Mostrar el registro sencillo del ítem
Multilayer framework for botnet detection using machine learning algorithms
dc.contributor.author | Ibrahim, Wan Nur Hidayah | |
dc.contributor.author | Herrera Viedma, Enrique | |
dc.date.accessioned | 2021-04-21T11:44:03Z | |
dc.date.available | 2021-04-21T11:44:03Z | |
dc.date.issued | 2021-02-22 | |
dc.identifier.citation | W. N. H. Ibrahim et al., "Multilayer Framework for Botnet Detection Using Machine Learning Algorithms," in IEEE Access, vol. 9, pp. 48753-48768, 2021, [doi:10.1109/ACCESS.2021.3060778] | es_ES |
dc.identifier.uri | http://hdl.handle.net/10481/68044 | |
dc.description | The authors wish to thank Universiti Teknologi Malaysia (UTM) for its support under Research University Grant Vot- 20H04, Malaysia Research University Network (MRUN) Vot 4L876. The authors would like to acknowledge that this work was supported/funded by the Ministry of Higher Education under the Fundamental Research Grant Scheme (FRGS/1/2018/ICT04/UTM/01/1). The work was also partially supported by the Specific Research project (SPEV) at the Faculty of Informatics and Management, University of Hradec Kralove, Czech Republic, under Grant 2102-2021. The authors are grateful for the support of student Sebastien Mambou in consultations regarding application aspects. The authors also wish to thank the Ministry of Education Malaysia for the Hadiah Latihan Persekutuan (HLP) scholarship to complete the research. | es_ES |
dc.description.abstract | A botnet is a malware program that a hacker remotely controls called a botmaster. Botnet can perform massive cyber-attacks such as DDOS, SPAM, click-fraud, information, and identity stealing. The botnet also can avoid being detected by a security system. The traditional method of detecting botnets commonly used signature-based analysis unable to detect unseen botnets. The behavior-based analysis seems like a promising solution to the current trends of botnets that keep evolving. This paper proposes a multilayer framework for botnet detection using machine learning algorithms that consist of a ltering module and classi cation module to detect the botnet's command and control server. We highlighted several criteria for our framework, such as it must be structure-independent, protocol-independent, and able to detect botnet in encapsulated technique. We used behavior-based analysis through ow-based features that analyzed the packet header by aggregating it to a 1-s time. This type of analysis enables detection if the packet is encapsulated, such as using a VPN tunnel. We also extend the experiment using different time intervals, but a 1-s time interval shows the most impressive results. The result shows that our botnet detection method can detect up to 92% of the f-score, and the lowest false-negative rate was 1.5%. | es_ES |
dc.description.sponsorship | Universiti Teknologi Malaysia (UTM) through the Research University Vot-20H04 | es_ES |
dc.description.sponsorship | Malaysia Research University Network (MRUN) Vot4L876 | es_ES |
dc.description.sponsorship | Ministry of Higher Education through the Fundamental Research Grant Scheme FRGS/1/2018/ICT04/UTM/01/1 | es_ES |
dc.description.sponsorship | Hadiah Latihan Persekutuan (HLP) Scholarship through the Ministry of Education Malaysia | es_ES |
dc.description.sponsorship | Specific Research Project (SPEV) by the Faculty of Informatics and Management, University of Hradec Kralove, Czech Republic | es_ES |
dc.language.iso | eng | es_ES |
dc.publisher | IEEE (Institute of Electrical and Electronics Engineers) | es_ES |
dc.rights | Atribución 3.0 España | * |
dc.rights.uri | http://creativecommons.org/licenses/by/3.0/es/ | * |
dc.subject | Behavior-based analysis | es_ES |
dc.subject | Botnet | es_ES |
dc.subject | Flow-based feature selection | es_ES |
dc.subject | K-nearest neighbor | es_ES |
dc.subject | Structure independent | es_ES |
dc.title | Multilayer framework for botnet detection using machine learning algorithms | es_ES |
dc.type | journal article | es_ES |
dc.rights.accessRights | open access | es_ES |
dc.identifier.doi | 10.1109/ACCESS.2021.3060778 | |
dc.type.hasVersion | VoR | es_ES |