Flow Based Botnet Traffic Detection Using Machine Learning

被引:6
作者
Gahelot, Parul [1 ]
Dayal, Neelam [1 ]
机构
[1] Ctr Adv Studies, Lucknow, Uttar Pradesh, India
来源
PROCEEDINGS OF ICETIT 2019: EMERGING TRENDS IN INFORMATION TECHNOLOGY | 2020年 / 605卷
关键词
Botnet; Classification; Feature extraction; Machine learning; Network traffic; Pcap files; Wireshark; CLASSIFICATION;
D O I
10.1007/978-3-030-30577-2_36
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A botnet is a network of infected bots that works independently under the control of a Botmaster, which issues commands to bots using command and control server. Over time botnet architectures have been become advanced to evade the detection and disruption. Botnets are used by cybercriminal attackers for performing an unwanted activity for personal advantages like performing DDOS attack, theft of bank related information like id, password, and other harmful activities through the network, which might be a great loss for the society. In this paper, a supervised machine learning classification is used to classify the flow based botnet traffic using network flow dataset. The proposed model is able to distinguish botnet traffic from normal traffic with an accuracy of 99.94% using the J48 decision tree machine learning algorithm. The result of the proposed algorithm is efficient to be implemented in real time scenario.
引用
收藏
页码:418 / 426
页数:9
相关论文
共 19 条
[1]  
[Anonymous], 2018, FOR TRENDS
[2]  
[Anonymous], 2010, THREAT BANK IND
[3]  
[Anonymous], 2018, PEERRUSH DATASET
[4]  
[Anonymous], 2010, ISOT DATASET
[5]  
Canadian Institute for Cybersecurity, 2014, ISCX Botnet Dataset 2014
[6]   Effective Botnet Detection Through Neural Networks on Convolutional Features [J].
Chen, Shao-Chien ;
Chen, Yi-Ruei ;
Tzeng, Wen-Guey .
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, :372-378
[7]  
CTU University, 2011, CTU Malware Capture Botnets in CTU-13 dataset
[8]   A Survey of Botnet and Botnet Detection [J].
Feily, Maryam ;
Shahrestani, Alireza ;
Ramadass, Sureswaran .
2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, :268-+
[9]  
Gadelrab Mohammed S., 2018, International Journal of Communication Networks and Information Security, V10, P563
[10]  
Gu G., 2008, P 17 C SEC S, V5, P139