Botnet Detection Based on Genetic Neural Network

被引:1
作者
Yin, Chunyong [1 ]
Awlla, Ardalan Husin [1 ]
Yin, Zhichao [2 ]
Wang, Jin [1 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Sch Comp & Software, Jiangsu Key Lab Meteorol Observat & Informat Proc, Nanjing 210044, Jiangsu, Peoples R China
[2] Nanjing 1 Middle Sch, Nanjing 210001, Jiangsu, Peoples R China
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2015年 / 9卷 / 11期
基金
中国国家自然科学基金;
关键词
ANN; GA; GNN; Botnet; Bot; BotMaster;
D O I
10.14257/ijsia.2015.9.11.10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Botnet have turned into the most serious security dangers on the present Internet framework. A botnet is most extensive and regularly happens in today's cyber-attacks, bringing about the serious risk of our system resources and association's properties. Botnets are accumulations of compromised computers (Bots) which are remotely regulated by its creator (BotMaster) under a typical Command-and-Control (C&C) framework. Botnets cannot just be implemented utilizing existing well-known applications and additionally developed by unknown or inventive applications. This makes the botnet detection a challenging issue. In this paper proposed an anomaly detection model based on genetic neural network system, which joined the significant global searching capability of genetic algorithm with the precise local searching element of back propagation feed forward neural networks to improve the initial weights of neural network.
引用
收藏
页码:97 / 104
页数:8
相关论文
共 13 条
[1]  
Bace R. G., 2000, INTRUSION DETECTION
[2]  
Flake Gary William, 2000, COMPUTATIONAL BEAUTY
[3]   Incremental Support Vector Learning for Ordinal Regression [J].
Gu, Bin ;
Sheng, Victor S. ;
Tay, Keng Yeow ;
Romano, Walter ;
Li, Shuo .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2015, 26 (07) :1403-1416
[4]   Incremental learning for ν-Support Vector Regression [J].
Gu, Bin ;
Sheng, Victor S. ;
Wang, Zhijie ;
Ho, Derek ;
Osman, Said ;
Li, Shuo .
NEURAL NETWORKS, 2015, 67 :140-150
[5]  
Ramstedt P., 2000, 12 ANN 1 C JUN, P25
[6]   SYN-dog: Sniffing SYN flooding sources [J].
Wang, HN ;
Zhang, DL ;
Shin, KG .
22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, :421-428
[7]  
Wang J., 2013, DESALIN WATER TREAT, V1, P1, DOI [10.1080/19443994,2013,782570, DOI 10.1080/19443994,2013,782570]
[8]  
Wang Jin, 2000, SENSORS, V10, P10
[9]  
Yin C., 2014, SCI WORLD J, V2014, P425491
[10]  
Yin C. S., 2014, EVID-BASED COMPL ALT, V2014, P6