detection model based on the feature evaluation process. The study [20] proposed the Information gain method to reduce the feature dimension in the training process of the botnet detection model. However, in that study, the authors didn't specify which redundant features were removed.…”
Section: The Problem Of Optimizing the Anomaly Detection Feature On The Network Based On The Unsw-nb15 Datasetmentioning
confidence: 99%