2015
DOI: 10.1145/2676869
|View full text |Cite
|
Sign up to set email alerts
|

A Network Behavior-Based Botnet Detection Mechanism Using PSO and K-means

Abstract: In today's world, Botnet has become one of the greatest threats to network security. Network attackers, or Botmasters, use Botnet to launch the Distributed Denial of Service (DDoS) to paralyze large-scale websites or steal confidential data from infected computers. They also employ "phishing" attacks to steal sensitive information (such as users' accounts and passwords), send bulk email advertising, and/or conduct click fraud. Even though detection technology has been much improved and some solutions to Intern… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 41 publications
(17 citation statements)
references
References 31 publications
0
16
0
1
Order By: Relevance
“…Unlike our method which relies on modeling dependencies among flows, statistical analysis or machine learning algorithms have been mainly applied on features available in flow records or aggregated properties over a set of flows (duration, number of packets, number of flow records towards each destination, etc.). For example, in [5], the authors combined Particle Swarm Optimization (PSO) and K-means algorithms for botnet detection. In [11], the authors classified network traffic properties based on time intervals using a decision tree classifier.…”
Section: Related Workmentioning
confidence: 99%
“…Unlike our method which relies on modeling dependencies among flows, statistical analysis or machine learning algorithms have been mainly applied on features available in flow records or aggregated properties over a set of flows (duration, number of packets, number of flow records towards each destination, etc.). For example, in [5], the authors combined Particle Swarm Optimization (PSO) and K-means algorithms for botnet detection. In [11], the authors classified network traffic properties based on time intervals using a decision tree classifier.…”
Section: Related Workmentioning
confidence: 99%
“…It also depicts the need of defense mechanisms against such attacks. DDoS attacks are not new offenses against web applications (Li, Kao, Zhang, Chuang, & Yen, 2015). Initially, DDoS attacks were launched in August, 1999 against different organizations and continued attacking the various websites like Yahoo, Amazon, Buy.com, CNN and eBay since then (Bhuyan, Kashyap, Bhattacharyya, & Kalita, 2014;Buragohain, Kalita, Singh, & Bhattacharyya, 2015).…”
Section: Background and Motivationmentioning
confidence: 99%
“…In 2009, a DDoS attack was launched that disrupted the network services of most popular websites like Live Journal, Facebook, Amazon, and Twitter (Acohido & Swartz, 2009). In 2010 and 2011, more than 75,000 computer systems in 2500 organizations and 4 million computers in 100 countries were affected by DDoS attacks respectively (Li et al, 2015). Each day, more than 7000 DDoS attacks are launched by the attackers (Mousavi, 2014).…”
Section: Background and Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…This paper presents a new clustering approach for anomaly detection by using the hybridization of k-means and PSO methods. Numerous clustering methods have been proposed to detect anomalies based on hybridization of PSO and k-means algorithms [12,13,14,15,16,17]. Differences between existing 349 clustering algorithms proposed on the basis of PSO are in their objective functions.…”
Section: Introductionmentioning
confidence: 99%