7th International Conference on Networking, Systems and Security 2020
DOI: 10.1145/3428363.3428378
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Feature Selection for Detecting Botnets based on Network Traffic and Behavior Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…For evaluation of the model performance, the "ISCX-Bot-2014 dataset" has been utilized. Hossain et al 2 have a detection model using a wrapper method for FS and several ML algorithms such as Naïve Bayes, LR, AdaBoost, Random Forest, and MLP.…”
Section: Fs Methods In Botnet Detectionmentioning
confidence: 99%
See 2 more Smart Citations
“…For evaluation of the model performance, the "ISCX-Bot-2014 dataset" has been utilized. Hossain et al 2 have a detection model using a wrapper method for FS and several ML algorithms such as Naïve Bayes, LR, AdaBoost, Random Forest, and MLP.…”
Section: Fs Methods In Botnet Detectionmentioning
confidence: 99%
“…1 Nearly 40% of computers linked to the Internet have malware on them, and botnets are used to commit most cybercrimes, according to reports. 2 One of the most advanced instruments for committing crimes online is the botnet. Mostly for financial gain, cybercriminals utilize botnets to remotely carry out a variety of illegal operations, including phishing, identity theft, extortion, Distributed Denial of Service (DDoS) attacks, and spam distribution.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…al. [7] use a different set of features and increase the detection rate to 91% with high accuracy. They trained a model using Multi-layer Feed Forward Network (ANN).…”
Section: Literature Reviewmentioning
confidence: 99%
“…This heuristic method performs backward feature elimination technique. This method is presented in [7]. At first, all the features are included in the available feature set.…”
Section: Feature Exclusion Algorithmmentioning
confidence: 99%