Skip to main content
Log in

Detecting botnet signals using process mining

  • S.I. : Social Cyber-Security.
  • Published:
Computational and Mathematical Organization Theory Aims and scope Submit manuscript

Abstract

Detecting and elucidating botnets is an active area of research. Using explainable, highly scalable Apache Spark-based artificial intelligence, process mining technologies are presented which illuminate bot activity within terrorist Twitter data. A derived hidden Markov model suggests that bot logic uses information camouflage in order to disguise intentions similar to World War II Nazi propagandists and Soviet-era practitioners of information warfare enhanced with reflexive control. A future effort is presented which strings together best of breed techniques into a composite classification algorithm in order to improve continually the discovery of malicious accounts, understand cross-platform weaponized botnet dynamics, and model adversarial information warfare campaigns recursively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

Download references

Acknowledgements

The authors are grateful to Texas A&M University and the Texas A&M Cyber Security Center. Prof. James Caverlee and John Romero were particularly helpful. Prof. Caverlee provided access to the dataset used in this study, and John Romeo authorized More Cowbell Unlimited’s participation in the study. The authors are also grateful to the Texas A&M cadets who used our cloud SaaS software and provided valuable feedback regarding presentation of results and functionality. We appreciate the Air Force Research Laboratory (AFRL) for funding mentoring opportunities such as the Cyber Spectrum Collaborative Research Environment (C-SCoRE) program, which helps cadets develop operational skills that will be instrumental in combating cyber and electronic warfare in the interest of national security. And, finally, we are grateful to the Georgia Tech Research Institute (GTRI) for disseminating the C-SCoRE opportunity.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to John W. Bicknell.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bicknell, J.W., Krebs, W.G. Detecting botnet signals using process mining. Comput Math Organ Theory 27, 161–178 (2021). https://doi.org/10.1007/s10588-020-09320-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10588-020-09320-x

Keywords

Navigation