2018
DOI: 10.1155/2018/8753870
|View full text |Cite
|
Sign up to set email alerts
|

Cost-Sensitive Distributed Machine Learning for NetFlow-Based Botnet Activity Detection

Abstract: The recent advancements of malevolent techniques have caused a situation where the traditional signature-based approach to cyberattack detection is rendered ineffective. Currently, new, improved, potent solutions incorporating Big Data technologies, effective distributed machine learning, and algorithms countering data imbalance problem are needed. Therefore, the major contribution of this paper is the proposal of the cost-sensitive distributed machine learning approach for cybersecurity. In particular, we pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 18 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…The choice of these algorithms was dictated by the following factors: Random Forest has been proven in multiple studies on network attacks; its performance was always high [ 4 ], and results were satisfactory, and the authors have found promising results from the utilization of this algorithm in earlier work [ 54 , 55 ]. The Gradient Boosted Trees (GBT) algorithm combines the advantages of RandomForest with the added benefit of gradient utilization.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…The choice of these algorithms was dictated by the following factors: Random Forest has been proven in multiple studies on network attacks; its performance was always high [ 4 ], and results were satisfactory, and the authors have found promising results from the utilization of this algorithm in earlier work [ 54 , 55 ]. The Gradient Boosted Trees (GBT) algorithm combines the advantages of RandomForest with the added benefit of gradient utilization.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…The authors of [22] used three distributed algorithms-extreme learning machines (ELM), distributed random forest, and distributed random boosted-trees-to detect botnet attacks. In the research paper, they presented the concepts and architecture of the system, which was based on big query data processing.…”
Section: Related Workmentioning
confidence: 99%
“…Through a recursive query, malicious attackers resolve normal DNS resolution requests to their malicious servers [5], [6]. In this process, malicious attackers apply domain-flux or fast-flux technique to locate their Command and Control (C&C) server by automatically generating a large number of non-existent domain names using domain generation algorithms (DGA) [7]- [11].…”
Section: Introductionmentioning
confidence: 99%