A survey: contribution of ML & DL to the detection & prevention of botnet attacks

被引:0
作者
EL Yamani Y. [1 ]
Baddi Y. [2 ]
EL Kamoun N. [1 ]
机构
[1] STIC Lab, FSJ, Chouaib Doukkali University, El Jadida
[2] STIC Lab, ESTSB, Chouaib Doukkali University, El Jadida
关键词
Artificial intelligence in security; Botnet; Cybersecurity; Deep learning; IoT; Machine learning;
D O I
10.1007/s40860-024-00226-y
中图分类号
学科分类号
摘要
Machine Learning (ML) and Deep Learning (DL) are transforming the detection and prevention of botnets, significant threats in cybersecurity. In this survey, we highlight the shift from traditional detection methods to advanced ML and DL techniques. We demonstrate their effectiveness through case studies involving classification algorithms, clustering techniques, and neural networks. We also explore innovative strategies like federated learning and meta-learning models that enhance proactive defenses, including predictive analytics, real-time systems, and automated responses. Our paper discusses challenges such as data privacy, model overfitting, and the need for adaptability to sophisticated botnet structures. We emphasize the importance of ongoing research and collaboration across disciplines to keep pace with fast-evolving cyber threats, offering insights for developing intelligent cybersecurity defenses. © The Author(s), under exclusive licence to Springer Nature Switzerland AG 2024.
引用
收藏
页码:431 / 448
页数:17
相关论文
共 112 条
  • [1] Antonakakis M., April T., Bailey M., Bernhard M., Bursztein E., Cochran J., Durumeric Z., Halderman J.A., Invernizzi L., Kallitsis M., Et al., Understanding the mirai botnet, 26Th USENIX Security Symposium (USENIX Security 17), pp. 1093-1110, (2017)
  • [2] Alabdulatif A., Rizvi S.S.H., Hashmani M.A., Optimal machine learning models for kitsune to detect mirai botnet malware attack, J Hun Univ Nat Sci, 48, 6, (2021)
  • [3] Qiao Y., Zhang B., Zhang W., Sangaiah A.K., Wu H., Dga domain name classification method based on long short-term memory with attention mechanism, Appl Sci, 9, 20, (2019)
  • [4] Baddi Y., Sebbar A., Zkik K., Maleh Y., Bensalah F., Boulmalf M., Msdn-iot multicast group communication in iot based on software defined networking, J Reliab Intell Environ, 10, 1, pp. 93-104, (2024)
  • [5] Himthani P., Dubey G.P., Sharma B.M., Taneja A., Big data privacy and challenges for machine learning, . In: 2020 Fourth International Conference on I-SMAC (Iot in Social, Mobile, Analytics and Cloud) (I-SMAC)., pp. 707-713, (2020)
  • [6] Aburass S., Quantifying Overfitting: Introducing the Overfitting Index, (2023)
  • [7] Wazid M., Das A.K., Chamola V., Park Y., Uniting cyber security and machine learning: advantages, challenges and future research, ICT Express, 8, 3, pp. 313-321, (2022)
  • [8] Eslahi M., Salleh R.B., Anuar N.B., Bots and botnets: An overview of characteristics, detection and challenges, 2012 IEEE International Conference on Control System, Computing and Engineering, pp. 349-354, (2012)
  • [9] Walvekar H.S., Kanade A., Gautam S., Jagtap S., Bots, botnets and zombies: anatomy, inhibitory measures and threat prevention techniques, Int J Sci Res Comput Sci Eng Inf Technol, 8, pp. 351-356, (2022)
  • [10] Maigida A.M., Abdulhamid S.M., Olalere M., Alhassan J.K., Chiroma H., Dada E.G., Systematic literature review and metadata analysis of ransomware attacks and detection mechanisms, J Reliab Intell Environ, 5, pp. 67-89, (2019)