Abstract
In recent years, the security threats from Internet are spreading at a fast rate. These threats are coming from different fraudulent email, websites and malicious software which are working independently. All these threats are of different categories (virus, malware, trojan etc). Every threat has a different techniques of spreading the malicious code and we also need different categories for detecting all these threats. At the focal point of a considerable lot of these assaults are accumulations of traded off PCs, or on the other hand Botnets, remotely constrained by the aggressors, and whose individuals are situated in homes, schools, businesses and government around the globe. Botnets have been a serious threat in present day and attacking lot of organization and performing cyber-crimes. Botnet have been working on the method of carry and spread. In this way it transfers malicious codes or software to different computers. Spam, denial of service attack and click fraud are some of the methods through which Botnet are attacking the system. Detection of Botnet is a typical task which can be carried out in an efficient way by using Machine Learning. This paper’s focus is on different Machine Learning algorithm and their analysis method for detection of Botnet. Different Machine Learning algorithm are implemented and their ability to detect botnet has been found out. All the algorithms are implemented on an existing dataset and therefore the results shows the ability of algorithm in detecting botnet.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Cooke E, Jahanian F, McPherson D (2005) The zombie roundup: understanding, detecting, and disrupting botnets. In: SRUTI 2005 Workshop, USINEX
McLaughlin L (2004) Bot software spreads, causes new worries. IEEE Distrib Syst Online 5(6)
Marupally PR, Paruchuri V Comparative analysis and evaluation of botnet command and control models. In: 24th IEEE international conference on advanced information networking and applications. https://doi.org/10.1109/aina.2010.171
Zeidanloo H, Manaf A (2009) Botnet command and control mechanisms. Comput Electr Eng 1:564–568. https://doi.org/10.1109/ICCEE.2009.151
Dittrich D, Dietrich S (2008) P2p as botnet command and control: a deeper insight. In: Proceedings of the 3rd international conference on malicious unwanted software (Malware 2008), 2008, pp 46–63
Rajab MA, Zarfoss J, Monrose F, Terzis A (2006) A multifaceted approach to understanding the botnet phenomenon. In: Internet measurement conference, pp 41–52. https://doi.org/10.1145/1177080.1177086
Hogben G (ed) (2011) Botnets: detection, measurement, disinfection and defence, Tech., ENISA
Gu G, Perdisci R, Zhang J, Lee W (2008) Botminer: clustering analysis of network traffic for protocol- and structure-independent botnet detection. In: Proceedings of the 17th conference on security symposium 2008
Giroire F, Chandrashekar J, Taft N, Schooler E, Papagiannaki D (2009) Exploiting temporal persistence to detect covert botnet channels. In: Proceedings of the 12th international symposium on recent. Springer, Berlin
Strayer WT et al (2007) Botnet detection based on network behavior. In: Lee W, Wang C, Dagon D (eds) Botnet detection: countering the largest security threat. Springer, Berlin
Liu D, Li Y, Hu Y, Liang Z (2010) A p 2p-botnet detection model and algorithms based on network streams analysis. In: 2010 international conference on future information technology and management engineering (FITME), vol 1, pp 55–58
Dewes C, Wichmann A, Feldmann A (2003) An analysis of internet chat systems. In: IMC ’03: proceedings of the 3rd ACM SIGCOMM conference on Internet measurement, New York, NY, USA, ACM Press, pp 51–64
Roughan M, Sen S, Spatscheck O, Duffield N (2004) Class-of-service mapping for Qos: a statistical signature-based approach to IP traffic classification. In: IMC ’04: proceedings of the 4th ACM SIGCOMM conference on internet measurement. ACM Press, New York, pp 135–148
Moore AW, Zuev D (2005) Internet traffic classification using bayesian analysis techniques. ACM Press, New York, pp 50–60
Sen S, Spatscheck O, Wang D (2004) Accurate: scalable. In: Network identification of P2P traffic using application signatures. In: WWW ’04: proceedings of the 13th international conference on WWW. ACM Press, pp 512–521
