Proceedings of the 6th ACM India Computing Convention 2013
DOI: 10.1145/2522548.2523133
|View full text |Cite
|
Sign up to set email alerts
|

Feature selection for detection of peer-to-peer botnet traffic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 24 publications
(11 citation statements)
references
References 15 publications
0
11
0
Order By: Relevance
“…True negatives (TN) correspond to negative instances correctly labeled as negative. False negatives (FN) are positive instances AUC of ROC AUC of P/R curve Narang et al [26] 0.982 0.960 Rahbarinia et al [5] 0.951 0.899 Our result 0.982 0.957 The training phase of KNN stores the feature vectors and class labels of the training samples. Let be a user-defined constant.…”
Section: Feature Selectionmentioning
confidence: 82%
See 1 more Smart Citation
“…True negatives (TN) correspond to negative instances correctly labeled as negative. False negatives (FN) are positive instances AUC of ROC AUC of P/R curve Narang et al [26] 0.982 0.960 Rahbarinia et al [5] 0.951 0.899 Our result 0.982 0.957 The training phase of KNN stores the feature vectors and class labels of the training samples. Let be a user-defined constant.…”
Section: Feature Selectionmentioning
confidence: 82%
“…We adopt some features for P2P application traffic categorization and botnet detection used in [5,8,9,26]. We list our feature set as follows: We compare the detection performance of our feature set with the works by Rahbarinia et al [5] and Narang et al [26]. We evaluate the result of a classifier with the ROC curve (i.e., Receiver Operating Characteristic curve) and the P/R curve (i.e., Precision-Recall curve).…”
Section: Feature Selectionmentioning
confidence: 99%
“…A more recent classification technique uses statistical properties of network flows whose success lies heavily on the training dataset and the Machine learning algorithms used to classify the P2P traffic [11] [12] [13]. However, ensuring accuracy and authenticity of the training sets is still an open issue, particularly for flows that go undetected.…”
Section: Introductionmentioning
confidence: 99%
“…This resilience offered by P2P networks has conjointly attracted the eye of adversaries within the type of bot-masters. A 'bot' could be a worm that permits the operator to remotely management the infected system wherever it's put in [2], [10]. A network of such compromised end-hosts below the remote command of a master (i.e., the bot-master) is named a 'Botnet'.…”
Section: Introductionmentioning
confidence: 99%