Skip to main content

Analysis of Feature Selection Methods for P2P Botnet Detection

  • Conference paper
  • First Online:
Advances in Computing and Data Sciences (ICACDS 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1244))

Included in the following conference series:

Abstract

Botnets are one of the major threats today and one of the main reasons for this is its capability to hide in the network. It is not easy to detect Botmaster, the one who controlled botnets from a far end. There are different technologies and algorithms that are used for the detection of a botnet in a network. Some of the prominent techniques are based on machine learning algorithms. Machine learning have been proven in the past that they are the best in the business and also the leading techniques to detect botnet. In order to implement machine learning algorithms, the most important task is to analyze the dataset very well before using it. Feature selection techniques help in doing this. With the help of different feature selection techniques, we can find out the best criteria for the detection of a botnet. In a particular dataset, there are different numbers and types of features are present, and all these features don’t contribute equally to the detection of the botnet. We need to find out the important features which will be more useful in building a botnet detection model. Many algorithms have been used in the past for botnet detection but most of them have used the different feature selection methods for different datasets. In this paper, we will be covering different feature selection methods and their analysis on the different botnets. Also, in the end, we will be comparing all these techniques and giving the best for a particular botnet.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Saeys, Y., Abeel, T., Van de Peer, Y.: Robust feature selection using ensemble feature selection techniques. In: Daelemans, W., Goethals, B., Morik, K. (eds.) ECML PKDD 2008. LNCS (LNAI), vol. 5212, pp. 313–325. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-87481-2_21

    Chapter  Google Scholar 

  2. Hughes, G.: On the mean accuracy of statistical pattern recognizer. IEEE Trans. Inf. Theory 14(1), 55–63 (1968)

    Article  Google Scholar 

  3. Guyon, I., Elisseeff, A.: An introduction to variable and feature selection. J. Mach. Learn. Res. 3, 1157–1182 (2003)

    MATH  Google Scholar 

  4. Chandrashekar, G., Sahin, F.: A survey on feature selection methods. Comput. Electr. Eng. 40(1), 16–28 (2014). https://doi.org/10.1016/j.compeleceng.2013.11.024

  5. Lazar, C., Taminau, J., Meganck, S., Steenhoff, D., Coletta, A., Molter, C., et al.: A survey on filter techniques for feature selection in gene expression microarray analysis. IEEE/ACM Trans. Comput. Biol. Bioinform. 9, 1106–1119 (2012)

    Article  Google Scholar 

  6. Yang, M., Wen, Q.: A multi-level feature extraction technique to detect moble botnet. In: 2016 2nd IEEE International Conference on Computer and Communications (ICCC), 14 October 2016, pp. 2495–2498. IEEE (2016)

    Google Scholar 

  7. Alejandre, F.V., Cortés, N.C., Anaya, E.A.: Feature selection to detect botnets using machine learning algorithms. In: 2017 International Conference on Electronics, Communications and Computers (CONIELECOMP), 22 February 2017, pp. 1–7. IEEE (2017)

    Google Scholar 

  8. Kirubavathi Venkatesh, G., Anitha Nadarajan, R.: HTTP botnet detection using adaptive learning rate multilayer feed-forward neural network. In: Askoxylakis, I., Pöhls, H.C., Posegga, J. (eds.) WISTP 2012. LNCS, vol. 7322, pp. 38–48. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-30955-7_5

    Chapter  Google Scholar 

  9. Garant, D., Lu, W.: Mining botnet behaviors on the large-scale web application community. In: 2013 27th International Conference on Advanced Information Networking and Applications Workshops, March 2013, pp. 185–190 (2013)

    Google Scholar 

  10. Hoque, N., Bhattacharyya, D., Kalita, J.: MIFS-ND: a mutual information-based feature selection method. Expert Syst. Appl. 41(14), 6371–6385 (2014)

    Article  Google Scholar 

  11. Hastie, T., Tibshirani, R., Friedman, J.: The Elements of Statistical Learning. SSS. Springer, New York (2009). https://doi.org/10.1007/978-0-387-84858-7

    Book  MATH  Google Scholar 

  12. Fette, I., Sadeh, N., Tomasic, A.: Learning to detect phishing emails. Technical report, School of Computer Science, Carneige Melon University (2006)

    Google Scholar 

  13. Aha, D.W., Bankert, R.L.: A comparative evaluation of sequential feature selection algorithms, learning from data. In: Fisher, D., Lenz, H.J. (eds.) learning from data. Lecture Notes in Statistics, vol. 112, pp. 199–206. Springer, New York (1996). https://doi.org/10.1007/978-1-4612-2404-4_19