Vacca JR (2009) Computer and information security. Handbook
Silva SS, Silva RM, Pinto RC, Salles RM (2012) Botnets: a survey. Comput Netw. https://doi.org/10.1016/j.comnet.2012.07.021
Feily M, Shahrestani (2009) A survey of botnet detection, emerging security info mation, systems and technologies
Zhu Z, Lu G, Chen Y, Fu Z, Roberts P, Han K (2008) Botnet research survey. In: 32nd annual IEEE international computer software and applications. https://doi.org/10.1109/compsac.2008.205
Dittrich D, Dietrich S (2008) P2P as botnet command and control: a deeper insight. In: Proceedings of the 2008 3rd international conference on malicious and unwanted software, Malware
GarcÃa S, Grill M, Stiborek J, Zunino A (2014) An empirical comparison of Botnet detection methods. Comput Secur 45:100–123
Stevanovic M, Pedersen JM (2013) Machine learning for identifying botnet network traffic
Livadas C, Walsh R, Lapsley D, Strayer W (2006) Using machine learning techniques to identify botnet traffic, pp 967–974. https://doi.org/10.1109/lcn.2006.322210
Husna H, Phithakkitnukoon S, Palla S, Dantu R (2008) Behavior analysis of spam botnets. In: Communication systems software and middleware and workshops
Noh S-K, Oh J-H, Lee J-S, Noh B-N, Jeong H-C (2009) Detectingp2p botnets using a multi-phased flow model, in: Digital Society, pp 247–253. https://doi.org/10.1109/icds.2009.37
Nogueira A, Salvador P, Blessa F (2010) A botnet detection system based on neural networks. In: 2010 fifth international conference on digital and telecommunications, pp 57–62. https://doi.org/10.1109/icdt.2010.19
Liao W-H, Chang C-C (2010) Peer to peer botnet detection using data mining scheme. In: 2010 international conference on internet technology and applications, pp 1–4. https://doi.org/10.1109/itapp.2010.5566407
Yu X, Dong X, Yu G, Qin Y, Yue D (2010) Data-adaptive clustering analysis for online botnet detection. In: Computational science and optimization (CSO), pp 456–460. https://doi.org/10.1109/cso.2010.214
Langin C et al (2009) A self-organizing map and its modeling for discovering malignant network traffic. In: Computational intelligence in cyber security, pp 122–129. https://doi.org/10.1109/cicybs.2009.4925099
Choi H, Lee H (2011) Identifying botnets by capturing group activities in DNS traffic. J Comput Netw 56, 20–33
Sanchez F et al (2011) Blocking spam by separating end-user machines from legitimate mail server machines. In: Anti-Abuse and Spam conference, ACM, New York, NY, USA, pp 116–124. https://doi.org/10.1145/2030376.2030390
Chen F et al (2011) Detecting bots via incremental ls-svm learning with dynamic feature adaptation. In: ACM, New York, USA, pp 386–394. https://doi.org/10.1145/2020408.2020471
Saad S et al Detecting p 2p botnets through network behavior analysis and machine learning. In: Privacy, pp 174–180. https://doi.org/10.1109/pst.2011.5971980
Zhang J et al (2011) Detecting stealthy P2P botnets using statistical traffic fingerprints. In: Networks, IEEE/IFIP, Hong Kong, pp 121–132
W Lu et al (2011) Clustering botnet communication traffic based on n-gram feature selection. Comput Commun 502–514
Bilge L et al Disclosure: detecting botnet command and control servers through large-scale netflow analysis. In: Proceedings of the 28th annual computer security applications conference, ACM. https://doi.org/10.1145/2420950.2420969
Masud M et al (2008) Flow-based identification of botnet traffic by mining multiple log files, pp 200–206. https://doi.org/10.1109/icdfma.2008.4784437
Shin S et al (2012) EFFORT: efficient and effective Bot malware detection. In: IEEE conference 2012, pp 71–80
Zeng Y et al (2010) Detection of botnets using combined host and network-level information. IEEE/IFIP, pp 291–300. https://doi.org/10.1109/dsn.2010.5544306
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Joshi, C., Bharti, V., Ranjan, R.K. (2021). Botnet Detection Using Machine Learning Algorithms. In: Dave, M., Garg, R., Dua, M., Hussien, J. (eds) Proceedings of the International Conference on Paradigms of Computing, Communication and Data Sciences. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-7533-4_56
Download citation
DOI: https://doi.org/10.1007/978-981-15-7533-4_56
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-7532-7
Online ISBN: 978-981-15-7533-4
eBook Packages: EngineeringEngineering (R0)