2021
DOI: 10.48550/arxiv.2104.12602
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Improving Botnet Detection with Recurrent Neural Network and Transfer Learning

Jeeyung Kim,
Alex Sim,
Jinoh Kim
et al.

Abstract: Botnet detection is a critical step in stopping the spread of botnets and preventing malicious activities. However, reliable detection is still a challenging task, due to a wide variety of botnets involving ever-increasing types of devices and attack vectors. Recent approaches employing machine learning (ML) showed improved performance than earlier ones, but these MLbased approaches still have significant limitations. For example, most ML approaches can not incorporate sequential pattern analysis techniques ke… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…As the first-level mining is performed without using the attack labels, this part of the training is unsupervised. Note that here we only mine flows originating from a single source IP address at a time; this is quite well-aligned with anomaly detection solutions that often predict the anomalous sources in a given time-slot since aggregation of flows at source level gives more information for better classification [2], [3].…”
Section: Attack Mining and Identification A First-level Mining: Extra...mentioning
confidence: 74%
See 1 more Smart Citation
“…As the first-level mining is performed without using the attack labels, this part of the training is unsupervised. Note that here we only mine flows originating from a single source IP address at a time; this is quite well-aligned with anomaly detection solutions that often predict the anomalous sources in a given time-slot since aggregation of flows at source level gives more information for better classification [2], [3].…”
Section: Attack Mining and Identification A First-level Mining: Extra...mentioning
confidence: 74%
“…Analyzing network traffic helps in detecting and identifying the threats and attacks faced by organizations. Past works have attempted to detect (often specific) attacks using supervised learning approaches that model the attack detection as a binary classification problem [1], [2], where labeled data of two classes of network traffic-normal and anomalous-are gathered and provided for training the models. However, network traffic (of, say, enterprises) tends to be noisy due to the large number of users, evolving landscape of applications and protocols (e.g., adoption of TLS 1.3 and HTTP/3), increasing use of new smart devices, etc.…”
Section: Introductionmentioning
confidence: 99%