2021
DOI: 10.1007/s40747-021-00281-5
|View full text |Cite
|
Sign up to set email alerts
|

Unsupervised detection of botnet activities using frequent pattern tree mining

Abstract: A botnet is a network of remotely-controlled infected computers that can send spam, spread viruses, or stage denial-of-service attacks, without the consent of the computer owners. Since the beginning of the 21st century, botnet activities have steadily increased, becoming one of the major concerns for Internet security. In fact, botnet activities are becoming more and more difficult to be detected, because they make use of Peer-to-Peer protocols (eMule, Torrent, Frostwire, Vuze, Skype and many others). To impr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 28 publications
0
4
0
Order By: Relevance
“…An optimal set of parameter values was used to get a detection rate of 100 percent with no false positives [8]. The effectiveness of the botnet detection technique that uses DNS query data analysed using a range of machine learning algorithms, which includes decision trees, kNN, random forests, and Naive Bayes [9,17,22]. The detection model is developed in two steps: training and detection.…”
Section: Fig3 Weka Tool For Clusteringmentioning
confidence: 99%
See 1 more Smart Citation
“…An optimal set of parameter values was used to get a detection rate of 100 percent with no false positives [8]. The effectiveness of the botnet detection technique that uses DNS query data analysed using a range of machine learning algorithms, which includes decision trees, kNN, random forests, and Naive Bayes [9,17,22]. The detection model is developed in two steps: training and detection.…”
Section: Fig3 Weka Tool For Clusteringmentioning
confidence: 99%
“…To detect botnets, the random forest machine learning method is used because of its high accuracy in classification [9]. Similar Techniques of using different supervised techniques with CTU-13 dataset and UNSW-NB15 datasets are also proposed [17,22]. Use of Logistic Regression in detection of Botnet using various type of numerical datasets are proposed which have given the better accuracy [18].…”
Section: Fig3 Weka Tool For Clusteringmentioning
confidence: 99%
“…Hidayah et al [147] obtained up to 92% accuracy using ML algorithms that filter and classify data to detect the botnets C&C server. Siqlang et al [148] studied the use of unsupervised detection of botnet activities and used the Frequent pattern tree algorithm provided by Weka. They achieved up to 100% accuracy varying with the thresholds chosen and up to 100% precision.…”
Section: Machine Learning and Network-based Detection Mechanismsmentioning
confidence: 99%
“…A botnet is defined as a network of robots, and these robots may be smart systems on the Internet. 1 They are remotely commanded by a botmaster, also called a command and control (C&C) server. These smart systems can carry out malicious attacks on key targets by sending spam, phishing, stealing information, and by the distributed denial of service (DDoS).…”
Section: Introductionmentioning
confidence: 99%