Detection of Botnet using deep learning algorithm: application of machine learning in cyber-security

被引:0
作者
Sivakumar, A. [1 ]
Rubia, J. Jency [2 ]
Vijayan, Hima [3 ]
Sivakumaran, C. [4 ]
机构
[1] SRM Inst Sci & Technol, Dept Data Sci & Business Syst, Kattankulathur, Tamil Nadu, India
[2] K Ramakrishnan Coll Engn, Dept Elect & Commun Engn, Trichy, Tamil Nadu, India
[3] SA Engn Coll, Dept Informat Technol, Chennai, India
[4] Photon Technol, Chennai 600017, India
关键词
adversarial attack; security; machine learning; deep learning; LSTM; PRIVACY;
D O I
10.1504/IJESDF.2024.137030
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning has been made possible as a result of the availability and accessibility of a massive amount of data gathered by internet-connected sensors. The concept of machine learning exhibits and spreads the notion that a computer has the potential to develop itself over the course of time. We investigate a variety of security applications from a variety of angles in which ML models play a key role, and we compare the accuracy outcomes of these models using a variety of conceivable dimensions. To provide an accurate depiction of the qualities associated with security, we have shown the threat model and defence strategies against adversarial attack techniques. The proposed method shows about 88% accuracy for the used data. These attacks are based on the fact that the adversaries are aware of the model.
引用
收藏
页码:213 / 222
页数:11
相关论文
共 21 条
[1]   Assuring the Machine Learning Lifecycle: Desiderata, Methods, and Challenges [J].
Ashmore, Rob ;
Calinescu, Radu ;
Paterson, Colin .
ACM COMPUTING SURVEYS, 2021, 54 (05)
[2]  
Axelsson S., 2000, ACM Transactions on Information and Systems Security, V3, P186, DOI 10.1145/357830.357849
[3]   Saner: Composing static and dynamic analysis to validate sanitization in web applications [J].
Balzarotti, Davide ;
Cova, Marco ;
Felmetsger, Vika ;
Jovanovic, Nenad ;
Kirda, Engin ;
Kruegel, Christopher ;
Vigna, Giovanni .
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, :387-+
[4]  
Checkoway S., 2011, Proc. of the 20th USENIX conference on Security
[5]   Strategies to achieve a carbon neutral society: a review [J].
Chen, Lin ;
Msigwa, Goodluck ;
Yang, Mingyu ;
Osman, Ahmed I. ;
Fawzy, Samer ;
Rooney, David W. ;
Yap, Pow-Seng .
ENVIRONMENTAL CHEMISTRY LETTERS, 2022, 20 (04) :2277-2310
[6]   Experimental Security Analysis of a Modern Automobile [J].
Koscher, Karl ;
Czeskis, Alexei ;
Roesner, Franziska ;
Patel, Shwetak ;
Kohno, Tadayoshi ;
Checkoway, Stephen ;
Mccoy, Damon ;
Kantor, Brian ;
Anderson, Danny ;
Shacham, Hovav ;
Savage, Stefan .
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, :447-462
[7]   Deep learning-based data analytics for safety in construction [J].
Liu, Jiajing ;
Luo, Hanbin ;
Liu, Henry .
AUTOMATION IN CONSTRUCTION, 2022, 140
[8]   Large-scale machine learning systems in real-world industrial settings: A review of challenges and solutions [J].
Lwakatare, Lucy Ellen ;
Raj, Aiswarya ;
Crnkovic, Ivica ;
Bosch, Jan ;
Olsson, Helena Holmstrom .
INFORMATION AND SOFTWARE TECHNOLOGY, 2020, 127
[9]   Software Engineering for AI-Based Systems: A Survey [J].
Martinez-Fernandez, Silverio ;
Bogner, Justus ;
Franch, Xavier ;
Oriol, Marc ;
Siebert, Julien ;
Trendowicz, Adam ;
Vollmer, Anna Maria ;
Wagner, Stefan .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2022, 31 (02)
[10]   Data confidentiality: A review of methods for statistical disclosure limitation and methods for assessing privacy [J].
Matthews, Gregory J. ;
Harel, Ofer .
STATISTICS SURVEYS, 2011, 5 :1-29