    Chapter  Google Scholar 

  14. Zadeh, L.A.: Outline of a new approach to the analysis of complex systems and decision processes. IEEE Trans. Syst. Man Cybern. SMC-3, 28–44 (1973)

    Article  MathSciNet  Google Scholar 

  15. Liu, H., Motoda, H.: Feature Selection for Knowledge Discovery and Data Mining. Kluwer Academic, Boston (1998)

    Book  Google Scholar 

  16. Dunne, K., Cunningham, P., Azuaje, F.: Solutions to instability problems with sequential wrapper-based approaches to feature selection. Technical report TCD-2002-28. Department of Computer Science, Trinity College, Dublin, Ireland (2002)

    Google Scholar 

  17. Kalousis, A., Prados, J., Hilario, M.: Stability of feature selection algorithms: a study on high-dimensional spaces. Knowl. Inf. Syst. 12(1), 95–116 (2007). https://doi.org/10.1007/s10115-006-0040-8

    Article  Google Scholar 

  18. Fagiolini, A., Valenti, G., Pallottino, L., Dini, G., Bicchi, A.: Decentralized intrusion detection for secure cooperative multi–agent systems. In: Proceedings of the 46th IEEE Conference on Decision and Control. IEEE, Amsterdam, pp. 1553–1558 (2007)

    Google Scholar 

  19. Ganapathy, S., Kulothungan, K., Muthurajkumar, S., Vijayalakshmi, M., Yogesh, P., Kannan, A.: Intelligent feature selection and classification techniques for intrusion detection in networks: a survey. EURASIP J. Wirel. Commun. Netw. 2013(1), 1–16 (2013). https://doi.org/10.1186/1687-1499-2013-271

    Article  Google Scholar 

  20. Gupta, K.K., Nath, B., Kotagiri, R.: Layered approach using conditional random fields for intrusion detection. IEEE Trans. Dependable Secure Comput. 7(1), 35–49 (2010)

    Article  Google Scholar 

  21. Kabir, M.M., Shahjahan, M., Murase, K.: A new hybrid ant colony optimization algorithm for feature selection. Expert Syst. Appl. 39, 3747–3763 (2012)

    Article  Google Scholar 

  22. Battiti, R.: Using mutual information for selecting features in supervised neural net learning. IEEE Trans. Neural Netw. 5, 537–550 (1994)

    Article  Google Scholar 

  23. Kwak, N., Choi, C.-H.: Input feature selection for classification problems. IEEE Trans. Neural Netw. 13, 143–159 (2002)

    Article  Google Scholar 

  24. Archibald, R., Fann, G.: Feature selection and classification of hyperspectral images with support vector machines. IEEE Geosci. Remote Sens. Lett. 4, 674–677 (2007)

    Article  Google Scholar 

  25. Xu, Z., King, I., Lyu, M.R.-T., Jin, R.: Discriminative semi-supervised feature selection via manifold regularization. IEEE Trans. Neural Netw. 21, 1033–1047 (2010)

    Article  Google Scholar 

  26. Zhao, Z., Liu, H.: Semi-supervised feature selection via spectral analysis. In: Proceedings of the 7th SIAM Data Mining Conference (SDM), pp. 641–646 (2007)

    Google Scholar 

  27. Mortazavi, A., Moattar, M.H.: Robust feature selection from microarray data based on cooperative game theory and qualitative mutual information. Adv. Bioinform. (2016). https://doi.org/10.1155/2016/1058305

  28. Dietterich, T.: Machine learning research: four current directions. Artif. Intell. Mag. 18, 97–136 (1997)

    Google Scholar 

  29. Garcia, S., et al.: An empirical comparison of botnet detection methods. Comput. Secur. J. 45, 100–123 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chirag Joshi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Joshi, C., Bharti, V., Ranjan, R.K. (2020). Analysis of Feature Selection Methods for P2P Botnet Detection. In: Singh, M., Gupta, P., Tyagi, V., Flusser, J., Ă–ren, T., Valentino, G. (eds) Advances in Computing and Data Sciences. ICACDS 2020. Communications in Computer and Information Science, vol 1244. Springer, Singapore. https://doi.org/10.1007/978-981-15-6634-9_25

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-6634-9_25

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-6633-2

  • Online ISBN: 978-981-15-6634-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics