Proceedings of the Companion Publication of the 2014 Annual Conference on Genetic and Evolutionary Computation 2014
DOI: 10.1145/2598394.2605435
|View full text |Cite
|
Sign up to set email alerts
|

On botnet behaviour analysis using GP and C4.5

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 22 publications
(27 citation statements)
references
References 15 publications
0
27
0
Order By: Relevance
“…Having said this, TCP flags were shown to be used by malwares in ways that were not intended for legitimate use. In our previous work [13], we showed that TCP flags are employed by Torpig botnet for communication but not by the Conficker botnet. Therefore, in this paper, we first investigate the effect of three different TCP flag representations (i.e numerical, nominal and binary representations).…”
Section: Methodsmentioning
confidence: 94%
See 2 more Smart Citations
“…Having said this, TCP flags were shown to be used by malwares in ways that were not intended for legitimate use. In our previous work [13], we showed that TCP flags are employed by Torpig botnet for communication but not by the Conficker botnet. Therefore, in this paper, we first investigate the effect of three different TCP flag representations (i.e numerical, nominal and binary representations).…”
Section: Methodsmentioning
confidence: 94%
“…This data set is analyzed and compared against other Zeus botnet data sets in [15]. Since many works in the literature employed generated botnet traffic in a sandbox environment using the public botnet binaries and toolkits, we also run a Zeus botnet toolkit version 1.2.7.19 in a controlled sandbox environment and captured the traces [13] in November 2013. This toolkit is also analyzed and employed in [8].…”
Section: Data Set Collection and Feature Set Extractionmentioning
confidence: 99%
See 1 more Smart Citation
“…Kirubavathi, and Anitha [23], [24] built a classifier to detect C&C channel by extracting features from a host traffic to a destination end for a defined interval deploying various learning algorithms. Utilizing C4.5 and GP algorithms, Haddadi, et al [25] classified HTTP C&C channel traffic. Detecting botnet traffic online by monitoring a number of packets in a flow was addressed by Stevanovic and Pedersen [26].…”
Section: Related Workmentioning
confidence: 99%
“…Over the last couple of years, a number of detection approaches that rely on traffic classification have been proposed (Stevanovic et al, 2016). Some of the most prominent approaches were proposed by Strayer et al (2008), Masud et al (2008), Saad et al (2011), Zhao et al (2013), Shin et al (2012), Bilge et al (2012Bilge et al ( , 2014, Perdisci et al (2012), Haddadi et al (2014) and Antonakakis et al (2011).…”
Section: Introductionmentioning
confidence: 99%