2017 International Conference on Electronics, Communications and Computers (CONIELECOMP) 2017
DOI: 10.1109/conielecomp.2017.7891834
|View full text |Cite
|
Sign up to set email alerts
|

Feature selection to detect botnets using machine learning algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0
3

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 48 publications
(23 citation statements)
references
References 5 publications
0
20
0
3
Order By: Relevance
“…These techniques were mainly used for feature optimization and optimizing the parameter for the classifiers. For example, particle swarm optimization (PSO) was adopted in [18][19][20]; the genetic algorithm (GA) was utilized in [21,22] to enhance the effectiveness of a malware detection system. Table 1 abstracts some characteristics of the discussed malware identification approaches, concerning the focus areas, techniques, features, datasets, and validation metrics used to evaluate the models' performances.…”
Section: Malware Identificationmentioning
confidence: 99%
See 1 more Smart Citation
“…These techniques were mainly used for feature optimization and optimizing the parameter for the classifiers. For example, particle swarm optimization (PSO) was adopted in [18][19][20]; the genetic algorithm (GA) was utilized in [21,22] to enhance the effectiveness of a malware detection system. Table 1 abstracts some characteristics of the discussed malware identification approaches, concerning the focus areas, techniques, features, datasets, and validation metrics used to evaluate the models' performances.…”
Section: Malware Identificationmentioning
confidence: 99%
“…First, the combination of several AI-based techniques in a defense solution may still an interesting research direction. For example, the incorporation of bio-inspired computation and ML/DL approaches shows promising results in malware detection [18][19][20][21][22] or [36][37][38] for detecting the network intrusion. Hence, the combination of these two techniques is a very potential research direction due to the number of bio-inspired algorithms exploited in cybersecurity still being limited.…”
Section: Open Research Directionsmentioning
confidence: 99%
“…Essas bases são compostas por dados de fluxos do tipo NetFlow [Claise, 2004] [Goldberg, 1989], utilizado no trabalho de [Alejandre et al, 2017], cuja verificação dos efeitos de classificação se baseou no algoritmo Árvore [Alejandre et al, 2017], [Silva et al, 2017] e [Beigi et al, 2014], ratifica-se a característica MedPktSize que aparece em todos. TotBytes só não aparece em [Beigi et al, 2014] e MedBitsSecond não foi selecionada no trabalho de [Alejandre et al, 2017]. Já o atributo SrcBytes aparece, no presente trabalho, como uma nova característica relevante para detectar tráfego de botnet.…”
Section: Metodologia De Avaliaçãounclassified
“…This study is focused on the bidirectional packet size sequence information in order to discover the features and to capture periodical beacon signals sent to the bots. Alejandre et al extracted the feature set from network flows by applying genetic algorithm. The feature set includes 19 statistical flow features, and detection accuracy is evaluated by C4.5 algorithm.…”
Section: Related Workmentioning
confidence: 99%