Back Propagation Algorithm-Based Intelligent Model for Botnet Detection

被引:0
作者
Sunaidi, Nik Quosthoni [1 ]
Ahmed, Abdulghani Ali [1 ]
机构
[1] Univ Malaysia Pahang, Fac Comp Syst & Software Engn, Gambang 26300, Pahang, Malaysia
关键词
Back-Propagation; Neural Network; Machine Learning; Botnet;
D O I
10.1166/asl.2018.12940
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The ever-increasing growth of network computers and the internet of things makes botnet recognition become more difficult and it is making it all the more less difficult for intruders and attackers to propagate botnet infections. The unified propagation character of botnet floods warms through different botnet environment and clients the network security. To conquer the down sides in determining the botnet, we propose a back-propagation algorithm for botnet recognition. The focus of this study is a proposed back propagation algorithm in for training the sensor leveraging the machine learning techniques, which will keep an eye on attributes of the identified or recognized traffic flow. For every identified attribute recognized, it quickly identifies, which will include nine attributes used and identify it altogether. Every time the traffic is determined, its flow is tracked and weighed against the set of attributes within the feature set for the event of address within the network route.
引用
收藏
页码:7348 / 7354
页数:7
相关论文
共 30 条
[1]   An overview of social engineering malware: Trends, tactics, and implications [J].
Abraham, Sherly ;
Chengalur-Smith, InduShobha .
TECHNOLOGY IN SOCIETY, 2010, 32 (03) :183-196
[2]  
Ahmed A. A., 2015, INT J SOFTWARE ENG C, V1, P93
[3]  
AHMED AA, 2010, JDCTA, V4, P122
[4]   Traceback model for identifying sources of distributed attacks in real time [J].
Ahmed, Abdulghani Ali ;
Sadiq, Ali Safa ;
Zolkipli, Mohamad Fadli .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) :2173-2185
[5]   Filtration model for the detection of malicious traffic in large-scale networks [J].
Ahmed, Abdulghani Ali ;
Jantan, Aman ;
Wan, Tat-Chee .
COMPUTER COMMUNICATIONS, 2016, 82 :59-70
[6]   Service Violation Monitoring Model for Detecting and Tracing Bandwidth Abuse [J].
Ahmed, Abdulghani Ali ;
Jantan, Aman ;
Rasmi, Mohammed .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2013, 21 (02) :218-237
[7]   SLA-based complementary approach for network intrusion detection [J].
Ahmed, Abdulghani Ali ;
Jantan, Aman ;
Wan, Tat-Chee .
COMPUTER COMMUNICATIONS, 2011, 34 (14) :1738-1749
[8]  
Al-Duwairi B., 2010, 2010 5 INT C INT MON
[9]  
[Anonymous], 2012, INT J SOFT COMPUT EN
[10]  
Asha S, 2016, 2016 INTERNATIONAL CONFERENCE ON RESEARCH ADVANCES IN INTEGRATED NAVIGATION SYSTEMS (RAINS)