Author:
Putra Muhammad Aidiel Rachman,Ahmad Tohari,Hostiadi Dandy Pramana
Abstract
AbstractThreats on computer networks have been increasing rapidly, and irresponsible parties are always trying to exploit vulnerabilities in the network to do various dangerous things. One way to exploit vulnerabilities in a computer network is by employing malware. Botnets are a type of malware that infects and attacks targets in groups. Botnets develop quickly; the characteristics of initially sporadic attacks have grown into periodic and simultaneous. This rapid development has proved that the botnet is advanced and requires more attention and proper handling. Many studies have introduced detection models for botnet attack activity on computer networks. Apart from detecting the presence of botnet attacks, those studies have attempted to explore the characteristics of botnets, such as attack intensity, relationships between activities, and time segment analysis. However, there has been no research that explicitly detects those characteristics. On the other hand, each botnet characteristic requires different handling, while recognizing the characteristics of the botnet can help network administrators make appropriate decisions. Based on these reasons, this research builds a detection model that can recognize botnet characteristics using sequential traffic mining and similarity analysis. The proposed method consists of two main processes. The first is training to build a knowledge base, and the second is testing to detect botnet activity and attack characteristics. It involves dynamic thresholds to improve the model sensitivity in recognizing attack characteristics through similarity analysis. The novelty includes developing and combining analytical techniques of sequential traffic mining, similarity analysis, and dynamic threshold to detect and recognize the characteristics of botnet attacks explicitly on actual behavior in network traffic. Extensive experiments have been conducted for the evaluation using three different datasets whose results show better performance than others.
Funder
Ministry of Education, Culture, Research and Technology, The Republic of Indonesia
Publisher
Springer Science and Business Media LLC
Reference51 articles.
1. Malware. AV-TEST—Indep. IT-Security Inst; 2022. https://www.av-test.org/en/statistics/malware/. Accessed 15 Nov 2022.
2. Böck L, Fejrskov M, Demetzou K, Karuppayah S, Mühlhäuser M, Vasilomanolakis E. Processing of botnet tracking data under the GDPR. Comput Law Secur Rev. 2022;45: 105652.
3. Melo R, Macedo D, Dantas M, Bona LC. A novel immune detection approach enhanced by attack graph based correlation. In: IEEE symposium on computers and communications; 2019. p. 1–6.
4. Abrantes R, Mestre P, Cunha A. Exploring dataset manipulation via machine learning for botnet traffic. Procedia Comput Sci. 2022;196:133–41.
5. Krishna E, Arunkumar T. Hybrid Particle swarm and gray wolf optimization algorithm for IoT intrusion detection system. Int J Intell Eng Syst. 2021;14:66–76.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献