Structural Node Representation Learning for Detecting Botnet Nodes

被引:1
作者
Carpenter, Justin [1 ]
Layne, Janet [1 ]
Serra, Edoardo [1 ]
Cuzzocrea, Alfredo [2 ]
Gallo, Carmine [2 ]
机构
[1] Boise State Univ, Dept Comp Sci, Boise, ID USA
[2] Univ Calabria, IDEA LAB, Arcavacata Di Rende, Italy
来源
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, ICCSA 2023, PT I | 2023年 / 13956卷
关键词
Machine Learning; Botnet Detection; VISUALIZATION;
D O I
10.1007/978-3-031-36805-9_47
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Private consumers, small businesses, and even large enterprises are all more at risk from botnets. These botnets are known for spearheading Distributed Denial-Of-Service (DDoS) attacks, spamming large populations of users, and causing critical harm to major organizations. The development of Internet-of-Things (IoT) devices led to the use of these devices for cryptocurrency mining, in transit data interception, and sending logs containing private data to the master botnet. Different techniques have been developed to identify these botnet activities, but only a few use Graph Neural Networks (GNNs) to analyze host activity by representing their communications with a directed graph. Although GNNs are intended to extract structural graph properties, they risk to cause overfitting, which leads to failure when attempting to do so from an unidentified network. In this study, we test the notion that structural graph patterns might be used for efficient botnet detection. In this study, we also present SIR-GN, a structural iterative representation learning methodology for graph nodes. Our approach is built towork well with untested data, and our model is able to provide a vector representation for every node that captures its structural information. Finally, we demonstrate that, when the collection of node representation vectors is incorporated into a neural network classifier, our model outperforms the state-of-the-art GNN based algorithms in the detection of bot nodes within unknown networks.
引用
收藏
页码:731 / 743
页数:13
相关论文
共 44 条
[1]  
Ahn S., FUZZ IEEE 2019, P1259
[2]   Reliable Recon in Adversarial Peer-to-Peer Botnets [J].
Andriesse, Dennis ;
Rossow, Christian ;
Bos, Herbert .
IMC'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON INTERNET MEASUREMENT CONFERENCE, 2015, :129-140
[3]  
[Anonymous], 2018, Anonymized Internet Traces 2019
[4]  
[Anonymous], 2009, LEET
[5]   Big Data Visualisation and Visual Analytics for Music Data Mining [J].
Barkwell, Katrina E. ;
Cuzzocrea, Alfredo ;
Leung, Carson K. ;
Ocran, Ashley A. ;
Sanderson, Jennifer M. ;
Stewart, James Ayrton ;
Wodi, Bryan H. .
2018 22ND INTERNATIONAL CONFERENCE INFORMATION VISUALISATION (IV), 2018, :235-240
[6]  
Bartos K, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P807
[7]  
Bellatreche L, 2010, LECT NOTES COMPUT SC, V6263, P89, DOI 10.1007/978-3-642-15105-7_8
[8]   Game Data Mining: Clustering and Visualization of Online Game Data in Cyber-Physical Worlds [J].
Braun, Peter ;
Cuzzocrea, Alfredo ;
Keding, Timothy D. ;
Leung, Carson K. ;
Padzor, Adam G. M. ;
Sayson, Dell .
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS, 2017, 112 :2259-2268
[9]  
Camara RC, 2018, IEEE INT CONF FUZZY
[10]  
Ceci M., 2011, P 19 IT S ADV DAT SY, P57