The Role of Machine Learning in Botnet Detection

被引:0
作者
Miller, Sean [1 ]
Busby-Earle, Curtis [1 ]
机构
[1] Univ West Indies Mona, Dept Comp, Kingston, Jamaica
来源
2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST) | 2016年
关键词
machine learning; botnet detection; cyber-security; supervised learning; unsupervised learning;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Over the past ten to fifteen years botnets have gained the attention of researchers worldwide. A great deal of effort has been given to developing systems that would efficiently and effectively detect the presence of a botnet. This unique problem saw researchers applying machine learning (ML) to solve this problem. In this paper we provide a brief overview the different machine learning ( ML) methods and the part they play in botnet detection. The main aim of this paper is to clearly define the role different ML methods play in Botnet detection. A clear understanding of these roles are critical for developing effective and efficient real-time online detection approaches and more robust models.
引用
收藏
页码:359 / 364
页数:6
相关论文
共 20 条
  • [1] A Survey of Botnet Technology and Defenses
    Bailey, Michael
    Cooke, Evan
    Jahanian, Farnam
    Xu, Yunjing
    Karir, Manish
    [J]. CATCH 2009: CYBERSECURITY APPLICATIONS AND TECHNOLOGY CONFERENCE FOR HOMELAND SECURITY, PROCEEDINGS, 2009, : 299 - +
  • [2] Bilge L., 2012, P 28 ANN COMP SEC AP, DOI 10.1145/2420950.2420969
  • [3] Brownlee N., 1999, RFC2722: Traffic Flow Measurement: Architecture USA: RFC
  • [4] Choi H., 2011, J COMPUTER NETWORKS, V56, P2033
  • [5] Dayan P, 1999, UNSUPERVISED LEARNIN
  • [6] A Survey of Botnet and Botnet Detection
    Feily, Maryam
    Shahrestani, Alireza
    Ramadass, Sureswaran
    [J]. 2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 268 - +
  • [7] Hyslip Thomas S., 2015, SURVEY BOTNET DETECT
  • [8] A Framework for Understanding Botnets
    Leonard, Justin
    Xu, Shouhuai
    Sandhu, Ravi
    [J]. 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 917 - 922
  • [9] Livadas C, 2006, CONF LOCAL COMPUT NE, P967
  • [10] Lu W., 2011, COMPUT COMMUN, V34