Proceedings of the Second International Conference on Research in Intelligent and Computing in Engineering 2017
DOI: 10.15439/2017r28
|View full text |Cite
|
Sign up to set email alerts
|

A Framework on botnet detection and forensics

Abstract: Abstract-The utilization of Internet on domestic and corporate front has been increasing at drastic rate. Each organization and enterprise exploits the internet to its fullest extent based on its requirements. In almost all areas, internet is proved to be a boon. But sometimes it lands the users into trouble because of unwanted and uninvited harmful software applications. There are so many types of threats and challenges that are faced by the internet users. Out of all the threats faced by internet users, botn… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…Various detection methods have been proposed by researchers in literature to detect botnets. Based on literature [14], there are three major methods of botnet detection such as host-based detection, honeynet detection and network-based detection. Recently, machine learning based detection has become the most widely used for detecting botnets methods as proven by previous literature [15], [16], [4], [5].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Various detection methods have been proposed by researchers in literature to detect botnets. Based on literature [14], there are three major methods of botnet detection such as host-based detection, honeynet detection and network-based detection. Recently, machine learning based detection has become the most widely used for detecting botnets methods as proven by previous literature [15], [16], [4], [5].…”
Section: Related Workmentioning
confidence: 99%
“…In study [14] the authors introduced a botnet detection framework based on comparative analyses from previous research, focusing primarily on effective measures for detection. However, this framework lacks emphasis on earlystage prevention.…”
Section: A Botnet Detection Frameworkmentioning
confidence: 99%
“…1) Benign (Normal) 2) Mirai malware attack 3) Gafgyt Malware attack Figure 5 comparison of the Provision_PT_737E Security Camera IoT device's performance evaluation findings may be understandable given that it is based on Gafgyt botnet attacks which are predicted based on above Table 1 to Table 4. We have discussed these findings on the Gafgyt botnet and its attacks using the three classifiers Logistic regression (LR) [25], Random Forest (RF) [26], and proposed XGBoost. In this bar graph, each pair of colors represents a combination of the several performance indices that were used in this study.…”
Section: Precision = Tp (Tp + Fp)mentioning
confidence: 99%