2018
DOI: 10.1007/978-3-319-73951-9_7
|View full text |Cite
|
Sign up to set email alerts
|

BoTShark: A Deep Learning Approach for Botnet Traffic Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
28
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 53 publications
(28 citation statements)
references
References 29 publications
0
28
0
Order By: Relevance
“…total bytes, number of packets from source to destination and from destination to source, and flow duration, cannot be computed when the traffic features are collected within observation time windows. Approaches based on flow-level statistics have also been proposed in [34]- [39], among many others. In particular, [36]- [39] use flow-level statistics to feed CNNs and other DL models, as discussed in Sec.…”
Section: A Statistical Approaches To Ddos Detectionmentioning
confidence: 99%
See 2 more Smart Citations
“…total bytes, number of packets from source to destination and from destination to source, and flow duration, cannot be computed when the traffic features are collected within observation time windows. Approaches based on flow-level statistics have also been proposed in [34]- [39], among many others. In particular, [36]- [39] use flow-level statistics to feed CNNs and other DL models, as discussed in Sec.…”
Section: A Statistical Approaches To Ddos Detectionmentioning
confidence: 99%
“…Approaches based on flow-level statistics have also been proposed in [34]- [39], among many others. In particular, [36]- [39] use flow-level statistics to feed CNNs and other DL models, as discussed in Sec. II-C. To overcome the limitations of statistical approaches to DDoS detection, machine learning techniques have been explored.…”
Section: A Statistical Approaches To Ddos Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…This approach aims to evaluate the malware by executing the application. 40,41 By comparing with static analysis, this approach is more complicated as resource consumption is performed in real environment. The benefit of this method is that it loads target information to determine the application behavior during runtime.…”
Section: Dynamic Analysismentioning
confidence: 99%
“…With the result, the hidden layer learns to build a smaller representation of the input. Examples of IoT use-cases that utilized AEs include human activity recognition [113], privacy preservation in sensor data analytics [114], prediction performance improvement in sensor and wearable systems [115], botnet traffic detection [116], fault diagnosis [117], etc.…”
mentioning
confidence: 99%