2017
DOI: 10.1155/2017/6047053
|View full text |Cite
|
Sign up to set email alerts
|

Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection

Abstract: As computer and network technologies evolve, the complexity of cybersecurity has dramatically increased. Advanced cyber threats have led to current approaches to cyber-attack detection becoming ineffective. Many currently used computer systems and applications have never been deeply tested from a cybersecurity point of view and are an easy target for cyber criminals. The paradigm of security by design is still more of a wish than a reality, especially in the context of constantly evolving systems. On the other… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 15 publications
0
10
0
Order By: Relevance
“…BotFP is also designed to detect malicious network activities such as port scans and DDoS attacks. Kozik and Choraś introduce techniques [124] used in big data and machine learning to identify botnet traffic in networks. The multi-scale analysis model is used to extract botnet features from network traffic, which are then classified using a random forest machine learning algorithm.…”
Section: Machine Learning and Network-based Detection Mechanismsmentioning
confidence: 99%
“…BotFP is also designed to detect malicious network activities such as port scans and DDoS attacks. Kozik and Choraś introduce techniques [124] used in big data and machine learning to identify botnet traffic in networks. The multi-scale analysis model is used to extract botnet features from network traffic, which are then classified using a random forest machine learning algorithm.…”
Section: Machine Learning and Network-based Detection Mechanismsmentioning
confidence: 99%
“…The process of proper feature engineering can become problematic for detection mechanisms in NIDS. To alleviate this problem, some contemporary neural network algorithms offer a direct process for raw features, allowing them to fit to the unprocessed data and then perform classification [Liu and Lang, 2019].…”
Section: Contributions and Structurementioning
confidence: 99%
“…The lack of balance of classes in the dataset may cause trouble for ML algorithms [Ksieniewicz and Woźniak, 2018]. To compensate for the class imbalance, a data balancing procedure on the IoT-23 dataset was implemented.…”
Section: Strategies Usedmentioning
confidence: 99%
“…The following projects with similar goals to Colander provided inspiration for its inception, as they both collect data from home PCs. There are various other solutions that provided additional inspiration, such as the specialized rule-based multiagent IDS described in [19] or the botnet netflow-based detector based on machine learning pattern identification demonstrated in [20], but their impact on our system is quite limited. Turris project 10 was established by the association CZ-NIC.…”
Section: Similar Threat Data Gathering Projectsmentioning
confidence: 99%