Detection of Peer-to-Peer Botnet Using Machine Learning Techniques and Ensemble Learning Algorithm
نویسندگان
چکیده
Peer-to-peer (P2P) botnet is one of the greatest threats to digital data. It has become a common tool for performing lot malicious activities such as DDoS attacks, phishing spreading spam, identity theft, ransomware, extortion attack, and many other fraudulent activities. P2P botnets are very resilient stealthy keep mutating evade security mechanisms. Therefore, it necessary identify detect flow from normal flow. This paper uses supervised machine learning algorithms also an ensemble technique combine performances various models make predictions. To validate results, four performance metrics have been used. These accuracy, precision, recall, F1-score. Experimental results show that proposed approach delivers 99.99% 99.81% 99.11% 99.32% F1 score, which outperform previous detection approaches.
منابع مشابه
A Review of Peer-to-Peer Botnet Detection Techniques
In recent years, Peer-to-Peer technology has an extensive use. Botnets have exploited this technology efficiently and introduced the P2P botnet, which uses P2P network for remote control of its bots and become one of the most significant threats to computer networks. They are used to make DDOS attacks, generate spam, click fraud and steal sensitive information. Compared with traditional botnets...
متن کاملPeer to Peer Botnet Detection System
-In this upcoming highly engaged traffic calls in the Peer to Peer (P2P) botnets the high scalability of detection systems is going down. Where the botmasters adopt modern system to detect traffic which ends in the malicious activities and poor scalability. So in this paper, we proposed a highly scalable botnet detection system for a stealthy peer to peer botnets. In this p2p detection it will ...
متن کاملPeer-to-Peer Botnet Detection Using NetFlow Master Thesis
. Abstract . . Traditional botnets use a centralized communications architecture where all the bots connect to Command and Control (C&C) servers. These servers are the weak point of the botnet, as they are easy targets for take down and monitoring. Peer-to-peer (p2p) botnets have a distributed architecture, which make them more resilient. This research aims at the detection of individual p2p bo...
متن کاملPersonalized and Private Peer-to-Peer Machine Learning
The rise of connected personal devices together with privacy concerns call for machine learning algorithms capable of leveraging the data of a large number of agents to learn personalized models under strong privacy requirements. In this paper, we introduce an efficient algorithm to address the above problem in a fully decentralized (peer-to-peer) and asynchronous fashion, with provable converg...
متن کاملUsing Machine Learning Techniques to Identify Botnet Traffic
To date, techniques to counter cyber-attacks have predominantly been reactive; they focus on monitoring network traffic, detecting anomalies and cyber-attack traffic patterns, and, a posteriori, combating the cyber-attacks and mitigating their effects. Contrary to such approaches, we advocate proactively detecting and identifying botnets prior to their being used as part of a cyber-attack [12]....
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Information Security and Privacy
سال: 2023
ISSN: ['1930-1669', '1930-1650']
DOI: https://doi.org/10.4018/ijisp.319303