Back to Search
Start Over
Data analytics on network traffic flows for botnet behaviour detection
- Source :
- SSCI
- Publication Year :
- 2016
- Publisher :
- IEEE, 2016.
-
Abstract
- Botnets represent one of the most destructive cybersecurity threats. Given the evolution of the structures and protocols botnets use, many machine learning approaches have been proposed for botnet analysis and detection. In the literature, intrusion and anomaly detection systems based on unsupervised learning techniques showed promising performances. In this paper, we investigate the capability of employing the Self-Organizing Map (SOM), an unsupervised learning technique as a data analytics system. In doing so, our aim is to understand how far such an approach could be pushed to analyze unknown traffic to detect botnets. To this end, we employed three different unsupervised training schemes using publicly available botnet data sets. Our results show that SOMs possess high potential as a data analytics tool on unknown traffic. They can identify the botnet and normal flows with high confidence approximately 99% of the time on the data sets employed in this work.
- Subjects :
- business.industry
Computer science
ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS
Botnet
020206 networking & telecommunications
02 engineering and technology
Machine learning
computer.software_genre
Electronic mail
Intrusion
0202 electrical engineering, electronic engineering, information engineering
Data analysis
Malware
Unsupervised learning
020201 artificial intelligence & image processing
Anomaly detection
Artificial intelligence
Data mining
business
computer
High potential
Subjects
Details
- Database :
- OpenAIRE
- Journal :
- 2016 IEEE Symposium Series on Computational Intelligence (SSCI)
- Accession number :
- edsair.doi...........7a85f28944265d886b626bd211c61482
- Full Text :
- https://doi.org/10.1109/ssci.2016.7850078