Botnet Detection Using On-line Clustering with Pursuit Reinforcement Competitive Learning (PRCL)

被引:2
作者
Mahardhika, Yesta Medya [1 ]
Sudarsono, Amang [1 ]
Barakbah, Aliridho [1 ]
机构
[1] Elect Engn Polytech Inst Surabaya, Dept Informat & Comp Engn, Div Informat & Comp Engn, Postgrad Appl Engn Technol, EEPIS Campus,Jalan Raya ITS, Sukolilo 60111, Indonesia
关键词
Botnet Detection; Maliciouse Software; On-line Clustering; Pursuit Reinforcement Competitive Learning;
D O I
10.24003/emitter.v6i1.207
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Botnet is a malicious software that often occurs at this time, and can perform malicious activities, such as DDoS, spamming, phishing, keylogging, clickfraud, steal personal information and important data. Botnets can replicate themselves without user consent. Several systems of botnet detection has been done by using classification methods. Classification methods have high precision, but it needs more effort to determine appropiate classification model. In this paper, we propose reinforced approach to detect botnet with Online Clustering using Reinforcement Learning. Reinforcement Learning involving interaction with the environment and became new paradigm in machine learning. The reinforcement learning will be implemented with some rule detection, because botnet ISCX dataset is categorized as unbalanced dataset which have high range of each number of class. Therefore we implemented Reinforcement Learning to Detect Botnet using Pursuit Reinforcement Competitive Learning (PRCL) with additional rule detection which has reward and punisment rules to achieve the solution. Based on the experimental result, PRCL can detect botnet in real time with high accuracy (100% for Neris, 99.9% for Rbot, 78% for SMTP_Spam, 80.9% for Nsis, 80.7% for Virut, and 96.0% for Zeus) and fast processing time up to 176 ms. Meanwhile the step of CPU and memory usage which are 78 % and 4.3 GB for pre-processing, 34% and 3.18 GB for online clustering with PRCL, and 23% and 3.11 GB evaluation. The proposed method is one solution for network administrators to detect botnet which has unpredictable behavior in network traffic.
引用
收藏
页码:1 / 21
页数:21
相关论文
共 17 条
[1]  
Alejandre F. V., 2016, BOTNET DETECTION USI, V118, P65
[2]  
Aviv A. J, 2011, USENIX 4 CSET WORK S, P1
[3]  
Baracca A., 2016, SPECIAL ISSUES CLUST, P1
[4]  
Barakbah A. R., 2006, 2 INT SEM INF COMM T
[5]  
Beigi EB, 2014, IEEE CONF COMM NETW, P247, DOI 10.1109/CNS.2014.6997492
[6]   Detecting botnet by anomalous traffic [J].
Chen, Chia-Mei ;
Lin, Hsiao-Chung .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 21 :42-51
[7]   Mining Botnet Behaviors on the Large-scale Web Application Community [J].
Garant, Dan ;
Lu, Wei .
2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, :185-190
[8]   An empirical comparison of botnet detection methods [J].
Garcia, S. ;
Grill, M. ;
Stiborek, J. ;
Zunino, A. .
COMPUTERS & SECURITY, 2014, 45 :100-123
[9]  
Huseynov K., 2014, P S CRYPTOGRAPHY INF, P1
[10]   Botnet detection via mining of traffic flow characteristics [J].
Kirubavathi, G. ;
Anitha, R. .
COMPUTERS & ELECTRICAL ENGINEERING, 2016, 50 :91-101