Proceedings. 2006 31st IEEE Conference on Local Computer Networks 2006
DOI: 10.1109/lcn.2006.322210
|View full text |Cite
|
Sign up to set email alerts
|

Usilng Machine Learning Technliques to Identify Botnet Traffic

Abstract: To date, techniques to couanter cyber-attacks have predominantly been reactive; they focus on monitoring network traffic, detecting anomalies and cyber-attack traffic patters, and, a posteriori, combating the cyber-attacks and riitigating their effects. Contrary to such approclhes, we advocate proactively detecting and identifying botnets prior to their being used as part ofa cyber-attack [12]. In this paper, we present our work on using machine leamring-based classification techniques to identify the coninian… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
148
0
2

Year Published

2008
2008
2018
2018

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 230 publications
(150 citation statements)
references
References 11 publications
(13 reference statements)
0
148
0
2
Order By: Relevance
“…Ref. [19] proposed a machine learning based botnet detection approach using flow characteristics of IRC botnets. CluSiBotHealer uses packet and flow characteristics of P2P botnets and uses clustering unlike supervised methods used in [19].…”
Section: Related Workmentioning
confidence: 99%
“…Ref. [19] proposed a machine learning based botnet detection approach using flow characteristics of IRC botnets. CluSiBotHealer uses packet and flow characteristics of P2P botnets and uses clustering unlike supervised methods used in [19].…”
Section: Related Workmentioning
confidence: 99%
“…Machine learning algorithms do not need explicit signatures to classify malware programs but rather is based on finding common features and correlating different activities of the malware. The papers [13] and [14] present machine learning techniques for botnet detection by using network statistics. Detecting and neutralizing peer -to-peer based Command & Control channels is a more complicated task.…”
Section: Related Workmentioning
confidence: 99%
“…Livadas ve digerleri, IRC tabanlı botnet'lerin komuta kontrol trafigini tespit etmek için ag akış temelli bir yaklaşım önermişlerdir [6]. Yaptıkları çalışmada, ilk aşamada, sınıflandırma algoritmaları ile trafik akışlarını IRC sohbet veya IRC sohbet-dışı akışlara sınıflandırırken, ikinci aşamada, IRC akışlarını kötü amaçlı veya kötü amaçlı olmayan olarak sınıflandırmaktadırlar.…”
Section: Introductionunclassified