Proceedings of the 15th International Conference on Availability, Reliability and Security 2020
DOI: 10.1145/3407023.3407053
|View full text |Cite
|
Sign up to set email alerts
|

A comparison of stream mining algorithms on botnet detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 18 publications
0
1
0
1
Order By: Relevance
“…The paper evaluates previous surveys and illustrates botnets architectures, topologies, communication protocols, attacking method and, their destinations, impediment approaches, and detection techniques. Similar neural network identification systems such as [107] work by analysing botnet traffic, using a more adaptive and flexible stream mining algorithm to classify botnets. Reference [94] also proposes a similar network analysis approach with a neural network-based P2P model to monitor botnet traffic and recognise patterns using the ResNet architecture.…”
Section: Neural Network Detection Mechanismsmentioning
confidence: 99%
“…The paper evaluates previous surveys and illustrates botnets architectures, topologies, communication protocols, attacking method and, their destinations, impediment approaches, and detection techniques. Similar neural network identification systems such as [107] work by analysing botnet traffic, using a more adaptive and flexible stream mining algorithm to classify botnets. Reference [94] also proposes a similar network analysis approach with a neural network-based P2P model to monitor botnet traffic and recognise patterns using the ResNet architecture.…”
Section: Neural Network Detection Mechanismsmentioning
confidence: 99%
“…Devido à evolução contínua das redes e do tráfego de redes, as características de um tráfego normal mudam constantemente (SOMMER; PAXSON, 2010) e essa natureza de inconstância do tráfego diĄculta a identiĄcação de novos ataques, exigindo uma Ćexibilidade e adaptabilidade dos algoritmos de classiĄcação (LEE; STOLFO, 2000). Com o objetivo de permitir adaptabilidade dos IDSs, trabalhos recentes consideram a tarefa de detecção de intrusão como uma classiĄcação em Ćuxo contínuos de dados (VIEGAS et al, 2019;RIBEIRO;PAIVA;MIANI, 2020;COSTA et al, 2018;CASSALES et al, 2019). Fluxos contínuos de dados (do inglês data streams) são sequências de dados geradas continuamente, em geral, em alta velocidade (KNOWLEDGE.…”
Section: Outros Trabalhos Comounclassified